Security

ComputerWorldIndependent

Old Windows Server machines can still fend off hacks. Here's how

Credit to Author: Michael Kan| Date: Wed, 26 Apr 2017 04:01:00 -0700

If you’re running a Windows Server 2003 machine, you have a problem. Your already-vulnerable computer is now at severe risk of being hacked.

That’s due to the internet release earlier this month of a batch of updates that paint a bull’s-eye on computers running Windows Server 2003, according to security researchers.

“I can teach my mom how to use some of these exploits,” said Jake Williams, founder of Rendition Infosec, a security provider. “They are not very complicated at all.”

Experts are urging affected businesses to upgrade to the latest Windows OSes, which offer security patches that can address the threat.

To read this article in full or to leave a comment, please click here

Read More
SecurityTrendMicro

Linux is secure…right?

Credit to Author: Lauren Newby| Date: Tue, 25 Apr 2017 18:45:13 +0000

“There are no threats for Linux servers. Aren’t they built to be secure?” “Linux servers are so secure and hardened, why do we need security controls on those?” “I do understand there are threats out there but I am not aware of any major attacks on Linux servers” If you find yourself nodding in agreement,…

Read More
ComputerWorldIndependent

How your company needs to train workers in cybersecurity

Credit to Author: Matt Hamblen| Date: Tue, 25 Apr 2017 09:21:00 -0700

With workplace cyberattacks on the rise, industry experts are pressing businesses to train their workers to be more vigilant than ever to protect passwords and sensitive data and to recognize threats.

“It is imperative for organizations of all sizes to instill among employees the critical role they play in keeping their workplace safe and secure,” said Michael Kaiser, executive director of the National Cyber Security Alliance, a group that promotes education on the safe and secure use of the internet. The group’s members include such major technology companies as Cisco, Facebook, Google, Intel and Microsoft.

To read this article in full or to leave a comment, please click here

Read More
SecurityTrendMicro

A Storm’s a Coming: How businesses can defend against threat actor groups like Pawn Storm

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Tue, 25 Apr 2017 14:00:47 +0000

It's critical to hire a CISO that has experience and can lead a team.Pawn Storm (aka Sednit5, Fancy Bear, APT28, Sofacy and STRONTIUM8) might sound like Instagram accounts, top-secret spy programs or recently passed legislation, but in reality they are all different names for the same successful cyber espionage group (or threat actor group). These actors often use multi-angle bombardment attacks on the same target, implementing multiple methods…

Read More
SecurityTrendMicro

Pawn Storm: The Power of Social Engineering

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Tue, 25 Apr 2017 12:00:02 +0000

Anyone familiar with Pawn Storm (a.k.a. APT28, Fancy Bear, Strontium, etc.) is likely to associate the group with highly sophisticated targeted attacks that compromise government and media agencies around the world. In our latest report, researchers expose the true nature and scope of the cyber espionage group’s attacks and methodologies. Pawn Storm has managed to…

Read More