Entries by infosechotspot

US to head off laptop ban on international flights with revised security requirements

Original Article Here

Original Article HereOn Wednesday, the US Department of Homeland Security announced new security measures for foreign flights to the US that could end the ban on passengers from certain countries using laptops in flight, Reuters reported. In March, the US banned in-cabin laptop use on flights to the US from 10 airports in eight countries: […]

FedEx's TNT Express deliveries disrupted by virus attack

Original Article Here

Original Article HereImage: TNT Express FedEx’s delivery subsidiary TNT Express has warned that its systems have been significantly affected by a computer virus. The company said in a note on its website: “Like many other companies and institutions around the world, we are experiencing interference with some of our systems within the TNT network,” which […]

Not enough fiber to grow the internet for 5G, says consultant

Original Article Here

Original Article HereTreatment will be brought to the patients and patient data will be centralized, “turning hospitals into data centers,” a telco equipment maker says in a recent report. Ericsson, in its 2017 Mobility report (PDF), published this month, says patient treatment will, in the future, no longer be performed in hospitals located far from […]

Microsoft aims to simplify Windows 10 PC set-up with Windows Autopilot

Original Article Here

Original Article HereMicrosoft has developed a new set of cloud-powered technologies aimed at simplifying the set-up of new PCs that it’s calling Windows AutoPilot. Credit: Microsoft Windows AutoPilot and a new Windows AutoPilot Deployment Program, both announced on June 29, are Microsoft’s latest attempts to improve the provisioning and deployment experience around Windows 10.. (Microsoft […]

AMD unveils Ryzen Pro, enterprise processors with a security focus

Original Article Here

Original Article HereAMD AMD has revealed the Ryzen Pro processor range with an eye on enterprise users looking for better security built from the ground up. On Thursday, Sunnyvale, Calif.-based semiconductor company said the new addition to the firm’s enterprise CPU portfolio is a family of desktop processors, designed to “meet the demands of today’s […]

French general accused of nicking fast jet for weekend trips to the Sun

Original Article Here

Original Article HereDefence ministry announces full inquiry A French general stands accused of using military fast jets for weekend commutes to his country pile in Provence on the country’s sunny south coast. French Army minister Florence Parly has ordered an investigation, following the allegations about General Richard Reboul’s travel arrangements by investigative and satirical (think […]

How to make a strong password

Original Article Here

Original Article Here <link rel=”stylesheet” type=”text/css” href=”https://www.welivesecurity.com/public/embed.css”> <div class=”wls-embed-code”><div class=”wls-embed-code-content”> </div> <h3><a class=”wls-article” href=”https://www.welivesecurity.com/videos/make-strong-password/”>How to make a strong password</a></h3><a class=”wls-link” href=”https://www.welivesecurity.com” target=”_blank” >BY WELIVESECURITY.COM – security news, views and insight from ESET experts</a></div>

Who was to blame for what looked like a DDoS attack on the AA? That would be … the AA

Original Article Here

Original Article Here by Lisa Vaas From lost keys to dead batteries, UK car insurance giant the AA says it’s “here for everyone”. Except, that is, when it stalls its servers with a self-inflicted distributed denial of service (DDoS) attack. As The Register reports, on Monday, the AA accidentally sent out a “password update” email […]

Windows 10 snooping: Microsoft has halved data it collects from PCs says watchdog

Original Article Here

Original Article HereMicrosoft has scaled back the volume of data it collects from Windows 10 PCs by ‘almost half’, leading French authorities to drop their threat of a fine. The French regulator CNIL today announced that Windows 10 is no longer in breach of the country’s data protection laws, following changes to how the OS […]

Petya ransomware outbreak shows hackers are getting smarter—but the rest of the world is not – The Daily Dot

Original Article Here

Original Article HereLess than two months after the WannaCry outbreak, the world is faced with another ransomware crisis, this one codenamed Petya. While in the first hours of the outbreak, Ukraine services and networks were the main victims, the virus quickly spread to other countries and areas, including France, Britain, Denmark, and the United States. […]

NHS WannaCrypt postmortem: Outbreak blamed on lack of accountability

Original Article Here

Original Article HerePlus systemic underspending in IT. Imagine that A lack of accountability and investment in cyber-security has been blamed for the recent WannaCrypt virus that hobbled multiple hospital NHS IT systems last month, a report by The Chartered Institute for IT concludes. The report, published today, comes following a similar, but more limited attack […]

How a tiny LA cybersecurity firm pulled the plug on a global ransomware attack – Los Angeles Times

