Security

ComputerWorldIndependent

Face it: Enterprise cyberattacks are going to happen

Credit to Author: Matt Hamblen| Date: Wed, 03 May 2017 11:00:00 -0700

There are now so many cyberattacks that many enterprises simply accept that hackers and bad actors will find ways to break into their systems.

A strategy some large businesses have developed over the past two years has been to quickly identify and isolate these attacks, possibly by shutting down part of a system or network so the hackers won’t get days or weeks to root around and grab sensitive corporate data.

This enterprise focus on rapid detection and response to various attacks on networks and computers doesn’t replace conventional security tools to prevent attacks. Instead, businesses are relying on both prevention software and detection software.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

NSA collected 151 million records of Americans' calls, allowed 1,934 to be 'unmasked'

Credit to Author: Darlene Storm| Date: Wed, 03 May 2017 07:15:00 -0700

Despite the USA Freedom Act of 2015, the NSA collected 151 million records of Americans’ phone calls last year, even though it had obtained warrants from the FISA court to spy on only 42 people suspected of having ties to terrorism. The NSA also complied with requests from government officials to reveal the identities of 1,934 U.S. persons ensnared in the foreign surveillance.

The annual report, issued by the Office of the Director of National Intelligence, provides the first assessment of the effectiveness of the 2015 USA Freedom Act which was meant to limit dragnet surveillance of millions of Americans’ phone records. In 2016, 151,230,968 was the total estimated number of Americans’ call details records, meaning metadata about calls such as the number of the caller and recipient as well as the duration and time of the call, which the NSA received from providers and then stored in NSA repositories.

To read this article in full or to leave a comment, please click here

Read More
SecurityTrendMicro

Industrial Robots are Hackable: How Do We Fix Them?

Credit to Author: Jon Clay| Date: Wed, 03 May 2017 12:00:30 +0000

Discuss cyber attacks involving robots and many people might think you’re talking about the latest Hollywood blockbuster to hit the screens. The reality, however, is that industrial robotic systems now form a vital cog in the manufacturing process of everything from silicon chips to cars and even glassware. A new Trend Micro report, Demonstrating Industrial…

Read More