2017/12/28

Cybersecurity review of 2017: The year of wake-up calls – part 2 | foodonia

Courtesy of its highly customizable nature – along with its ability to persist in the system and to provide valuable information for fine-tuning the highly configurable payloads – the malware can be adapted for attacks against any environment, making it extremely dangerous.

The post Cybersecurity review of 2017: The year of wake-up calls – part 2 appeared first on WeLiveSecurity



Brought by: http://foodonia.com

2017/12/21

Sednit update: How Fancy Bear Spent the Year | foodonia

Over the past few years the Sednit group has used various techniques to deploy their various components on targets computers. The attack usually starts with an email containing either a malicious link or malicious attachment.

The post Sednit update: How Fancy Bear Spent the Year appeared first on WeLiveSecurity



Brought by: http://foodonia.com

What does revoking Net Neutrality mean for security? | foodonia

Imagine the scenario where an Internet Service Provider (ISP) allows a security company providing malware protection the option to pay for their traffic to be prioritized and a lower the priority level imposed on all other providers.

The post What does revoking Net Neutrality mean for security? appeared first on WeLiveSecurity



Brought by: http://foodonia.com

2017/12/20

Adventures in cybersecurity research: risk, cultural theory, and the white male effect – part 2 | foodonia

Armed with the cultural theory described in part one as a possible explanation for why some people do not heed expert advice, we fielded a survey that queried US adults about their attitudes to 15 different technology hazards, including six that were cyber-related.

The post Adventures in cybersecurity research: risk, cultural theory, and the white male effect – part 2 appeared first on WeLiveSecurity



Brought by: http://foodonia.com

2017/12/19

Why we should fight for Net Neutrality | foodonia

Granting ISPs the right to shape traffic, allowing for some traffic to be prioritized due to a commercial agreement, may have a negative effect on the outcome of using the service for both the consumer and the company providing the service.

The post Why we should fight for Net Neutrality appeared first on WeLiveSecurity



Brought by: http://foodonia.com

2017/12/18

Adventures in cybersecurity research: risk, cultural theory, and the white male effect | foodonia

Again and again we have seen security breaches occur because people did not heed advice that we and other people with expertise in security have been disseminating for years, advice about secure system design, secure system operation, and appropriate security strategy.

The post Adventures in cybersecurity research: risk, cultural theory, and the white male effect appeared first on WeLiveSecurity



Brought by: http://foodonia.com

2017/12/14

2017/12/13

Memes: the explanation of nearly everything – including computer viruses | foodonia

We still don’t have a solid scientific theory of memes; nonetheless, they already allow us to understand why certain things happen the way they do. Memes are “alive”; they reproduce, mutate, and evolve according to Darwinian laws.

The post Memes: the explanation of nearly everything – including computer viruses appeared first on WeLiveSecurity



Brought by: http://foodonia.com

It’s time to patch your Microsoft and Adobe software again against vulnerabilities | foodonia

It's the second Tuesday of the month, and you know what that means... Yep, it's time for another bundle of essential security updates from Microsoft.

The post It’s time to patch your Microsoft and Adobe software again against vulnerabilities appeared first on WeLiveSecurity



Brought by: http://foodonia.com

2017/12/12

Cryptocurrency in kilowatt hours: Counting the costs of anonymous transactions | foodonia

The energy costs are not the only charges in a transaction: the bitcoin network itself levies a charge which, according to a blog from Valve, the gaming provider behind the Steam network, has skyrocketed from $0.20 in 2016 to $20 per transaction today

The post Cryptocurrency in kilowatt hours: Counting the costs of anonymous transactions appeared first on WeLiveSecurity



Brought by: http://foodonia.com

Enterprise security spend to continue to trend higher | foodonia

A breakdown of the ‘spending pie’ shows that the ‘security services’ segment is projected to make up nearly 60% of the total IT security budgets, followed by the ‘infrastructure protection’ segment on a little over 18%.

The post Enterprise security spend to continue to trend higher appeared first on WeLiveSecurity



Brought by: http://foodonia.com

2017/12/11

Banking malware on Google Play targets Polish banks | foodonia

Besides delivering the promised functionalities, the malicious apps can display fake notifications and login forms seemingly coming from legitimate banking applications, harvest credentials entered into the fake forms, as well as intercept text messages to bypass SMS-based 2-factor authentication.

The post Banking malware on Google Play targets Polish banks appeared first on WeLiveSecurity



Brought by: http://foodonia.com

Happy holidays, scam spotters! | foodonia

Businesses are often sent fake invoices and waybills which install ransomware. Teach staff to avoid these. If questionable, ask your IT dept to look at it. E-cards have been a target in the past and may be used again in holiday-themed attacked.

The post Happy holidays, scam spotters! appeared first on WeLiveSecurity



Brought by: http://foodonia.com

2017/12/08

2017/12/06

Cryptocurrency exchange Bitfinex plagued by DDoS attacks | foodonia

The cast of characters behind the attacks, or their motives, are unclear. However, the onslaughts come at a time when the bitcoin price hits new highs, possibly triggering efforts on the part of cybercriminals to manipulate and cash in on the price.

The post Cryptocurrency exchange Bitfinex plagued by DDoS attacks appeared first on WeLiveSecurity



Brought by: http://foodonia.com

Six things to consider before implementing an ISMS | foodonia

These factors can be key to the success or failure of the ISMS implementation, due to the day-to-day activities in the organization and the resources required for system operation.

The post Six things to consider before implementing an ISMS appeared first on WeLiveSecurity



Brought by: http://foodonia.com

2017/12/05

2017/12/04

ESET helps law enforcement worldwide to disrupt Gamarue botnet | foodonia

Throughout its monitoring of the threat, ESET found dozens of C&C servers every month. The bulk of ESET’s research was conducted late last year, with the peak of Wauchos’s activity going back approximately to that time.

The post ESET helps law enforcement worldwide to disrupt Gamarue botnet appeared first on WeLiveSecurity



Brought by: http://foodonia.com

ESET takes part in global operation to disrupt Gamarue | foodonia

Wauchos is an extensible bot that allows its owner to create and use custom plugins. However, there are some plugins that are widely available and that are used by many different botnets.

The post ESET takes part in global operation to disrupt Gamarue appeared first on WeLiveSecurity



Brought by: http://foodonia.com

2017/12/01

NHS’s cyber-defenses to get a £20 million shot in the arm | foodonia

The health service is now on the lookout for a partner to help run the project, having invited interested parties to tender for a contract that is set to run for three to five years. The new center is set to be based in the English city of Leeds.

The post NHS’s cyber-defenses to get a £20 million shot in the arm appeared first on WeLiveSecurity



Brought by: http://foodonia.com