Cybersecurity |
Sponsored by |
A long time ago, I worked in a secure facility. I won't disclose the facility; I'm certain it no longer exists, and the people who designed the system I'm about to describe are probably long retired. Soon after being transferred into this organization, someone noted I needed to be trained on how to change the cipher door locks. We gathered up a ladder, placed the ladder just outside the door to the secure facility, popped open one of the tiles on the drop ceiling, and opened a small metal box with a standard, low-security key. more
Intel plans to buy security company McAfee for $7.68 billion -- the biggest acquisition in its 42-year history. The chipmaker said Thursday it has entered into a definitive agreement to buy all of McAfee's common stock at $48 per share in cash. McAfee's stock closed Wednesday at $29.93, making Intel's offer a 60 percent premium. The boards of both companies have approved the deal. more
The U.S. has introduced a new visa restriction policy targeting individuals implicated in the misuse of commercial spyware. Secretary of State Antony Blinken announced that these restrictions would apply to those involved in, facilitating, or benefiting from the abuse of such technology. more
CENTR, the association which represents European country code top-level domain name registries (ccTLDs), such as .de for Germany or .no for Norway, has provided feedback to the United Nations' initiative on a Global Digital Compact (GDC). The GDC seeks to "outline shared principles for an open, free and secure digital future for all", and invites multistakeholder participation in the consultation phase. more
Only 39 percent of computers scanned in February were infected with malware, compared to 50 percent last month, according to recent data gathered by Panda Security. Trojans were found to be the most prolific malware threat, responsible for 61 percent of all cases, followed by traditional viruses and worms which caused 11.59 percent and 9 percent of cases worldwide, respectively. more
C-SPAN interviews professor Gene Spafford from Purdue University on the topic of cybersecurity and how the current Internet is a conduit for all types of "cybercrime". He also talks about the much discussed article "A New Internet?" by John Markoff in the February 14, 2009, New York Times in which he was quoted. The piece argued for a new type of Internet that is more secure with the trade-off of users giving up more of their anonymity. Professor Spafford talks about alternative solutions and he responded to questions via telephone calls and email. more
A total of 3.2 million debit cards across 19 banks may have been compromised as a result of a suspected malware attack. The breach, possibly largest of its kind in India, was confirmed by the National Payment Corporation of India (NPCI) in a statement today. more
Gadi Evron writes: "China responds to Google's accusations on its CNCERT web site, here. Johannes Ullrich just brought this to my attention on Facebook. In short, CNCERT wrote that China is the biggest victim of cyber attacks, and that Google lacks evidence to link the recent attacks to China as the perpetrator. I am certain more details and analysis will become available soon." more
While it might still be too early to make predictions, there are dozens of articles on the web predicting how the COVID-19 pandemic might change our long-term behavior. Here are some of the more interesting predictions I've seen that involve broadband and telecom... Millions of people were sent home for work or school to homes that didn't have good broadband. These folks have been telling the world for years that they don't have good broadband... more
"These vulnerabilities are as bad as it gets," says Google's Information Security Engineer, Tavis Ormandy, in reference to multiple critical vulnerabilities discovered affecting Symantec, a popular vendor in the enterprise security market. more
The U.S. Department of Transportation (USDOT), Research and Innovative Technology Administration (RITA) and Volpe National Transportation Systems Center (Volpe Center), today released a Request for Information (RFI) seeking to obtain informed views on the "perceived needs, prevailing practices, and lessons learned concerning the cybersecurity and safety of safety-critical electronic control systems used in various modes of transportation and other industry sectors."
more
"Singapore is planning to cut off web access for public servants as a defence against potential cyber attack," according to a report today in the Guardian. more
Whatever your personal perspective of the rights and wrongs of the current Arab-Israeli war in Gaza, there is a second front being fought on the Internet, says Jart Armin of HostExploit.com in a blog post today. "This form of warfare is a battle of words and often vivid imagery engaged by hackers from either side of the divide." more
US House officials have confirmed hackers breaching several websites belonging to House of Representatives members in the past week. Portions of the websites were replaced by digital graffiti which began earlier this month, according to zone-h. Brian Krebs of the Washington Post reports: "Rep. Spencer Bachus has sent a letter to the House's chief administrative officer, requesting more information about the attacks. Bachus cites information provided to him by Gary Warner, director of research in computer forensics at the University of Alabama at Birmingham. Warner suggested that the break-ins at the House sites were caused not by password guessing [as reported initially], but by 'SQL injection,' an attack that exploits security weaknesses in Web server configurations." more
Cable modem fraud can be a major source of revenue leakage for service providers. A recent study found that communication service providers lost $3 billion dollars worldwide due to cable modem cloning and fraudulent practices. To combat this problem, device provisioning solutions include mechanisms to prevent loss -- but what do you really need to protect your bottom line? more