OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
New Tech Targets Enterprise Ransomware
November 23, 2015
SentinelOne last week introduced an addition to its behavioral solution designed to address the problem of ransomware scrambling files on a computer. Ransomware has been a scourge not only for consumers, but for the enterprise, too. The malicious software can be particularly nettlesome for enterprises because they have to protect many endpoints -- phones, tablets, laptops, desktops and servers.
FBI, Carnegie Mellon Deny $1M Contract to Crack Tor
November 19, 2015
The FBI has denied allegations that it paid Carnegie Mellon University security researchers $1 million to crack a network designed to protect the anonymity of its users. The Tor Project, which operates the network, last week accused the FBI of cutting the CMU deal. The attack on Tor occurred from January to July 2014. The attackers discovered a way to strip the anonymity of Tor users.
Docker, Yubico Team Up to Secure App Development
November 19, 2015
Docker this week announced new security enhancements at DockerCon EU in Barcelona, Spain, including hardware signing of container images -- an industry first -- through a partnership with Yubico. Docker Content Trust offers hardware signing through support for Yubico's YubiKey. The YubiKey 4 lets Docker users digitally sign code during initial development and through subsequent updates.
Surveys Reveal Lax Mobile Security Among Federal Workers
November 18, 2015
The use of mobile devices provides significant benefits in convenience and workplace productivity. However, two recent reports indicate that U.S. government workers often ignore security protocols associated with mobile IT. The Office of Personnel Management hack revealed earlier this year drove an effort to address federal IT security. That effort largely has bypassed mobile device security.
Paris Attacks Deepen Encryption Debate
November 18, 2015
Encryption once again has come under fire in the wake of last week's terrorist attacks in Paris. Western intelligence agencies reportedly blamed the technology for enabling communications among the attackers, and some officials renewed their calls for technology companies to give them decryption keys. However, the terrorists may have communicated through private messages on the PlayStation 4.
Nadella: Microsoft to Be Stealth Operator for Cloud Security
November 17, 2015
CEO Satya Nadella on Monday made a bid to reintroduce Microsoft to professionals working in a brave new cyberworld of virtual, interconnected computing. Speaking at the Microsoft Government Cloud Forum in Washington, Nadella presented a broad new vision of a cloud- and mobile-first enterprise that promises to make personal and client security a central theme of its business.
Report: Botnets Help Bump Cyberattack Attempts by 20 Percent
November 17, 2015
ThreatMetrix last week reported that it had detected and prevented more than 90 million attempted cyberattacks in real time across industries from July to September. The attempted attacks covered fraudulent online payments, logins and new account registrations, and represented a 20 percent increase over the previous quarter, according to ThreatMetrix Cybercrime Report: Q3 2015.
Gmail to Warn Users of Unencrypted Email
November 16, 2015
Google last week announced that it is developing features for Gmail that will notify them when they get messages through a nonencrypted connection. Regions of the Internet are preventing message encryption by tampering with requests to initiate SSL connections, and malicious DNS servers are publishing fake routing information to email servers looking for Gmail, a study found.
Microsoft Hands Cloud Data Control to German Trustee
November 12, 2015
Microsoft announced it will offer its Azure, Office 365 and Dynamics CRM cloud services to business clients using two Germany-based data centers hosted by a subsidiary of Deutsche Telekom. The arrangement will protect the integrity and privacy of customer data, the company said. The data centers will be under the control of T-Systems, a unit of Deutsche Telekom, which will act as data trustee.
Microsoft to Add Secure Islands to Its Cloud
November 11, 2015
Microsoft on Tuesday announced that it has agreed to purchase data security firm Secure Islands. It will pay between $78 million and $150 million, according to reports, but company spokesperson Joel Sider declined to disclose the terms of the acquisition, which requires regulatory approval. Secure Islands' products will be integrated into the Azure Rights Management Service.
Decryption Tool Foils Linux Server Ransomware Attacks
November 11, 2015
Bitdefender on Monday released a free decryption tool designed to wrest data from the grip of a rare type of ransomware that's been plaguing Linux servers. Details for performing the decryption are available on the company's website. Essentially, the solution takes advantage of a flaw in the ransomware, which Bitdefender discovered through reverse-engineering.
