Security

QuickHealSecurity

A technical analysis of the recent Petya ransomware attack

Credit to Author: Quick Heal Security Labs| Date: Fri, 30 Jun 2017 11:54:55 +0000

Earlier this week, a new variant of Petya Ransomware was spotted which was creating havoc all over Europe as well as major parts of Asia including India. The major target for Petya has been Ukraine as its major banks and also the power services were hit by the attack. It’s…

The post A technical analysis of the recent Petya ransomware attack appeared first on Quick Heal Technologies Security Blog | Latest computer security news, tips, and advice.

Read More
ComputerWorldIndependent

Microsoft consolidates its mobile management tools under Azure

Credit to Author: Lucas Mearian| Date: Thu, 29 Jun 2017 13:31:00 -0700

Microsoft has consolidated its Enterprise Mobility + Security (EMS) suite of products under its Azure portal, combining its Intune mobile application management tools and its Azure Active Directory (AD) and Information Protection under a single console.

The move offers a unified admin experience aimed at bolstering enterprise mobility management efforts.

Microsoft introduced the EMS suite in March 2014, targeting businesses with strong mobile and cloud-first strategies.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

A Chromebook can increase the protection of air-gapped computers

Credit to Author: Michael Horowitz| Date: Wed, 28 Jun 2017 14:03:00 -0700

I used to think the best way to protect a computer hosting sensitive data was by not connecting it to any network, a process known as air gapping. Ah, the good old days.

WikiLeaks recently revealed that when a computer with the sensitive data is running Windows, even air gapped protection is insufficient. The CIA, using a software system codenamed Brutal Kangaroo, first infects a Windows computer connected to the internet, then infects any USB flash drive (a.k.a. thumb drive) plugged into that computer in the hope that the flash drive will eventually be plugged into the air-gap protected machines.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

A Chromebook can increase the protection of air gapped computers

Credit to Author: Michael Horowitz| Date: Wed, 28 Jun 2017 14:03:00 -0700

I used to think that the best way to protect a computer hosting sensitive data was by not connecting it to any network, a process known as air gapping. Ah, the good old days.

WikiLeaks recently revealed that when the computer with the sensitive data is running Windows, even air gapped protection is insufficient. The CIA, using a software system codenamed Brutal Kangaroo, first infects a Windows computer connected to the Internet, then infects any USB flash drive (a.k.a. thumb drive) plugged into that computer, in the hope that the flash drive will eventually be plugged into the air-gap protected machines.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Why Apple’s future’s up on ransomware

Credit to Author: Jonny Evans| Date: Wed, 28 Jun 2017 03:59:00 -0700

This week’s big security story is the so-called ‘Petya’ ransomware attack. It is not the first such attack, won’t be the last, and its success will prompt cybercriminals to attack again, and again, and again. In this new threat environment, there are zero excuses for any enterprise, public or private, to be running Windows XP, or any other insecure platform.

Even the cops

Chronic underfunding and a conservative government ideologically committed to cuts mean key UK public services remain under threat of cyberattack. In recent weeks, the National Health Service saw its computing systems fail because they relied too much on unprotected Windows systems. This morning we learned that the UK’s Metropolitan Police force still uses over 18,000 computers running Windows XP. The key police force of the UK’s biggest city is therefore currently vulnerable to cyber-attack.

To read this article in full or to leave a comment, please click here

Read More