Donald Trump’s effect on cybersecurity after he’s sworn in as president will likely be toward military uses of cyber weapons and stronger tools for law enforcement to crack encryption, but the impact is hard to predict due to the vagueness of his proposals so far.
Stories by Tim Greene
12 cyber shopping tips because criminals will be using all the attacks they can this holiday season in order to score cash and gather valuable personal data that they can monetize later.
Hackers are writing apps, setting up phony Wi-Fi networks and unleashing malware in attempts to turn legitimate Black Friday and Cyber Monday retailing into profits for themselves, according to security experts.
Attackers who were trying to turn the Ask.com Toolbar into a malware dispensary got caught early on when their scheme was picked up by security services that were looking for anomalies.
IBM Security has launched a network-emulation environment where corporate teams can play out attack scenarios so they are better prepared for incidents they might face in the real world.
The annual holiday uptick in denial of service attacks will likely continue this year only this time with a new devastating weapon: Internet of Things (IoT) devices, according to Akamai.
Filling cybersecurity jobs is getting so hard managers need to think outside the box if they hope to fill critical positions.
The Internet of things (IoT) has already been used to launch the biggest DDoS attacks ever, but now it represents a potential path for attackers to compromise cell phones.
ExtraHop is introducing a way to capture files just before ransomware encrypts them, making it possible to restore them but without regularly scheduled comprehensive updates.
Cisco has announced security upgrades to cut the time compromises go unnoticed on endpoints, giving attackers less time to do damage if they get past preventive security measures.
The DDoS attacks that flooded Dyn and knocked high-profile Web sites offline don’t mean businesses should abandon DNS service providers, in fact they should use more than one DNS provider for redundancy.
IBM Security is introducing online banking protection that flags fraudulent account users based on how they move their mouse.
IoT devices make good botnet material because they are poorly defended and the Mirai source code to create them has been made public.
Dyn says that the DDoS attack that swamped its DNS resolution service last week was backed by far fewer internet of things (IoT) devices than it thought before.
The massive DDoS attack that disrupted the internet address-lookup service Dyn last week was perhaps pulled off by a script kiddie targeting PlayStation Network and using Mirai malware to assemble a massive IoT botnet, according to research by Flashpoint.
- Security Sales Specialist VIC
- Senior Performance Test Analyst VIC
- Systems Administrator :SCCM WA
- Technical Business Analyst NSW
- Senior Project Coordinator NSW
- Chief Security Officer l CISSP l ISO27001 NSW
- Business Analyst-Shared Service Contact Centre or Call Centre NSW
- Infrastructure Consultant QLD
- Test Manager (HP Quality Centre / Kronos) NSW
- Project Manager :Applications WA