Get the Tech News Flash Newsletter from TechNewsWorld » View Sample | Subscribe
Welcome Guest | Sign In
ECommerceTimes.com
The Trials and Tribulations of Paying Ransomware Hackers
October 23, 2020
There's no question that hackers are getting increasingly ambitious -- the average ransom demand increased from about $29,000 in 2018 to more than $302,000 in 2019. U.S. law doesn't prohibit paying ransom per se; but when victims pay monies to people or organizations who have been sanctioned by the U.S. government...they get into more trouble.
Microsoft Squelches Trickbot Ransomware Network
October 13, 2020
An outlaw online network that's been used to infect millions of computers with ransomware has been disrupted by Microsoft. The company announced Monday that, together with telecommunications providers around the world, it was able to cut off the infrastructure used by the Trickbot botnet so it could no longer be used to initiate new infections or activate ransomware already planted on computer systems.
The Risks and Consequences of Lax Patch Management
September 29, 2020
Earlier this month, a woman with a life-threatening condition passed away after hackers crashed the IT systems of a major hospital in the city of Dusseldorf. Incidents like this raise the question of why corporations do not patch vulnerabilities as soon as software manufacturers issue a fix.
Cybersecurity Conundrum: Who's Responsible for Securing IoT Networks?
September 24, 2020
Surely spurred by the work-from-home necessities of 2020, people have connected a multitude of non-business devices to their corporate networks, making it progressively difficult to implement cybersecurity because every device is a potential weak point. So, who will ultimately be responsible for cybersecurity of an IoT network?
Tech Job Market Hot for the Near Future
September 15, 2020
Computer systems design and related services added 13,000 jobs, according to the U.S. Department of Labor's August jobs report. IT employment in July was up by more than 203,000 positions since the COVID-19 outbreak; and there were more than 235,000 job postings by U.S. employers, according to the Computing Technology Industry Association.
TikTok Enlists Oracle to Evade Trump's Executive Order
September 14, 2020
A proposal to avoid the banning of the popular social media app TikTok was submitted to the U.S. Treasury Department over the weekend. The plan submitted by ByteDance, which owns TikTok, calls for the company to enlist Oracle as a "trusted technology provider" in order to address national security concerns raised about the video-sharing software by the Trump administration.
How to Protect Data From Natural Disasters
August 19, 2020
With hurricane season in full bloom and the additional prospect of natural disasters, the importance for companies to have disaster data plans in place is paramount. TechNewsWorld discussed disaster preparedness with a panel of IT experts. Check out their recommendations -- and make sure that you have not forgotten that one key thing that many companies forget to protect but regret afterward.
5G Rollout Includes Challenges to Supply Chain, WFH Value
August 13, 2020
The growing work-from-home movement amid the coronavirus and its likely continuing challenges has created the need for additional broadband capacity in more places. Mobile telco and other service providers are rallying around 5G wireless as the most promising solution for reliably faster Internet connectivity. But the path to rolling out 5G has been rocky and spotty.
Digital Sales Boom Puts Spotlight on Fraud Control Systems
July 30, 2020
The move by retailers to online and mobile selling to survive the pandemic has resulted in a significant increase in digital fraud activity. The "2020 True Cost of Fraud Study: E-commerce/Retail Edition" by LexisNexis Risk Solutions found this to be partly because some fraud control systems are outdated, and partly because of increased transaction volume.
New Security Hole Puts Windows and Linux Users at Risk
July 29, 2020
If you are a Windows or Linux user, brace yourself for a long siege of vulnerability nightmares. The fix will be long and treacherous and could brick your computers. Eclypsium researchers have detailed a set of newly discovered vulnerabilities dubbed "BootHole" that opens up billions of Windows and Linux devices to attacks.
Garmin Confirms Services Upended by Ransomware Attack
July 28, 2020
Garmin on Monday confirmed that many of its online services have been disrupted by a cyberattack on its systems that occurred on July 23, 2020. Services disrupted by the attack, which encrypted data on the systems, included website functions, customer support, customer facing applications, and company communications.
