Independent

IndependentSecuriteam

Know your community – Veronique Loquet

Credit to Author: Maor Schwartz| Date: Wed, 29 Mar 2017 11:27:56 +0000

Veronique Loquet is the proud owner of AL’X Communication, No Such Con Co-founder, Security Vacation Club member and infosec enthusiastic! Questions Q: How many years have you been working in the security field? A: I have been in the security field since 2002. Q: What was your motivation for getting into the security field in … Continue reading Know your community – Veronique Loquet

Read More
ComputerWorldIndependent

New Mirai IoT variant launched 54-hour DDoS attack against a U.S. college

Credit to Author: Darlene Storm| Date: Wed, 29 Mar 2017 08:10:00 -0700

A new variant of the Mirai IoT malware was spotted in the wild when it launched a 54-hour DDoS attack against an unnamed U.S. college.

While the attack occurred on February 28, Imperva Incapsula is informing the world about it today. The researchers believe it is a new variant of Mirai, one that is “more adept at launching application layer assaults.”

The average traffic flow was 30,000 requests per second (RPS) and peaked at about 37,000 RPS, which the DDoS mitigation firm said was the most it has seen out of any Mirai botnet so far. “In total, the attack generated over 2.8 billion requests.”

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Trojan source code leak poised to spur new online banking attacks

Credit to Author: Lucian Constantin| Date: Wed, 29 Mar 2017 10:55:00 -0700

The source code for a new Trojan program that targets banking services has been published online, offering an easy way for unskilled cybercriminals to launch potent malware attacks against users.

The Trojan is called Nuclear Bot and first appeared for sale on underground cybercrime forums in early December for $2,500. It can steal and inject information from and into websites opened in Mozilla Firefox, Internet Explorer and Google Chrome and can also open a local proxy or hidden remote desktop service.

These are all features commonly seen in banking Trojans, as they’re used by attackers to bypass the security checks of online bank websites to perform fraud. For example, the proxy and remote desktop functionality allows hackers to initiate rogue transactions through the victims’ browsers after they have been tricked into providing the second authentication factor.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Privacy advocates plan to fight Congress' repeal of ISP privacy rules

Credit to Author: Grant Gross| Date: Wed, 29 Mar 2017 08:19:00 -0700

Privacy advocates haven’t given up the fight after Congress voted to allow ISPs to sell customers’ browsing histories and other personal information without their permission.

On Tuesday, the House of Representatives voted 215 to 205 to strike down ISP privacy regulations approved by the Federal Communications Commission only months ago. The House’s passage of a resolution of disapproval followed a Senate vote to pass the same resolution days earlier. 

President Donald Trump is expected to sign the Republican-pushed bill. But Sen. Ed Markey, a Massachusetts Democrat, said he will introduce new legislation to require the FCC to pass new ISP privacy rules.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

New Mirai IoT variant launched 54-hour DDoS attack against a US college

Credit to Author: Darlene Storm| Date: Wed, 29 Mar 2017 08:10:00 -0700

A new variant of the Mirai IoT malware was spotted in the wild when it launched a 54-hour DDoS attack against an unnamed US college.

While the attack occurred on February 28, Imperva Incapsula is informing the world about it today. The researchers believe it is a new variant of Mirai, one that is “more adept at launching application layer assaults.”

The average traffic flow was 30,000 requests per second (RPS) and peaked at about 37,000 RPS, which the DDoS mitigation firm said was the most it has seen out of any Mirai botnet so far. “In total, the attack generated over 2.8 billion requests.”

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Insecure security cameras sound like a joke, but aren’t

Credit to Author: Evan Schuman| Date: Wed, 29 Mar 2017 04:00:00 -0700

Reports recently surfaced that Google was alerted to security holes in its IoT security camera products and declined to patch them. This was quite frightening for two reasons. First, the fix was apparently straightforward, and second, the hole was readily and easily available to burglars with even a modicum of tech savviness.

Meanwhile, eBay seems to be encouraging users to downgrade their security defenses by giving up the hardware tokens they use for two-factor authentication and relying on text messages instead. Yes, eBay suggested that users make themselves more vulnerable to identity thieves. With these two recent incidents, is it any wonder that IT is suspicious about whether major companies are taking security seriously?

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

What it takes to become an IT security engineer

Credit to Author: Stacy Collett| Date: Wed, 29 Mar 2017 03:56:00 -0700

When Scott Copeland got his associate degree in network administration back in 2004, the community college he attended didn’t offer IT security courses, “but it gave me the foundation to learn more about network security,” he says. His determination and thirst for learning led him to his current job as an IT security engineer at FedEx Services in Memphis, Tenn.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read More
ComputerWorldIndependent

House votes to undo broadband privacy rules

Credit to Author: Michael Kan| Date: Tue, 28 Mar 2017 16:09:00 -0700

The U.S. House of Representatives has followed the Senate in voting to repeal privacy rules that can prevent broadband providers from selling customers’ internet-browsing histories and other data without their permission.

On Tuesday, the House voted 215-205 to do away with the privacy rules that the U.S. Federal Communications Commission passed last year. The rules had yet to come into effect.

They require broadband carriers to first obtain opt-in approval from customers before using and sharing their sensitive personal information, such as web browsing history, geo-location data and what applications they’ve used.

To read this article in full or to leave a comment, please click here

Read More