Whose line of attack is it anyway? Cyber-assault whodunnits harder than ever to solve

The Register - Thu, 04/10/2018 - 19:51
Sophisticated groups not always so easy to pick out

Government-backed spies and hackers are increasingly using commercially available malware – thanks to a flourishing market of off-the-shelf software nasties – making it harder for researchers to identify who exactly is behind a cyber-attack.…

Categories: News

Apple, Amazon Strongly Refute Server Infiltration Report

Kapersky Labs - Thu, 04/10/2018 - 17:10
An explosive Bloomberg report, if true, would highlight the largest supply chain attack to have been launched against American corporations.
Categories: News

UK pins 'reckless campaign of cyber attacks' on Russian military intelligence

The Register - Thu, 04/10/2018 - 14:03
We know it was GRU

The UK government pointed the finger at Russian military intelligence for a litany of cyber nasties in an alert it issued this morning.…

Categories: News

Sendgrid blurts out OWN customers' email addresses with no help from hackers

The Register - Thu, 04/10/2018 - 11:47
Along came some spiders and saw the unsubscribers...

Cloud-based email marketing service SendGrid has copped to blabbing customer email addresses, chalking it up to some overenthusiastic indexing without explaining why pages were public-facing in the first place.…

Categories: News

Virus Bulletin 2018: macOS Flaw Allows Attackers to Hijack Installed Apps

Kapersky Labs - Thu, 04/10/2018 - 00:43
This code-signing issue represents a new attack vector, according to the researcher.
Categories: News

Apple forgot to lock Intel Management Engine in laptops, so get patching

The Register - Wed, 03/10/2018 - 23:43
Chipzilla's security through obscurity withers under scrutiny

In its ongoing exploration of Intel's Management Engine (ME), security biz Positive Technologies has reaffirmed the shortsightedness of security through obscurity and underscored the value of open source silicon.…

Categories: News

Cloud, Containers, Orchestration Big Factors in BSIMM9

Kapersky Labs - Wed, 03/10/2018 - 21:38
A converged architecture that brings independent software vendors, cloud vendors and IoT vendors together is reshaping the security landscape.
Categories: News

CEO pleads guilty of conspiring with drug cartels to sell them stealthy Blackberrys

The Register - Wed, 03/10/2018 - 20:48
Phantom Secure's Vincent Ramos faces 20 years in clink

The CEO of a company that took Blackberry phones, stripped them of their cameras, microphones and GPS and then installed encryption software in order to create a secure phone, has pleaded guilty to conspiring with drug cartels.…

Categories: News

Virus Bulletin 2018: Microsoft’s Lambert on How Cloud is Changing Security

Kapersky Labs - Wed, 03/10/2018 - 19:46
Supply-chain attacks are on the rise, but machine learning provides the edge that the security industry needs to keep up.
Categories: News

You dirty DRAC: IT bods uncover Dell server firmware security slip

The Register - Wed, 03/10/2018 - 18:44
Weakness not easy to leverage, but iDRAC exploit would mean game over for admins

A pair of IT professionals have uncovered a potentially serious flaw in the hardware management tools for older Dell servers.…

Categories: News

Facebook Breach Sparks Concerns Around Third-Party Apps, Website Security

Kapersky Labs - Wed, 03/10/2018 - 16:59
Experts say Friday's breach remains a dangerous potential access point to even more third-party apps and websites.
Categories: News

Artificial Intelligence: A Cybersecurity Tool for Good, and Sometimes Bad

Kapersky Labs - Wed, 03/10/2018 - 14:37
Attractive to both white-hats and cybercriminals, AI's role in security has yet to find an equilibrium between the two sides.
Categories: News

Pumping the Brakes on Artificial Intelligence

Kapersky Labs - Wed, 03/10/2018 - 14:36
Businesses are increasingly adopting artificial intelligence, but all too often these platforms don't feature security-by-design.
Categories: News

'Desperate' North Korea turns to APT hack attacks for cash

The Register - Wed, 03/10/2018 - 13:06
State-sponsored hacking meets financial acquisition with APT38

A new state-sponsored attack from North Korea is being seen as an effort by the cash-strapped dictatorship to raise funds by exploiting foreign banks.…

Categories: News


Subscribe to Sec Tec Limited aggregator - News