Original Article Here

Original Article Here Salim Neino had been waiting for something like WannaCry. Fast, indiscriminate and disruptive, the computer infection locked up computers in British hospitals and was spreading across the world when Neino’s company Kryptos Logic stepped into the ring. One of his researchers found a so-called kill switch in the WannaCry code and pounced. […]

Deep Root Analytics Is in Deep Trouble With Voter Data Breach

Original Article Here

Original Article Here Cybersecurity experts speculate that in our current state, up to 70% of cyber attacks, including breaches, go undetected in a given year. Part of identifying and stopping breaches is knowing what kind of information cybercriminals are after, and election season creates hotbeds of public information that are prime targets for a breach. […]

Community Led Threat Prevention

Original Article Here

Original Article Here Community based threat detection and prevention has been a fundamental principle in Anti-Virus and Intrusion Detection Systems for years.  Pooling the information and experience of multiple organisations to rapidly identify emerging threats, this collaborative approach enables security companies to quickly create a patch and disseminate it globally to minimise a hacker’s opportunity […]

New report from CREST highlights the need to improve cyber security in Industrial Control Systems

Original Article Here

Original Article Here There is a pressing need to improve cyber security in Industrial Control System (ICS) environments to avoid future breaches that could impact critical national infrastructure concludes CREST, the not-for-profit accreditation body representing the technical information security industry, in its latest position paper, ‘Industrial Control Systems: Technical Security Assurance’.  The report highlights a […]

AI startup wants to create avatars of your favourite stars – CNET

Original Article Here

Original Article Here YG Entertainment In the future, Daniel Radcliffe, Gal Gadot or whoever your favourite celebrity is could live inside your phone and other smart devices. At least, one company hopes so. Artificial intelligence startup Oben has partnered with South Korean talent agency SM Entertainment to launch AI Stars. AI Stars will see avatars […]

Information Stealer Found Hitting Israeli Hospitals

Original Article Here

Original Article Here The abuse of shortcut (LNK) files is steadily gaining traction among cybercriminals. We’ve seen a plethora of threats that leverage malicious LNK files: from well-known ransomware families, backdoors typically deployed in targeted attacks, and banking Trojans to spam emails, even an exploit to a LNK vulnerability itself. These threats are usually exacerbated […]

Smashing Security #031: Petya (don&#039;t know the name of this ransomware)

Original Article Here

Original Article Here Another major ransomware outbreak rattles the world – but no-one can decide what it’s called, the danger posed to driverless cars by kangaroos, and do you really want an Amazon Echo Show? All this and more is discussed in the latest edition of the “Smashing Security” podcast by computer security veterans Graham […]

Azure blues: Active Directory Connect has password reset vuln

Original Article Here

Original Article HereAttackers can dive out of the cloud to pwn admin passwords Microsoft is warning sysadmins to check their Azure Active Directory Connect configurations and implement a patch against a credential-handling vulnerability. The bug’s in an Active Directory (AD) feature called password writeback. Azure AD can be configured to copy user passwords back to […]

NBlog June 29 – more than 5 years of ransomwareness

Original Article Here

Original Article HereWe are in the final stages of preparing July’s NoticeBored awareness materials on “Workplace information security”.  Six cool new poster designs have come in from the art department so the staff/general employee stream is practically finished, aside from proofreading. We’re working hard to complete the management and professional briefings and tying up a couple […]

Fileless malware: The smart person&#039;s guide

Original Article Here

Original Article HereTypical malware detection software functions based on signature detection or identifiable pieces of code that are unique to a particular type of infection. Other malware, such as ransomware, doesn’t always leave a trace per se; however, through heuristics scanning, the behaviors specific to ransomware may be detected and halted, allowing users to take […]

Petya ransomware scam: Lost files can&#039;t be restored

Original Article Here

Original Article Here Although the Petya-like malware appeared to be ransomware, researchers have found that the attack does not allow for the restoration of affected systems. Matt Suiche, founder of Comae Technologies, and Kaspersky Lab independently discovered that the global attacks asking for ransom were nothing but a ransomware scam. Kaspersky Lab said that the […]

Motive behind NotPetya a mystery, as researchers ponder possible Russian involvement

Original Article Here

Original Article Here Symantec Corporation on Wednesday released a chart of the 20 countries most affected by Petya. Ukraine was the most significantly impacted, with close to 140 organizations infected. The motive behind Tuesday’s ransomware attack that sowed chaos in Ukraine and around the world has emerged as a key mystery, even as analysts continue […]

$71 Million Restitution Owed for Hacking, Fraud Scheme

Original Article Here

Original Article Here Convicted money launderer Muhammad Sohail Qasmani is sentenced to 4 years in prison, and will share the hefty payout with other co-conspirators convicted in the conspiracy. Pakistani citizen Muhammad Sohail Qasmani has been sentenced to 48 months in prison for laundering $19.6 million on behalf of other actors in an international computer […]

