Feed aggregator

Taking the physician’s pulse on cybersecurity

News from 'Help Net Security' - 1 hour 24 min ago
More than four in five U.S. physicians (83 percent) have experienced some form of a cybersecurity attack, according to Accenture and the American Medical Association (AMA). This, along with additional findings, signals a call to action for the healthcare sector to increase cybersecurity support for medical practices in their communities. Cybersecurity concerns The findings, which examined the experiences of roughly 1,300 U.S. physicians, underscore the recognition that it is not “if” but “when” a cyberattack … More →
Categories: Cyber India

IoT data exchange: Building trust and value

News from 'Help Net Security' - 1 hour 39 min ago
The results of Cisco’s IoT Value/Trust Paradox report show that, while most consumers believe IoT services deliver significant value for them, very few understand or trust how their IoT data is being managed and used. This conclusion has revealed an interesting paradox: despite their lack of trust in IoT data security, consumers on the whole say that they are unwilling to disconnect from IoT services, even temporarily. These findings indicate that we are approaching the … More →
Categories: Cyber India

Flaw in Office 365 with Azure AD Connect could result in domain compromise

News from 'Help Net Security' - 1 hour 59 min ago
The Preempt research team has uncovered a vulnerability with Microsoft Office 365 when integrated with an on-premises Active Directory Domain Services (AD DS) using Azure AD Connect software that unnecessarily gives users elevated administrator privileges, making them “stealthy” administrators. Preempt discovered this surprising issue was occurring when customers were installing Microsoft Office 365 with Azure AD Connect software for on-premise AD DS integration (hybrid deployment). “Most Active Directory audit systems easily alert on excessive privileges, … More →
Categories: Cyber India

Emerging trends companies should prepare for in 2018

News from 'Help Net Security' - 2 hours 24 min ago
Today’s organizations face a cyber security landscape that is more difficult to navigate than ever before. To shed light on what lies ahead and help businesses better prepare for emerging threats, Experian Data Breach Resolution released its fifth annual Data Breach Industry Forecast with five key predictions for 2018. “Our threat landscape is constantly evolving, making it increasingly difficult for businesses to mitigate risk,” said Michael Bruemmer, vice president at Experian Data Breach Resolution. “It’s … More →
Categories: Cyber India

Whitepaper: Top 20 cyber attacks on ICS

News from 'Help Net Security' - 2 hours 53 min ago
The technique for evaluating the risk of cyber-sabotage of industrial processes are well understood by those skilled in the art. Essentially, such risk assessments evaluate a typically large inventory of possible cyber attacks against the cyber-physical system in question, and render a verdict. Communicating the verdict to business decision-makers who are not familiar with cyber-security minutia is more difficult, especially for the low-frequency, high-impact (LFHI) type of attacks for which there is little statistical data. … More →
Categories: Cyber India

US man is behind the 2015 Hacking Team hack?

News from 'Help Net Security' - Wed, 13/Dec/2017 - 02:56
Who’s behind the 2015 Hacking Team hack? According to a notice received by Guido Landi, one of the former Hacking Team employees that was under investigation for the hack, a 30-year old Nashville, Tennesee resident might have had something to do with it. Landi received the notice from Italian prosecutor Alessandro Gobbis, which says he has asked the judge to terminate the investigation. The document (obtained by Motherboard) also names one Jon Fariborz Davachi as … More →
Categories: Cyber India

eBook: Defending against crypto-ransomware

News from 'Help Net Security' - Wed, 13/Dec/2017 - 02:28
According to the Symantec 2017 Internet Security Threat Report, the average ransom demand has reached over $1000 in the last year. Therefore, it is critical to take steps to prevent infection and be prepared to restore from backup if prevention fails. A crypto ransomware attack can take hostage not only data stored on a company’s individual computers, but also the files on its servers and cloud-based file-sharing systems — leading to financial losses, stopping business … More →
Categories: Cyber India

ROBOT Attack: 19-Year-Old Bleichenbacher Attack On Encrypted Web Reintroduced

News from 'The Hackers News' - Wed, 13/Dec/2017 - 00:40
A 19-year-old vulnerability has been re-discovered in the RSA implementation from at least 8 different vendors—including F5, Citrix, and Cisco—that can give man-in-the-middle attackers access to encrypted messages. Dubbed ROBOT (Return of Bleichenbacher's Oracle Attack), the attack allows an attacker to perform RSA decryption and cryptographic operations using the private key configured on
Categories: Cyber India

Enterprise USB security is outdated and inadequate

News from 'Help Net Security' - Wed, 13/Dec/2017 - 00:30
While USB drives are ubiquitous for employees across all industries, security policies for these devices are often severely outdated or grossly inadequate for protecting critical enterprise data, according to Apricorn. By failing to effectively monitor USB usage, organizations are leaving themselves vulnerable to data breaches, as well as putting their clients’ and employees’ personal information at risk. While nine out of 10 employees rely on USB devices today, only 20 percent of them are utilizing … More →
Categories: Cyber India

1.4 billion unencrypted credentials found in interactive database on the dark web

News from 'Help Net Security' - Wed, 13/Dec/2017 - 00:04
A data dump containing over 1.4 billion email addresses and clear text credentials  is offered for download in an underground community forum. What’s so special about this data dump? For one, it’s the largest one to date. “This dump aggregates 252 previous breaches, including known credential lists such as Anti Public and Exploit.in, decrypted passwords of known breaches like LinkedIn as well as smaller breaches like Bitcoin and Pastebin sites,” 4iQ founder and CTO Julio … More →
Categories: Cyber India

