Security

SecurityTrendMicro

Challenges and Opportunities for 2017: Trend Micro Global Research Peels Back the Layers

Credit to Author: Raimund Genes (Chief Technology Officer)| Date: Tue, 14 Mar 2017 12:00:08 +0000

The year 2017 could be a pivotal moment for cybersecurity in Europe. And that’s thanks to two things: alleged state-sponsored interference in forthcoming national elections in the region, and looming European data protection laws. Both have escalated the issue of online threats and data security right up to board level, in Europe and the U.S….

Read More
ComputerWorldIndependent

Mirai is the hydra of IoT security: Too many heads to cut off

Credit to Author: Michael Kan| Date: Tue, 14 Mar 2017 04:05:00 -0700

Efforts to stop Mirai, a malware found infecting thousands of IoT devices, have become a game of whack-a-mole, with differing opinions over whether hackers or the security community are making any headway.

The malicious code became publicly available in late September. Since then, it’s been blamed for enslaving IoT devices such as DVRs and internet cameras to launch massive distributed denial-of-service attacks, one of which disrupted internet access across the U.S. in October.

The good news: Last month, police arrested one suspected hacker who may have been behind several Mirai-related DDoS attacks.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

WikiLeaks dump spotlights CIA spying powers

Credit to Author: Michael Kan| Date: Mon, 13 Mar 2017 10:51:00 -0700

Has the CIA ever spied on you? That’s a key question swirling around the WikiLeaks document dump that allegedly details the U.S. agency’s secret hacking tools.

The documents themselves don’t reveal much about who the CIA might have snooped on. But the agency certainly has the power to spy on foreigners outside the U.S., said Paul Pillar, a former deputy counterterrorism chief with the CIA.

That’s its job after all: To collect foreign intelligence. But even so, the CIA is pretty selective with its targets.   

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Of course your TV’s spying on you

Credit to Author: Steven J. Vaughan-Nichols| Date: Mon, 13 Mar 2017 10:22:00 -0700

Julian Assange, Wikileaks’ founder and Russian propagandist, must be proud of himself. In his latest “revelation” that the Central Intelligence Agency (CIA) can hack Apple and Android smartphones, PC operating systems and smart TVs, he has people throwing fits about how awful the CIA is.

Please. Give me a break.

Wikileaks uncovered nothing really new. Zero. Zilch.

As my fellow Computerworld writer buddy Mike Elgin said, “The Wikileaks/CIA stories simply remind us anything with a camera, microphone or IP address could theoretically be hacked.”

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

How much are vendor security assurances worth after the CIA leaks?

Credit to Author: Lucian Constantin| Date: Mon, 13 Mar 2017 08:40:00 -0700

Following the recent revelations about the U.S. Central Intelligence Agency’s cyberespionage arsenal, software vendors reiterated their commitments to fix vulnerabilities in a timely manner and told users that many of the flaws described in the agency’s leaked documents have been fixed.

While these assurances are understandable from a public relations perspective, they don’t really change anything, especially for companies and users that are the target of state-sponsored hackers. The software they use is not less safe, nor better protected, than it was before WikiLeaks published the 8,700-plus CIA documents last Tuesday.

To read this article in full or to leave a comment, please click here

Read More