Independent

ComputerWorldIndependent

8 steps to regaining control over shadow IT

Credit to Author: Ryan Francis| Date: Thu, 23 Feb 2017 12:17:00 -0800

A dangerous practice on the rise
0 shadow it intro

Image by Pexels

“Shadow IT” refers to the too-common practice whereby managers select and deploy cloud services without the consent or even the knowledge of the IT department. These services act as extensions of the corporation but are steered entirely by groups that lack the knowledge or process to ensure they follow necessary guidelines, introducing security, compliance, and brand risk throughout the enterprise. Gartner predicts that by 2020, one-third of security breaches will come in through shadow IT services.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Police arrest man suspected of building million-router German botnet

Credit to Author: Peter Sayer| Date: Thu, 23 Feb 2017 09:06:00 -0800

Last year, someone turned a German internet service provider into a million-router botnet. German police think they will soon have the culprit.

The U.K.’s National Crime Agency (NCA) made an arrest on Wednesday in connection with the November 2016 hack on Deutsche Telekom. The agency said it arrested a 29-year-old man at Luton airport, acting on a European Arrest Warrant issued by the public prosecutor’s office in Cologne, Germany.

The German Federal Criminal Police Office (Bundeskriminalamt, or BKA), which led the investigation, said it had worked with British law enforcement officials to arrest the man, a Briton.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Eleven-year-old root Linux kernel flaw found and patched

Credit to Author: Lucian Constantin| Date: Thu, 23 Feb 2017 07:49:00 -0800

Linux system administrators should be on the watch for kernel updates because they fix a local privilege escalation flaw that could lead to a full system compromise.

The vulnerability, tracked as CVE-2017-6074, is over 11 years old and was likely introduced in 2005 when the Linux kernel gained support for the Datagram Congestion Control Protocol (DCCP). The problem was discovered last week and was patched by the kernel developers on Friday.

The flaw can be exploited locally by using heap spraying techniques to execute arbitrary code inside the kernel, the most privileged part of the OS. Andrey Konovalov, the Google researcher who found the vulnerability, plans to publish an exploit for it a few days.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Amid cyberattacks, ISPs try to clean up the internet

Credit to Author: Michael Kan| Date: Thu, 23 Feb 2017 06:26:00 -0800

If your computer’s been hacked, Dale Drew might know something about that.

Drew is chief security officer at Level 3 Communications, a major internet backbone provider that’s routinely on the lookout for cyberattacks on the network level. The company has linked more than 150 million IP addresses to malicious activity worldwide.

That means all of those IP addresses have computers behind them that are probably involved in distributed denial-of-service attacks, email spam, or breaches of company servers, Drew said.

Hackers have managed to hijack those computers to “cause harm to the internet,” but the owners don’t always know that, Drew said. 

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

A hard drive's LED light can be used to covertly leak data

Credit to Author: Michael Kan| Date: Thu, 23 Feb 2017 03:40:00 -0800

The seemingly harmless blinking lights on servers and desktop PCs may give away secrets if a hacker can hijack them with malware.

Researchers in Israel have come up with an innovative hack that turns a computer’s LED light into a signaling system that shows passwords and other sensitive data.

The researchers at Ben-Gurion University of the Negev demonstrated the hack in a YouTube video posted Wednesday. It shows a hacked computer broadcasting the data through a computer’s LED light, with a drone flying nearby reading the pattern.

The researchers designed the scheme to underscore vulnerabilities of air-gapped systems, or computers that have been intentionally disconnected from the internet.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

What to expect from the Trump administration on cybersecurity

Credit to Author: Grant Gross| Date: Wed, 22 Feb 2017 11:39:00 -0800

Look for President Donald Trump’s administration to push for increased cybersecurity spending in government, but also for increased digital surveillance and encryption workarounds.

That’s the view of some cybersecurity policy experts, who said they expect Trump to focus on improving cybersecurity at federal agencies while shying away from new cybersecurity regulations for businesses. 

Trump is likely to look for ways for the National Security Agency and other agencies to assist the government and companies in defending against cyberattacks, said Jeffrey Eisenach, a visiting scholar at the American Enterprise Institute and a tech adviser during Trump’s presidential transition.

To read this article in full or to leave a comment, please click here

Read More