An analysis of 120 mobile app stores uncovers plethora of malicious apps

News from 'Help Net Security' - Tue, 12/Dec/2017 - 22:30
RiskIQ analyzed 120 mobile app stores and more than 2 billion daily scanned resources. In listing and analyzing the app stores hosting the most malicious mobile apps and the most prolific developers of malicious apps, their Q3 mobile threat landscape report documents an increase in blacklisted apps over Q2, as well as the continued issues of imitation and trojan apps in official app stores and the emergence of the massive WireX mobile botnet. Total number … More →
Categories: Cyber India

Collection of 1.4 Billion Plain-Text Leaked Passwords Found Circulating Online

News from 'The Hackers News' - Tue, 12/Dec/2017 - 20:06
Hackers always first go for the weakest link to quickly gain access to your online accounts. Online users habit of reusing the same password across multiple services gives hackers opportunity to use the credentials gathered from a data breach to break into their other online accounts. Researchers from security firm 4iQ have now discovered a new collective database on the dark web (released
Categories: Cyber India

If You're Ready for Arch, ArchMerge Eases the Way

News from 'TechNewsWorld' - Tue, 12/Dec/2017 - 18:30
Newcomer ArchMerge Linux offers a big change for the better to those switching from the Debian Linux lineage to the Arch Linux infrastructure. ArchMerge Linux is a recent spinoff of ArchLabs Linux, which is a step up from most Arch Linux offerings in terms of installation and usability. Arch Linux distros are notorious for their challenging installation and software management processes. ArchMerge Linux brings a few extra ingredients that make trying it well worth your while if you want to consider migrating to the Arch Linux platform.
Categories: Cyber India

Return of Necurs botnet brings new ransomware threat

News from 'Help Net Security' - Tue, 12/Dec/2017 - 18:00
The Necurs botnet has returned to the top ten most prevalent malware during November 2017, as cybercriminals used it to distribute a new form of ransomware, according to Check Point. Researchers found that hackers were using Necurs, considered to be the largest spam botnet in the world, to distribute the relatively new Scarab ransomware that was first seen in June 2017. The Necurs botnet started mass distribution of Scarab during the Thanksgiving holiday, sending over … More →
Categories: Cyber India

Google Researcher Releases iOS Exploit—Could Enable iOS 11 Jailbreak

News from 'The Hackers News' - Tue, 12/Dec/2017 - 13:12
As promised last week, Google's Project Zero researcher Ian Beer now publicly disclosed an exploit that works on almost all 64-bit Apple devices running iOS 11.1.2 or earlier, which can be used to build an iOS jailbreak, allowing users to run apps from non-Apple sources. On Monday morning, Beer shared the details on the exploit, dubbed "tfp0," which leveraged double-free memory corruption
Categories: Cyber India

MoneyTaker’s stealthy hacking spree spread from US to Russia

News from 'Help Net Security' - Tue, 12/Dec/2017 - 02:42
A stealthy group of Russian-speaking hackers has been targeting financial organizations (banks, credit unions, lenders) in the US and Russia, stealing money and documentation that could be used for new attacks. The targets The group’s operations have been detailed in a report by Russian cyber attack investigators Group-IB, who investigated over 20 attacks that have been traced back to MoneyTaker (as they’ve dubbed the hacking outfit). MoneyTaker hackers seem to have a preference for small … More →
Categories: Cyber India

The Tech Wars of 2018

News from 'TechNewsWorld' - Tue, 12/Dec/2017 - 00:27
We are coming up to the end of the year, and it's a good time to look forward. Next week, I'll look back and call out my product of the year. Stepping outside of politics and the obvious war between the Democrats, Republicans and common sense, there is the war between Amazon and Google, which likely will redefine the growth of digital assistants. There's also the war between Intel and Qualcomm in the personal computing arena. With both Google and Intel behaving foolishly, I'm going to call the battles for Amazon and Qualcomm.
Categories: Cyber India

Newly Uncovered 'MoneyTaker' Hacker Group Stole Millions from U.S. & Russian Banks

News from 'The Hackers News' - Mon, 11/Dec/2017 - 23:54
Security researchers have uncovered a previously undetected group of Russian-speaking hackers that has silently been targeting Banks, financial institutions, and legal firms, primarily in the United States, UK, and Russia. Moscow-based security firm Group-IB published a 36-page report on Monday, providing details about the newly-disclosed hacking group, dubbed MoneyTaker, which has been
Categories: Cyber India

Keylogger found in Synaptics driver on HP laptops

News from 'Help Net Security' - Mon, 11/Dec/2017 - 23:44
For the second time this year, a security researcher unearthed a keylogger in a driver used on a number of HP laptops. The first time was earlier this year, when Swiss security firm modzero AG discovered a keylogger in Conexant HP audio drivers that stored records of keystrokes in a file in the public folder, unencrypted. This time, the keylogger was spotted by security researcher Michael Myng (aka “ZwClose”) while rifling through the Synaptics Touchpad … More →
Categories: Cyber India

Worldwide server revenue grew 16% in Q3 2017

News from 'Help Net Security' - Mon, 11/Dec/2017 - 22:01
In the third quarter of 2017, worldwide server revenue increased 16 percent year over year, while shipments grew 5.1 percent from the second quarter of 2016, according to Gartner. “The third quarter of 2017 produced continued growth on a global level with varying regional results,” said Jeffrey Hewitt, research vice president at Gartner. “A build-out of infrastructure to support cloud and hybrid-cloud implementations was the main driver for growth in the server market for the … More →
Categories: Cyber India
Syndicate content