Security

ComputerWorldIndependent

U.S. trade lobbying group attacked by suspected Chinese hackers

Credit to Author: Grant Gross| Date: Thu, 06 Apr 2017 11:02:00 -0700

A group of what appears to be Chinese hackers infiltrated a U.S. trade-focused lobbying group as the two countries wrestle with how they treat imports of each other’s goods and services.

The APT10 Chinese hacking group appears to be behind a “strategic web compromise” in late February and early March at the National Foreign Trade Council, according to security vendor Fidelis Cybersecurity.

The NFTC lobbies for open and fair trade and has pledged to work with U.S. President Donald Trump to “find ways to address Chinese policies that frustrate access to their market and undermine fair trade, while at the same time encouraging a positive trend in our trade relationship.” Trump will meet with China President Xi Jinping in Florida this week.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

F-Secure buys Little Flocker to combat macOS ransomware

Credit to Author: Lucian Constantin| Date: Thu, 06 Apr 2017 08:07:00 -0700

With attacks against Mac users growing in number and sophistication, endpoint security vendor F-Secure has acquired Little Flocker, a macOS application that provides behavior-based protection against ransomware and other malicious programs.

Little Flocker can be used to enforce strict access controls to a Mac’s files and directories as well as its webcam, microphone and other resources. It’s particularly effective against ransomware, spyware, computer Trojans and other malicious programs that attempt to steal, encrypt or destroy files.

F-Secure plans to integrate Little Flocker, which it calls “the most advanced security technology available for Macs,” into its new Xfence technology. Xfence is designed to  add behavioral-based protection to its existing endpoint security products for macOS.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Top 5 email security best practices to prevent malware distribution

Credit to Author: Ryan Francis| Date: Thu, 06 Apr 2017 06:29:00 -0700

A trusted channel
email encryption

Image by Thinkstock

Email is a critical enterprise communication tool synonymous with sending important documents quickly and efficiently between employees, managers, HR, finance, sales, legal, customers, supply chain and more. That said, organizations often don’t understand that the file types used every day to share important information – standard files like Word docs, Excel spreadsheets and PDFs – are also the most common attack vectors widely used for the distribution of malware. For cybercriminals, it’s often too easy to target a user with a spoofed email or phishing attack, and trick them into opening an infected attachment that appears to be legitimate.

To read this article in full or to leave a comment, please click here

Read More
SecurityTrendMicro

Stolen Memories: Why cyber thieves attack personal over financial data

Credit to Author: Cara West-Wainwright| Date: Thu, 06 Apr 2017 12:00:22 +0000

Millennials may be tech-savvy, but they're not necessarily up to speed on the latest cyber security protocols.In the never-ending war against cybercrime, half the battle lies in raising public awareness about the nature of the threats out there. If everyday computers users are more clued into the security and privacy dangers facing them online, they’re more likely to take steps to reduce risk. But there’s always more to learn – that’s…

Read More

(Insider Story)

Read More
ComputerWorldIndependent

Six in 10 people believe their lives will improve with autonomous vehicles

Credit to Author: Lucas Mearian| Date: Thu, 06 Apr 2017 03:00:00 -0700

Six in 10 people believe connected and autonomous vehicles (CAVs) will improve their quality of life, according to a new study by Strategy Consulting and PricewaterhouseCoopers (PwC).

The study, commissioned by the U.K.-based trade association Society of Motor Manufacturers and Traders, also found half of drivers age 17 to 24 would use a connected, autonomous vehicle (CAV) today.

Among all those surveyed, the biggest benefit from CAVs would be stress-free driving, with cars that brake and park themselves as top attributes.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

U.S. may expand laptop ban to more airports

Credit to Author: Michael Kan| Date: Wed, 05 Apr 2017 18:09:00 -0700

The U.S. might add other airports to its ban restricting passengers from bringing laptops and other electronics into the cabin for certain flights from the Middle East.

“We may take measures in the not too distant future to expand the number of airports,” said Homeland Security secretary John Kelly on Wednesday during a congressional hearing.

Last month, the U.S. announced the ban, which affects ten airports, all of which are in Muslim-majority countries. Passengers flying to the U.S. are barred from bringing any electronic devices larger than a smartphone into a plane’s cabin, and must instead check them in as baggage.    

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Critical Xen hypervisor flaw endangers virtualized environments

Credit to Author: Lucian Constantin| Date: Wed, 05 Apr 2017 10:59:00 -0700

A critical vulnerability in the widely used Xen hypervisor allows attackers to break out of a guest operating system running inside a virtual machine and access the host system’s entire memory.

This is a serious violation of the security barrier enforced by the hypervisor and poses a particular threat to multi-tenant data centers where the customers’ virtualized servers share the same underlying hardware.

The open-source Xen hypervisor is used by cloud computing providers and virtual private server hosting companies, as well as by security-oriented operating systems like Qubes OS.

The new vulnerability affects Xen 4.8.x, 4.7.x, 4.6.x, 4.5.x, and 4.4.x and has existed in the Xen code base for over four years. It was unintentionally introduced in December 2012 as part of a fix for a different issue.

To read this article in full or to leave a comment, please click here

Read More