0 Comments
It likely comes as no surprise that cyber-criminals are financially motivated, but according to new research, many nefarious actors in the cyber world are also driven to a life of digital crime by ego as well as socioeconomic and psychological factors. As follow-up to the recent report Under the Hoodie: Lessons from a Season of
0 Comments
by Paul Ducklin At the recent DEF CON cybersecurity conference in Las Vegas, macOS security researcher Patrick Wardle did something that the responsible disclosure doctrine says is a bit naughty. He “dropped 0day” on Apple’s macOS, meaning that he publicly revealed an exploit for which no patch is yet available. Exploits against unpatched vulnerabilities are
0 Comments
Heralded as the answer to many cybersecurity issues, machine learning hasn’t always delivered Over the past several years there was no such thing as a security vendor that didn’t have machine learning (ML) – usually mischaracterized it as artificial intelligence (AI) because bandwagons are so attractive, no matter how misleading – and they mostly claimed
0 Comments
Sonatype helps enterprises identify and remediate vulnerabilities in open source library dependencies and release more secure code. Today, they announced a free tool called DepShield that offers a basic level of protection for GitHub developers. The product is actually two parts. For starters, Sonatype has a database of open source dependency vulnerabilities called OSS Index.
0 Comments
Enterprise file synchronization and sharing, or EFSS, technologies enable users to synchronize their files across… All their devices, including organization-issued and personally owned laptops, smartphones and tablets, and to securely share their files with other users. A secure sync-and-share service is increasingly essential to organizations that need to ensure corporate files are kept as secure
0 Comments
Multiple researchers have identified a dangerous new variant of KeyPass ransomware, featuring a manual-control functionality.  According to Kaspersky Lab, the modified version mainly targets developing countries. “For now, the most targeted regions are mainly developing countries – the modification primarily targets Brazil (19.51%) and Vietnam (14.63%). As the malware continues to spread worldwide via fake
0 Comments
Unbeknownst to exploit writers, the seemingly mouth-watering bugs would be bogus and non-exploitable Researchers at New York University have come up with an unconventional defensive technique that could ultimately deter attackers from even trying to write exploits targeting software vulnerabilities. In a departure with the usual ways of addressing bugs, which normally involve eliminating known
0 Comments
Your Mac computer running the Apple’s latest High Sierra operating system can be hacked by tweaking just two lines of code, a researcher demonstrated at the Def Con security conference on Sunday. Patrick Wardle, an ex-NSA hacker and now Chief Research Officer of Digita Security, uncovered a critical zero-day vulnerability in the macOS operating system
0 Comments
Facebook has open sourced Fizz—a library designed to help developers implement TLS 1.3 protocol with all recommended security and performance related configurations. Since late last month, Google Chrome web browser has started marking all non-HTTPS websites as ‘Not Secure’ in an effort to make the web a more secure place, forcing website administrators to switch
0 Comments
Speaking at DEFCON to deliver research on “a comprehensive list of Nation-State Big Brothers,” security researcher Eduardo Lzycki said that there had been an increased number of governments both censoring and shutting down online services, as well as acquiring cyber espionage and offensive tools. Saying that the internet was something that “people gathered around as
0 Comments
The author thanks Shaun Nordeck, MD, for his assistance with this report. With the explosion of growth in technology and its influence on our lives, we have become increasingly dependent on it. The medical field is no exception: Medical professionals trust technology to provide them with accurate information and base life-changing decisions on this data. McAfee’s
0 Comments
Blind Loyalty There is a secret behind every open office in Silicon Valley — and it isn’t the drain on productivity. Tech companies have been the vanguards for pushing corporate culture forward toward “radical transparency.” Mark Zuckerberg works in a fully transparent four-walled glass office surrounded by the rest of Facebook. Valve got rid of
0 Comments
The malware outbreak has even prompted concerns of delays in the shipments of the next wave of iPhones Taiwan Semiconductor Manufacturing Company (TSMC) has reverted to normal operations after a “mutation” of the WannaCryptor (aka WannaCry) malware forced the closure of several of its fabrications plants over the weekend, according to a BBC report. The