Linux malware gaining favor among cybercriminals

Original Article Here

Original Article Here Linux Linux malware is becoming a more important tool for cybercriminals as these individuals focus a greater portion of their attention on attacking IoT devices running the open-source operating system. WatchGuard’s Internet Security Report Q1 2017 found malware targeting Linux now comprises 36 percent of all malware spotted by WatchGuard with three […]

ExPetr targets serious business

Original Article Here

Original Article HereWe’re witnessing an outbreak of a new breed of cryptomalware. Our experts have named it ExPetr (others call it Petya, PetrWrap, and some other names). The key difference with this new ransomware is that this time, criminals have chosen their targets with greater precision: Most of the victims are businesses, not consumers. The […]

Local government&#039;s cloud move cuts headaches, adds control

Original Article Here

Original Article Here Local government’s cloud move cuts headaches, adds control By Stephanie Kanowitz Jun 28, 2017 Nebraska’s Douglas-Omaha Technology Commission (DOTComm) has improved operations and scalability for the Douglas County Board of Equalization by moving its outdated Java-based web application to the cloud. Among the board’s responsibilities is handling residents’ protests on the assessments […]

How agencies nurture digital transformation

Original Article Here

Original Article Here How agencies nurture digital transformation By Sara Friedman Jun 28, 2017 Even with increasingly tight budgets, agencies are finding ways to spur digital innovation, according to former and current federal officials who shared their insights on creative ways to move digital transformation forward at a recent Washington event. The Department of Agriculture’s […]

‘Little Hope’ to Recover Data Lost to Petya Ransomware

Original Article Here

Original Article HereJoin Kaspersky Lab and Comae Technologies Thursday June 29, 2017 at 10 a.m. Eastern time for a webinar “The Inside Story of the Petya/ExPetr Ransomware.” Click here to attend. Fewer than 50 ExPetr/Petya ransomware victims have paid approximately $10,200 in Bitcoin so far in the hopes of unlocking encrypted hardware and recovering scrambled […]

Microsoft Issues ‘Important’ Security Fix for Azure AD Connect

Original Article Here

Original Article HereMicrosoft is warning customers of a bug in its Azure Active Directory Connect product that could allow an adversary to escalate privileges and reset passwords and gain unauthorized access to user accounts. The advisory (4033453) was issued Tuesday via Microsoft’s TechNet website for the vulnerability which it rated “important.” The advisory includes ways […]

Biz Blog | LexisNexis®

Original Article Here

Original Article Here Reputation management, one of the major branches of modern public relations, is at its most important when a crisis strikes. If a brand you’re representing comes into bad press, your efforts to burnish the company’s image will face a major test. There are really two kinds of actions that will… Read More […]

RSS

Original Article Here

Original Article Here Newsletters Stay up to date on the latest CSO Online news Top Authors About RSS Feeds Keep up to date effortlessly on the latest technology news, reviews and analyses using our RSS feeds. You can use an RSS newsreader like Feedly, Flipboard or Pulse to get all our latest headlines, or just […]

From floppy disks to deep freeze: what’s the best way to store data?

Original Article Here

Original Article Here by Bill Camarda A key aspect of security is maintaining reliable access to the data you thought you owned. That’s our excuse for sharing NPR’s sweet story about the XFR Collective, a New York-based team of volunteer archivists and preservationists working to transfer old VHS videotapes into digital formats. It’s also our […]

The Ransomware called NotPetya – Cyber Experts have their say

Original Article Here

Original Article Here Tuesday’s global cyber attack caused havoc and disruption to all manners of businesses. Many within the cyber industry are debating whether the ransomware used was actually a strain of Petya or was it something completely new. With it first being detected in Ukraine, where companies updating a mechanism within an accounting program that […]

New Petya Distribution Vectors Bubbling to Surface

Original Article Here

Original Article HereJoin Kaspersky Lab and Comae Technologies Thursday June 29, 2017 at 10 a.m. Eastern time for a webinar “The Inside Story of the Petya/ExPetr Ransomware.” Click here to attend. While Microsoft and others continue to shore up links between yesterday’s global ransomware outbreak and the update mechanism for Ukrainian financial software provider MEDoc, […]

5 Takeaways for IT Pros from Dell EMC Canadian Customer Summit

Original Article Here

Original Article Here Dell EMC held its Canadian Customer Summit on Tuesday in Toronto, bringing together senior leadership across security, product innovation, and sales and marketing, to discuss digital transformation and how Dell EMC sees its own products and partners helping customers through the journey. In addition to catching many of the sessions, IT Pro […]