Independent

ComputerWorldIndependent

Apache Struts 2 exploit allows ransomware on servers

Credit to Author: Lucian Constantin| Date: Thu, 06 Apr 2017 13:43:00 -0700

Attackers are exploiting a vulnerability patched last month in the Apache Struts web development framework to install ransomware on servers.

The SANS Internet Storm Center issued an alert Thursday, saying an attack campaign is compromising Windows servers through a vulnerability tracked as CVE-2017-5638.

The flaw is located in the Jakarta Multipart parser in Apache Struts 2 and allows attackers to execute system commands with the privileges of the user running the web server process.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

U.S. trade lobbying group attacked by suspected Chinese hackers

Credit to Author: Grant Gross| Date: Thu, 06 Apr 2017 11:02:00 -0700

A group of what appears to be Chinese hackers infiltrated a U.S. trade-focused lobbying group as the two countries wrestle with how they treat imports of each other’s goods and services.

The APT10 Chinese hacking group appears to be behind a “strategic web compromise” in late February and early March at the National Foreign Trade Council, according to security vendor Fidelis Cybersecurity.

The NFTC lobbies for open and fair trade and has pledged to work with U.S. President Donald Trump to “find ways to address Chinese policies that frustrate access to their market and undermine fair trade, while at the same time encouraging a positive trend in our trade relationship.” Trump will meet with China President Xi Jinping in Florida this week.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

F-Secure buys Little Flocker to combat macOS ransomware

Credit to Author: Lucian Constantin| Date: Thu, 06 Apr 2017 08:07:00 -0700

With attacks against Mac users growing in number and sophistication, endpoint security vendor F-Secure has acquired Little Flocker, a macOS application that provides behavior-based protection against ransomware and other malicious programs.

Little Flocker can be used to enforce strict access controls to a Mac’s files and directories as well as its webcam, microphone and other resources. It’s particularly effective against ransomware, spyware, computer Trojans and other malicious programs that attempt to steal, encrypt or destroy files.

F-Secure plans to integrate Little Flocker, which it calls “the most advanced security technology available for Macs,” into its new Xfence technology. Xfence is designed to  add behavioral-based protection to its existing endpoint security products for macOS.

To read this article in full or to leave a comment, please click here

Read More
IndependentKrebs

Self-Proclaimed ‘Nuclear Bot’ Author Weighs U.S. Job Offer

Credit to Author: BrianKrebs| Date: Thu, 06 Apr 2017 14:22:55 +0000

The author of a banking Trojan called Nuclear Bot — a teenager living in France — recently released the source code for his creation just months after the malware began showing up for sale in cybercrime forums. Now the young man’s father is trying to convince him not to act on a job offer in the United States, fearing it may be a trap set by law enforcement agents.

Read More
ComputerWorldIndependent

Top 5 email security best practices to prevent malware distribution

Credit to Author: Ryan Francis| Date: Thu, 06 Apr 2017 06:29:00 -0700

A trusted channel
email encryption

Image by Thinkstock

Email is a critical enterprise communication tool synonymous with sending important documents quickly and efficiently between employees, managers, HR, finance, sales, legal, customers, supply chain and more. That said, organizations often don’t understand that the file types used every day to share important information – standard files like Word docs, Excel spreadsheets and PDFs – are also the most common attack vectors widely used for the distribution of malware. For cybercriminals, it’s often too easy to target a user with a spoofed email or phishing attack, and trick them into opening an infected attachment that appears to be legitimate.

To read this article in full or to leave a comment, please click here

Read More

(Insider Story)

Read More
ComputerWorldIndependent

Six in 10 people believe their lives will improve with autonomous vehicles

Credit to Author: Lucas Mearian| Date: Thu, 06 Apr 2017 03:00:00 -0700

Six in 10 people believe connected and autonomous vehicles (CAVs) will improve their quality of life, according to a new study by Strategy Consulting and PricewaterhouseCoopers (PwC).

The study, commissioned by the U.K.-based trade association Society of Motor Manufacturers and Traders, also found half of drivers age 17 to 24 would use a connected, autonomous vehicle (CAV) today.

Among all those surveyed, the biggest benefit from CAVs would be stress-free driving, with cars that brake and park themselves as top attributes.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

U.S. may expand laptop ban to more airports

Credit to Author: Michael Kan| Date: Wed, 05 Apr 2017 18:09:00 -0700

The U.S. might add other airports to its ban restricting passengers from bringing laptops and other electronics into the cabin for certain flights from the Middle East.

“We may take measures in the not too distant future to expand the number of airports,” said Homeland Security secretary John Kelly on Wednesday during a congressional hearing.

Last month, the U.S. announced the ban, which affects ten airports, all of which are in Muslim-majority countries. Passengers flying to the U.S. are barred from bringing any electronic devices larger than a smartphone into a plane’s cabin, and must instead check them in as baggage.    

To read this article in full or to leave a comment, please click here

Read More