NIST Seeks Review of Email Safety Doc
November 11, 2015
Email systems have become so routine that consumers and workers often regard them as simply part of the furniture. However, the technology is more complex than most users appreciate -- and that complexity makes it vulnerable to cyberthreats. Increased use of email has resulted in a corresponding increase in criminal and nuisance threats, NIST said in a recent advisory on email security.
Deep Learning App Targets Malware
November 10, 2015
Here's the problem with most programs aimed at killing malicious software: They need someone to tell them something's malicious. What if, however, the programs had the smarts to identify bad code on their own? That's what a company called Deep Instinct says its security solution, launched last week, can do. The offering works its magic with a technology called "deep learning."
OpenWorld's Substance Feast
November 4, 2015
For once, Oracle OpenWorld went long on substance. That's hard to do when you have so many products to discuss and Larry Ellison pontificating, but he was both under control and substantive -- though he couldn't resist taking a few shots at competitors. Oracle's team hardly ever sees SAP and IBM in deals these days, he announced, and he gave due praise to cloud pioneers NetSuite and Salesforce.
Mobile Malware's Growth Slows, Nastiness Grows
November 4, 2015
The good news about mobile malware in 2015 is that growth has slowed down. The bad news is that the malware entering the market is more virulent than ever. While there hasn't been a sharp rise in the volume of mobile malware this year, the increasingly malicious nature of the types of malware and attacks is alarming, Blue Coat Systems said last week in its 2015 Mobile Malware Report.
NIST Seeks Business Partners to Boost Email Security
November 3, 2015
The controversy over the management of email systems by former Secretary of State Hillary Clinton has been in the spotlight since March. More recently, the CIA director acknowledged that his personal email had been hacked. Both situations highlight the vulnerability of email. That's why NIST has launched an initiative to help both public and private organizations improve email security.
CISA Passes Senate Despite Privacy Advocates' Fear and Loathing
October 28, 2015
The U.S. Senate on Tuesday voted 74-21 to pass the Cybersecurity Information Sharing Act, or CISA, in the face of strong opposition from legal and cybersecurity experts, the high-tech industry, privacy and civil liberties organizations, and members of the public. The Act calls for several federal agencies to share cyberthreat indicators between the public and private sectors.
TalkTalk Attacked, Hit With Ransom Demand
October 23, 2015
TalkTalk on Thursday announced that it received a ransom demand following a cyberattack that may have compromised the credit card and bank details of millions of customers. "TalkTalk constantly updates its systems to make sure they are as secure as possible against the rapidly evolving threat of cybercrime, impacting an increasing number of individuals and organizations," CEO Dido Harding said.
Healthcare Sector Security Woefully Weak, Survey Says
October 21, 2015
The healthcare industry has become the favorite playground for many cybercriminals, suggests a report Trustwave released earlier this month. Of the 398 full-time healthcare professionals surveyed, 91 percent of information technology respondents and 77 percent of nontechnical respondents believed criminals increasingly were targeting healthcare organizations.
EU Court Decision Threatens US Cloud Dominance
October 16, 2015
Edward Snowden's legacy gained another chapter last week when the European Court of Justice rejected an agreement that created a Safe Harbor for U.S. companies handling personal data of overseas citizens. In essence, the agreement provided that a U.S. company's word that it had adequate privacy safeguards in place was all that was needed to permit overseas personal data transfers.
HP, 3M to Shield Laptop Screens From Visual Hacking
October 15, 2015
HP and 3M are collaborating on privacy screens to protect notebook PCs from visual hacking. "3M is developing an innovative light-enhancement film that can be incorporated into a system that enables light to be directed to other viewers when you want information sharing, and away from onlookers when you need private viewing," 3M spokesperson Jessica Walton said.