New DoD Security Regulations Have Ramifications for IT Contractors
July 7, 2020
With billions of dollars of federal contracts at stake, information technology providers are being swept up in the tide of a new U.S. Department of Defense information security requirement that will become mandatory for IT providers and other companies doing business with DoD. While IT companies already incorporate data protection elements in the products and services they provide to DoD, the department is raising the bar on the way vendors should handle information security.
Twitter's Security Blunder: More Dangerous Than You Think
June 29, 2020
Twitter had a data security problem last week that might sound trivial. Email addresses, phone numbers, and the last four digits of the credit cards used to buy ads on Twitter were left in browser cache after the transaction, and that cache was not secured. This may seem trivial, but the consequences could be far more significant than you might think. Let's explore how.
Open Source Security Issues Exist: Deal With Them, Report Urges
June 25, 2020
Open Source Software is becoming much more commonplace within organizations, bringing a different set of risks and perceived challenges compared to closed source or proprietary software. The Information Security Forum has released a report to help security professionals recognize the benefits and perceived challenges of using Open Source Software.
Intel Says 'Tiger Lake' Will Drown Control-Flow Malware
June 16, 2020
The next generation of Intel mobile processors will include malware protection built into the chip. The protection, provided by Intel's Control-Flow Enforcement Technology, will first be available in the company's "Tiger Lake" mobile processors. CET is designed to protect against the misuse of legitimate code through control-flow hijacking attacks, which is widely used in large classes of malware.
New Flaws in Intel's CPU Software Guard Extensions Revealed
June 11, 2020
Two separate teams of academic researchers have published papers describing flaws in Intel's Software Guard Extensions. SGX enhances application security by letting developers partition sensitive information into enclaves with hardware-assisted enhanced security protection. The aim is to protect application code and data from disclosure or modification.
'New Normal' Security Era Begins for US Agencies, Cloud Providers
June 4, 2020
U.S. government agencies and cloud technology providers are heading toward a reset in how they cooperate on cybersecurity challenges. The expected growth of cloud use will create a more complex federal security landscape, according to a report from Thales. Federal agencies actually have moved ahead of businesses in cloud adoption, with 54 percent of agency data already embedded in the cloud.
Abandoned Open Source Code Heightens Commercial Software Security Risks
May 13, 2020
Outdated or abandoned open source components are persistent in practically all commercial software, putting enterprise and consumer applications at risk from security issues, license compliance violations, and operational threats, concludes the Synopsys 2020 Open Source Security and Risk Analysis Report. The report highlights trends and patterns in open source usage within commercial applications.
Thunderbolt Flaw Opens Door for 'Evil Maid' Attack
May 12, 2020
A Dutch researcher has revealed a novel way to crack into a PC through a Thunderbolt port. The method, dubbed "Thunderspy" by researcher Björn Ruytenberg, sidesteps the login screen of a sleeping computer, as well as its hard disk encryption, to access all its data. "Thunderspy is stealth, meaning that you cannot find any traces of the attack. It does not require your involvement," he explained.
Information Security: New Rules
May 8, 2020
Warren Buffet once said, "Only when the tide goes out do you discover who's been swimming naked." You can cover over a host of sins when times are good, but bad or unsafe practices will be exposed when times are rough. Time and experience have borne out the accuracy of this witticism in the financial arena -- and we're now seeing its applicability to the intersection of infosec and COVID-19.
How to Stay Safe on the Internet, Part 3: Drive the Black Hatters Mad
May 1, 2020
Like conventional criminals, criminal hackers choose easy, lucrative targets. One group in the crosshairs is made up of companies that have data on millions of users, such as private sector entities with a Web presence. Why go after one user at a time when data is collected in one place? Criminal hackers also like to hunt small organizations that have modest capital but weak information security.
