Feed aggregator

How security pros look at encryption backdoors

The majority of IT security professionals believe encryption backdoors are ineffective and potentially dangerous, with 91 percent saying cybercriminals could take advantage of government-mandated encryption backdoors. 72 percent of the respondents do not believe encryption backdoors would make their nations safer from terrorists, according to a Venafi survey of 296 IT security pros, conducted at Black Hat USA 2017. “Giving the government backdoors to encryption destroys our security and makes communications more vulnerable,” said Kevin … More →
Categories: Cyber India

Report: Apple to Funnel Megabucks Into Original TV Content Development

News from 'TechNewsWorld' - Fri, 18/Aug/2017 - 01:03
Apple reportedly has decided to put more than $1 billion toward the acquisition and development of original programming, part of a long-awaited rollout of a new television and film experience. The investment will leverage Apple's thus far underwhelming Apple TV business, bolstering its core video and music library to fulfill the promise of disrupting traditional television and film studios, as well as traditional cable and satellite providers. The move is consistent with Apple's historic pattern of waiting for a market to develop.
Categories: Cyber India

NotPetya aftermath: Companies lost hundreds of millions

News from 'Help Net Security' - Fri, 18/Aug/2017 - 00:31
The infamous NotPetya ransomware attack, which started in Ukraine on June 27 but later spread to many international businesses, has resulted in huge monetary losses for the victims. Even those who paid the ransom couldn’t recover swiftly, as it was discovered that the NotPetya attackers weren’t capable of providing decryption keys. In fact, it is now largely accepted that the attack was not performed to acquire money, but to disrupt operations worldwide. Now that the … More →
Categories: Cyber India

Two Critical Zero-Day Flaws Disclosed in Foxit PDF Reader

News from 'The Hackers News' - Thu, 17/Aug/2017 - 23:29
Are you using Foxit PDF Reader? If yes, then you need to watch your back. Security researchers have discovered two critical zero-day security vulnerabilities in Foxit Reader software that could allow attackers to execute arbitrary code on a targeted computer, if not configured to open files in the Safe Reading Mode. The first vulnerability (CVE-2017-10951) is a command injection bug
Categories: Cyber India

Unpatchable Flaw in Modern Cars Allows Hackers to Disable Safety Features

News from 'The Hackers News' - Thu, 17/Aug/2017 - 21:31
Today, many automobiles companies are offering vehicles that run on the mostly drive-by-wire system, which means a majority of car's functions—from instrument cluster to steering, brakes, and accelerator—are electronically controlled. No doubt these auto-control systems make your driving experience much better, but at the same time, they also increase the risk of getting hacked. Car Hacking
Categories: Cyber India

How to spot malicious mobile apps

News from 'Help Net Security' - Thu, 17/Aug/2017 - 18:55
The pervasiveness of smartphones has resulted in an onslaught of mobile apps, and it’s pretty safe to say that, by now, there is an app for every imaginable purpose. Unfortunately, among the many helpful ones are also many malicious apps – no app market is safe from them. Fortunately, there are ways to spot such apps. RiskIQ researchers have been monitoring over 120 mobile app stores around the world, and based on their findings, they … More →
Categories: Cyber India

The human point: Gaining visibility into the context behind user actions

News from 'Help Net Security' - Thu, 17/Aug/2017 - 18:45
In this podcast recorded at Black Hat USA 2017, Dr. Richard Ford, Chief Scientist at Forcepoint, talks about the security industry’s need of a paradigm shift toward examining user behavior and intent. Here’s a transcript of the podcast for your convenience. Hello, my name is Dr. Richard Ford, I’m the Chief Scientist over at Forcepoint. In that job, I’m responsible for a variety of different things, but one of the things I’m most excited about … More →
Categories: Cyber India

CoreOS Tectonic Platform Aims to Free the Cloud

News from 'TechNewsWorld' - Thu, 17/Aug/2017 - 18:32
CoreOS has announced the general availability of the Kubernetes container management Tectonic platform on Microsoft's Azure cloud. The Tectonic platform enables enterprises to run Kubernetes on a single platform across various cloud and bare metal environments. Prior to this release, the Tectonic platform was available on AWS and bare metal servers. Tectonic 1.7 delivers on CoreOS' vision to bring freedom and portability to the cloud. It enables enterprises to use a single platform to manage modern infrastructure in their hybrid environments.
Categories: Cyber India

DevOps skills gap: Do you have the necessary skills to succeed?

News from 'Help Net Security' - Thu, 17/Aug/2017 - 18:25
New research shows that software developers are not receiving the training they need to be successful as DevOps becomes the prevalent approach to building and operating digital products and services. In today’s application-centric economy that gap could have real impact on the productivity of businesses in every industry, as well as on the security and quality of the software that underpins the digital economy. Education and DevOps The 2017 DevSecOps Global Skills Survey by DevOps.com … More →
Categories: Cyber India

Google Chrome remote code execution flaw detailed, PoC released

News from 'Help Net Security' - Thu, 17/Aug/2017 - 18:00
Vulnerability broker Beyond Security has released details about and Proof of Concept code for a remote code execution bug affecting Google Chrome. “The [type confusion] vulnerability results from incorrect optimization by the turbofan compiler, which causes confusion between access to an object array and a value array, and therefore allows to access objects as if they were values by reading them as if they were values (thus receiving their in memory address) or vice-versa to … More →
Categories: Cyber India