E-Commerce Firms Need to Wise Up to Cybercrime
October 15, 2015
Every business owner and executive must think long and hard about cybersecurity -- especially considering all the break-ins and data thefts during the last several years. Data breaches and security issues are in the headlines on a regular basis. One good source for getting a grip on some possible solutions to the problem is AT&T's new report, "What Every CEO Needs to Know About Cybersecurity."
User Info Safe After LoopPay Attack, Says Samsung
October 9, 2015
Samsung has assured users that their information is safe following a computer intrusion of a key company linked to its mobile payment system. The intrusion may have occurred as early as March. Samsung purchased LoopPay for $250 million in February. Its technology allows mobile phones to perform payment card transactions with older POS terminals that recognize only cards with magnetic strips.
Amazon Casts Its Net on the Internet of Things
October 9, 2015
Amazon on Thursday leapt into the Internet of Things market with the announcement of its AWS IoT platform. AWS IoT lets devices -- ranging from cars and turbines to sensor grids and light bulbs -- connect to services from Amazon Web Services. That in turn allows companies to store, process, analyze and act on the mountains of data generated by connected devices.
DDoS Attacks Create Smokescreens for Larceny
October 7, 2015
DDoS attacks have evolved from protest tool to criminal weapon. More than one in three DDoS attacks are used to plant malware or a virus on company systems, and 40 percent of them result in data theft, according to NeuStar's semiannual DDoS attack and protection report. "Until two years ago, DDoS attacks were really seen as just a disruption and annoyance tool," said NeuStar's Joe Loveless.
Federal Cybersecurity Performance Gets Mixed Reviews
October 6, 2015
The spectacular database breach that affected nearly 21 million people highlighted the continuing vulnerability of U.S. government information technology systems, despite the expenditure of billions each year on cybersecurity. The breach resulted in the departure of the head of the agency and triggered widespread questioning about the adequacy of federal IT security by members of Congress.
The Sluggish Crawl to Chip-Secured Shopping
October 5, 2015
For retailers that do not yet accept EMV cards -- credit and debit cards with chips embedded in them -- a spine-tingling deadline arrived last week. Liability for any payment fraud that results from acceptance of old-school plastic shifted to them. The magnetic chips in EMV cards will reduce in-store payment fraud, which affected 62 percent of companies, according to a recent survey.
XOR Trojan Threatens Linux Networks
October 2, 2015
Researchers for the Security Intelligence Response Team at Akamai on Tuesday issued a high-risk threat advisory for XOR DDoS proliferation. The XOR DDoS Trojan is used to hijack Linux servers to build a botnet for distributed denial-of-service attacks with SYN and DNS floods, researchers tracking the malware said. The massive Linux-based botnet can take down websites under a flood of DDoS traffic.
Microsoft Pushes Deeper Into Linux, Containers, IoT
October 1, 2015
Microsoft announced a slew of corporate cloud solutions at Tuesday's AzureCon. "The value for IoT is in control, data collection and analysis, and Microsoft is apparently building a cloud service that can do all three, and wrapping it with enterprise-level security," said Rob Enderle, principal analyst at the Enderle Group. Microsoft also announced a new open Azure Container Service.
Black Hats Offer Million-Dollar iOS 9 Bug Bounty
September 30, 2015
Zerodium has posted a million-dollar bounty for juicy iOS 9 bugs or jailbreaks. Zerodium runs a market where exploits and vulnerabilities are bought and sold, according to Damballa. "While there is no insight into a specific buyer, we can assume if an exploit for iOS 9 is found, Zerodium will sell it for way more than $1 million," wrote Loucif Kharouni, senior threat researcher at Damballa.
See More Articles in Enterprise Security Section >>
Facebook Twitter LinkedIn Google+ RSS
I plan to do my holiday shopping…
Online only -- I like the convenience and comfort.
Online only -- I'd shop in stores if their stock weren't so limited.
At brick-and-mortar stores only -- I like to see what I'm getting.
At brick-and-mortar stores only -- I enjoy the holiday shopping atmosphere.
At brick-and-mortar stores only -- I want to support local merchants.
Online and in stores -- I want the best of both worlds.
I'm not planning on doing any holiday shopping.