Study Reveals E-Commerce Shopping Patterns That Hint at New Normal
April 28, 2020
Consumers and companies worldwide have ramped up online ordering for software products and digital goods as they struggle to improve productivity and security while working remotely and spending more time at home. The sharp spike in online commerce aligns with the timing of the current global pandemic. Software-based offerings accounted for the highest levels of growth.
Ubuntu 'Focal Fossa' Homes In on Enterprise Security
April 23, 2020
Canonical, the parent company of Ubuntu, has announced the general availability of Ubuntu 20.04 LTS, codenamed "Focal Fossa." This major upgrade places particular emphasis on security and performance. Released once every two years, the new long-term support version provides a platform for enterprise IT infrastructures and workloads across all sectors for five years.
Zoom Boosts Security With Pick-Your-Route Feature
April 15, 2020
Zoom's paying customers will be able to choose the region they want to use for their virtual meetings. Paying customers will be able to opt in or out of a specific data center region, although they won't be able to change their default, which for most customers is the United States. Zoom has data centers in the U.S., Canada, Europe, India, Australia, China, Latin America, and Japan/Hong Kong.
The Pandemic's Toll on Privacy Laws
April 6, 2020
Life as we knew it before the coronavirus is gone forever, and many changes will manifest in the pandemic's aftermath. How will it impact privacy laws around the globe? No one knows for sure, and we will not know until after the coronavirus is behind us. Cybercriminals long have been taking advantage of the Internet, and now the spread of COVID-19 has sped up their evil work.
Risk Assessment: Buttress Account Security and Foil Fraudsters
March 30, 2020
Under ordinary circumstances, the average consumer can order a latte on the way to the coffee shop, book a last-minute trip to the coast, and come home to find groceries delivered -- all with the click of a button. What makes these transactions so smooth and effortless? It starts with account creation. Consumers increasingly are willing to create accounts with sites they interact with regularly.
The Tech Industry's Tectonic Shift
March 27, 2020
As COVID-19 continues to spread, states and cities across the U.S. have imposed restrictions -- from banning large gatherings to lockdowns, with citizens ordered to stay home except for essential jobs and errands, or get outdoor exercise. These steps came as infection numbers mounted, and the World Health Organization stated that COVID-19 was in fact a global pandemic.
COVID-19 and Computer Security, Part 2: Shoring Up Systems for Remote Workers
March 19, 2020
As companies send employees home in an effort to curb the spread of COVID-19, cybersecurity experts are warning that telecommuting could be putting company assets and data at risk. There are a number of precautions that employees working from home should consider to ensure that sensitive data isn't compromised by cybercriminals taking advantage of the health crisis.
Microsoft Leaves Necurs Botnet in Shambles
March 13, 2020
Microsoft and partners have disrupted the Necurs botnet group blamed for infecting more than 9 million computers globally. There are 11 botnets under the Necurs umbrella, all apparently controlled by a single group, according to Valter Santos, security researcher at Bitsight, which worked with Microsoft on the takedown. Four of those botnets account for about 95 percent of all infections.
Report: Open Source Vulnerabilities Rampant in Popular Projects
March 12, 2020
Open source vulnerabilities rose by nearly 50 percent in 2019 over the previous year, based on a new report. Common vulnerabilities rated as high or critical severity were found in all of the most popular open source projects, according to the WhiteSource 2020 annual report, "The State of Open Source Security Vulnerabilities." The vulnerability rate is expected to continue rising.
See More Articles in Enterprise Security Section >>
Forrester names NICE inContact CXone a leader in cloud contact center software
Which of these technology gifts would you most like to receive?
Portable Power Charger
Remote Video Monitoring System
Smart Speaker
Smart Thermostat
Smart Watch
Streaming TV Player
Video Doorbell
VR Gaming Headset
WiFi Signal Booster
Wireless Earbuds / Headphones
Women in Tech
Forrester names NICE inContact CXone a leader in cloud contact center software