Cybersecurity

Sponsored
by

Cybersecurity / News Briefs

United States and Britain to Conduct Financial Cyber-Security Test

U.S. and Britain plan to conduct a test later this month to assess how regulators for the world's two biggest financial centers in New York and London would communicate in the event of a major cyberattack or broader IT problems, a spokesman for British government cybersecurity body CERT-UK said on Monday.

Reported Risk of Undersea Communication Cable Sabotage Are Exaggerated

Responding to a recent New York Times article which warned the possibility of Russian submarines possessing the ability to sabotage undersea communication cables, Doug Madory, Director of Internet Analysis at Dyn, calls them exaggerated scenarios.

U.S. Concerned over Increasing Russian Submarine Patrols Near Data Cables

Russian submarines and spy are reported to be aggressively operating near vital undersea cables that carry global Internet communications, according to a story in the New York Times. The issue is raising concerns among some American military and intelligence officials regarding the possibility that Russians might be planning to attack those lines in times of tension or conflict.

Experts Propose Plan for More Secure Wi-Fi Devices

Over 260 global network and security experts have collectively responded to the newly proposed FCC rules laid out in ET Docket No. 15-170 for RF Devices such as Wi-Fi routers by proposing a new approach to improve the security of these devices. The letter warns FCC ruling will cause more harm than good and risk a significant overreach of the Commission's authority.

Senior U.S. and Chinese Officials Conclude Four-Day Meeting on Cyber Security

Senior U.S. and Chinese officials concluded a four day meeting on Saturday discussing cyber security issues ahead of Chinese President Xi Jinping's visit to Washington later this month.

Hacking Increasingly Becoming a Physical Concern

If this past quarter's stories are any indication, we could very well be seeing the rise of a new wave of threats that will affect people in a more pronounced and physical level, reports Trend Micro in its Q2 Security Roundup Report.

Networking Firm Loses $46.7 Million to Fraudulent Wire Transfer

Ubiquiti Networks Inc., a San Jose based maker of networking technology, has disclosed that cyber criminals stole $46.7 million via a "business email compromise fraud involving employee impersonation."

ICANN Website Breached, Passwords Obtained by an Unauthorized Person

Usernames/email addresses and encrypted passwords for profile accounts created on the ICANN.org public website have been obtained by an unauthorized person, the Internet Corporation for Assigned Names and Numbers announced Wednesday night.

IPv6 Adoption Brings New Security Risks

Although IPv6 DDoS attacks are not yet a common occurrence, there are indications that malicious actors have started testing and researching IPv6 based DDoS attack methods.

Placing New Domain Names in Temporary “Penalty Box” Could Deter Malicious Use, Says Paul Vixie

Paul Vixie proposes a 'cooling-off period' when domain names are registered in order to help detect and deter malicious activity. "There's no legitimate reason for a new domain name to be registered and go live in less than a minute...

Record Number of Malware Variants Detected in Q4 of 2014, Retail/Service Most Targeted

During the 4th quarter of 2014, a record number of malware variants were detected -- an average of 255,000 new threats each day, according a recent report by Anti-Phishing Working Group (APWG). The group further reports that the number of unique phishing reports submitted to APWG during Q4 was 197,252 -- an increase of 18 percent from the 163,333 received in Q3 of 2014.

Research Finds Mobile Malware Infections Overblown

Advanced threat detection company, Damballa has released findings of a new research on Wednesday, detailing the overblown nature of the mobile malware problem. According to the company, the research, based on Big Data (50% of US mobile traffic), was used to determine actual malware infection rates -- not just samples found, or vulnerabilities/theoretical attacks.

M3AAWG Releases Anti-Abuse Best Common Practices for Hosting and Cloud Service Providers

Jointly published by the Internet Infrastructure Coalition (i2C) and the Messaging, Malware and Mobile Anti-Abuse Working Group, the new document outlines proven activities that can help Web hosting services improve their operations and better protect end-users.

Internet Society Issues Statement on Developing Cyber Security Policy Initiatives

The Internet Society has released an announcement setting out its views on the development of policy to address the balance between security and privacy. From an Internet perspective and in the context of the growing threat vector from hacking, targeted cyber attacks on networks and individuals, and surveillance, the Internet Society's approach to the development of cyber security policy initiatives is based on the following key considerations.

Symantec Chosen as Verification Agent for .bank and .insurance TLDs

fTLD Registry Services, LLC has announced an agreement with Symantec Corporation to provide verification services for the ".bank" and ".insurance" generic top-level domains. According to the report, Symantec will be responsible for adding a layer of protection to the new domains by verifying the eligibility of companies requesting domain names, making sure the person requesting the domain name is authorized by the company and ensuring the name requested by the company complies with fTLD's policies.