Three megatrends that will drive digital business into the next decade

News from 'Help Net Security' - Thu, 17/Aug/2017 - 17:30
Gartner revealed three distinct megatrends that will enable businesses to survive and thrive in the digital economy over the next five to 10 years. Artificial intelligence (AI) everywhere, transparently immersive experiences and digital platforms are the trends that will provide intelligence, create new experiences and offer platforms that allow organizations to connect with new business ecosystems. Hype Cycle for Emerging Technologies, 2017. Note: PaaS = platform as a service; UAVs = unmanned aerial vehicles Hype … More →
Categories: Cyber India

Oopss! HBO Itself Accidentally Leaked 'Game of Thrones' Season 7 Episode 6

News from 'The Hackers News' - Thu, 17/Aug/2017 - 15:44
HBO doesn't need hackers to leak its widely watched "Game of Thrones" episodes, as it is sufficient enough to leak them by its own. In what seems to be a terrible blunder, HBO Spain appeared to have accidentally broadcast the next episode—Episode 6—of Game of Thrones season 7 five days before its official premiere. And as expected, the GoT episode 6 quickly began circulating online. <!--
Categories: Cyber India

Game of Thrones and HBO — Twitter, Facebook Accounts Hacked

News from 'The Hackers News' - Thu, 17/Aug/2017 - 15:42
The Game of Thrones hacking saga continues, but this time it's the HBO's and GOT's official Twitter and Facebook accounts got compromised, rather than upcoming episodes. As if the leak of episodes by hackers and the accidental airing of an upcoming episode of Game of Thrones by HBO itself were not enough, a notorious group of hackers took over the official Twitter and Facebook accounts for
Categories: Cyber India

EV ransomware is targeting WordPress sites

News from 'Help Net Security' - Thu, 17/Aug/2017 - 01:47
WordPress security outfit Wordfence has flagged several attempts by attackers to upload ransomware that provides them with the ability to encrypt a WordPress website’s files. They dubbed the malware “EV ransomware”, due to the .ev extension that is added to the encrypted files. About EV ransomware The ransomware is uploaded once the attacker manages to compromise a WordPress website. The attacker starts the encryption process from an interface, after choosing a complex key and pressing … More →
Categories: Cyber India

Gadget Ogling: Trending Hot Plates, Toys for Future Coders, and a Ringy Dingy Ring

News from 'TechNewsWorld' - Wed, 16/Aug/2017 - 23:45
If you've looked at Facebook for more than a minute over the last few years, there's no question that you'll have encountered a top-down, perfectly filmed food video from BuzzFeed's Tasty channel. The cooking clips are enormously popular on the social network, racking up billions of views a month. Now BuzzFeed is trying to monetize its success in a new way. Enter the Tasty One Top, a hot plate that seeks to make the work of cooking while watching the videos for guidance a little simpler. That's because the hot plate syncs with many of the clips through the Tasty app.
Categories: Cyber India

DOJ wants to know who visited anti-Trump website

News from 'Help Net Security' - Wed, 16/Aug/2017 - 23:12
The US Department of Justice wants DreamHost to hand over IP addresses of some 1.3 million visitors to disruptj20.org, a website that helped organize political protests during President Trump’s inauguration. The company has decided to challenge the request in court. According to a blog post by the LA-based web hosting provider, the DOJ first requested information about the website and its owner, but is now asking DreamHost to provide a glut of data, including the … More →
Categories: Cyber India

Uber to get privacy audit every two years

News from 'Help Net Security' - Wed, 16/Aug/2017 - 21:05
Uber has agreed to implement a comprehensive privacy program and obtain regular, independent audits to settle Federal Trade Commission charges that they deceived consumers by failing to monitor employee access to consumer personal information and by failing to reasonably secure sensitive consumer data stored in the cloud. The complaint In the wake of news reports alleging Uber employees were improperly accessing consumer data, the company issued a statement in November 2014 that it had a … More →
Categories: Cyber India

US, China and the UK are top regions affected by IoT security threats

News from 'Help Net Security' - Wed, 16/Aug/2017 - 18:25
In the Internet of Things (IoT) ecosystem today, cyberattacks are becoming more diverse and sophisticated with cybercriminals taking over home network routers to launch attacks on smart home devices. Trend Micro’s recent report shows more than 1.8 million cyberattacks have been conducted through home network routers in the past six months. Eight percent of these attacks were outbound attacks where hackers were able to access a home device, then remotely execute malware to obtain confidential … More →
Categories: Cyber India

Corrupt Federal Agent, Who Stole Bitcoins From Silk Road, Pleads Guilty To Money Laundering

News from 'The Hackers News' - Wed, 16/Aug/2017 - 18:15
A former the United States Secret Service agent who stole hundreds of thousands of dollars worth of Bitcoins during an investigation into then-largest underground marketplace Silk Road has now pleaded guilty to money laundering. Shaun W. Bridges is one of two former US undercover agents who pleaded guilty in 2015 to one count of money laundering and one count of obstruction and was sentenced
Categories: Cyber India

Worldwide information security spending will grow 7% in 2017

News from 'Help Net Security' - Wed, 16/Aug/2017 - 18:00
Worldwide spending on information security products and services will reach $86.4 billion in 2017, an increase of 7 percent over 2016, with spending expected to grow to $93 billion in 2018, according to the latest forecast from Gartner. Within the infrastructure protection segment, Gartner forecasts fast growth in the security testing market (albeit from a small base) due to continued data breaches and growing demands for application security testing as part of DevOps. Spending on … More →
Categories: Cyber India
Syndicate content