Cybersecurity

Sponsored
by

Cybersecurity / Most Viewed

Leveraging DNS for Subscriber Loyalty

There has been a lot of talk about how the DNS can provide network-based security, and how DNS is in the best position to detect malware traffic before it does any harm. But what does this mean for end users? How does it make their online lives easier and more secure? DNS servers that are aware of sites that host malware, perform phishing activities (harvesting bank details, for instance) and other nefarious misbehaviors, can prevent end users from ever going to those sites. more

Global Law Enforcement Strikes Major Blow Against LockBit Ransomware Operation

In a significant global operation, law enforcement agencies from 10 countries have severely disrupted the LockBit ransomware group, recognized as the most prolific and harmful cyber threat worldwide. more

Repeat DDoS Attacks the Norm in Q4 2015, 24 Attacks per Target on Average

During Q4, repeat DDoS attacks were the norm, with an average of 24 attacks per targeted customer in Q4, reports Akamai in its newly released Q4 2015 State of the Internet - Security Report. more

Making Voting Easy is Scaring the Life Out of Security Experts

Apollo 11 was the spaceflight which landed the first two humans on the Moon. Commander Neil Armstrong and lunar module pilot Buzz Aldrin landed the Apollo Lunar Module, Eagle, on July 20, 1969. Armstrong became the first person to step onto the lunar surface six hours later, and Aldrin joined him 19 minutes later. The two astronauts spent about two and a quarter hours outside the spacecraft, and they collected 47.5 pounds of lunar material to bring back. more

Report on Possibly the Largest Data Breach Ever

Amidst all the recent reports of data breaches, Gunter Ollmann of IBM Internet Security Systems, has reported today about one particular case which may be the largest data breach to date. Ollmann wirtes: "The media has been full of analysis concerning data breaches over the last couple of weeks, mostly related to the uptick in 2008 reports. While much of this increase can be accounted for by the wider adoption of state legislation that mandates companies to publicly disclose their data breaches, I think it is worth pointing out today's latest disclosure -- which is quite probably the largest breach ever." more

UK Announces $28M Fund for Army Cyber Operations Centers

The UK Ministry of Defence has announced a £22m ($28 million) fund for the development of British Army cyber operations centers across the country. more

Russia Is Studying China’s Legislative Experience in Fighting Internet Corruption, Cyber-Terrorism

Russian State Duma deputy, chairman of the Committee on Security and Corruption Control Vasily Piskarev told Russian reporters on Tuesday that Russia is studying China's legislative experience in dealing with corruption, cyber-terrorism and cross-border crime on the Internet. more

Paris Cyber Agreement Has Grown to More Than 450 Signatories

The "Paris Call for Trust and Security in Cyberspace," announced by French President at the Paris Peace Forum on November 13, has attracted more than 450 signatories. more

U.S. Navy Investigating Possibility of Cyberattack Behind Two Navy Destroyer Collisions

Deputy chief of naval operations for information warfare, Vice Adm. Jan Tigh, says the military is investigating the possibility of compromised computer systems behind two U.S. Navy destroyer collisions with merchant vessels that occurred in recent months. more

Japan’s Cybersecurity Minister Admits He Does Not Use Computers and Not Familiar With Cybersecurity

Japan's cybersecurity minister, Yoshitaka Sakurada, 68, who recently stated he doesn't use a computer, also admitted on Thursday to a parliamentary committee that he's not very familiar with the whole cybersecurity field. more

Experienced a Breach? Here Are Four Tips for Incident Response

The threat level has never been higher for organizations charged with protecting valuable data. In fact, as recent headlines will attest, no company or agency is completely immune to targeted attacks by persistent, skilled adversaries. The unprecedented success of these attacks against large and well-equipped organizations around the world has led many security executives to question the efficacy of traditional layered defenses as their primary protection against targeted attacks. more

KRACK Attack Can Affect All Modern WiFi Networks, Researchers Have Disclosed

Security researchers Mathy Vanhoef and Frank Piessens have detected a major vulnerability in the WPA2 protocol that secures all protected Wi-Fi networks. more

Internet Society Issues Statement on Developing Cyber Security Policy Initiatives

The Internet Society has released an announcement setting out its views on the development of policy to address the balance between security and privacy. From an Internet perspective and in the context of the growing threat vector from hacking, targeted cyber attacks on networks and individuals, and surveillance, the Internet Society's approach to the development of cyber security policy initiatives is based on the following key considerations. more

Arbor Networks: Internet Architecture and Operations Facing Perfect Storm

According to the latest Infrastructure Security Report by Arbor Netowrks, the Internet architecture and operations is about to face a perfect storm with the convergence of issues including IPv4 to IPv6 migration, implementation of DNS Security Extensions (DNSSEC) and to 4-byte ASNs (used for inter-domain routing on the Internet). "Any one of these changes alone would constitute a significant architectural and operational challenge for network operators; considered together, they represent the greatest and potentially most disruptive set of circumstances in the history of the Internet, given its growth in importance to worldwide communications and commerce," says the report.
 more

Biden Administration Probes Chinese Telecom Firms Over U.S. Data Security Concerns

The Biden administration is investigating China Mobile, China Telecom, and China Unicom over concerns that these companies could potentially exploit their access to U.S. data through their cloud and internet services, potentially sharing this data with the Chinese government. more