Cybersecurity

SPOTLIGHT ON SECURITY

New Tech Targets Enterprise Ransomware

SentinelOne last week introduced an addition to its behavioral solution designed to address the problem of ransomware scrambling files on a computer. Ransomware has been a scourge not only for consumers, but for the enterprise, too. The malicious software can be particularly nettlesome for enterpris...

Dojo-Labs on Thursday introduced Dojo, a device that plugs into the router of a home network and acts as a watchdog to ensure that everything connected to the network is operating on its best behavior. The device brings some of the advanced technologies used to protect corporate networks to the home...

SPOTLIGHT ON SECURITY

FBI, Carnegie Mellon Deny $1M Contract to Crack Tor

The FBI has denied allegations that it paid Carnegie Mellon University security researchers $1 million to crack a network designed to protect the anonymity of its users. The Tor Project, which operates the network, last week accused the FBI of cutting the CMU deal. The attack occurred from January t...

ISIS has rebuffed the declaration of cyberwar Anonymous issued on Sunday. "The #Anonymous hackers threatened in new video release that they will carry out a major hack operation on the Islamic state (idiots)," reads a message posted Monday in a Telegram channel believed to be affiliated with ISIS ha...

Encryption once again has come under fire in the wake of last week's terrorist attacks in Paris. Western intelligence agencies reportedly blamed the technology for enabling communications among the attackers, and some officials renewed their calls for technology companies to give them decryption key...

The Tor Project last week claimed the FBI paid Carnegie Mellon University $1 million to crack the anonymity of Tor users. Tor's claim appears to have been triggered by a report last week that said the FBI's arrest of an alleged member of the Silk Road 2.0 drug ring was based on "information obtained...

SPOTLIGHT ON SECURITY

Deep Learning App Targets Malware

Here's the problem with most programs aimed at killing malicious software: They need someone to tell them something's malicious. What if, however, the programs had the smarts to identify bad code on their own? That's what a company called Deep Instinct says its security solution, launched last week,...

The U.S. National Security Agency is getting a collective side-eye after posting what it characterized as proactive information: the fact that it discloses 91 percent of security vulnerabilities that pass through its internal review process. While the agency appears pleased with its newfound transpa...

BlackBerry on Friday released its Priv smartphone, its first Android-based device. The Android 5.1.1 Lollipop slider is driven by a Qualcomm Snapdragon 808 hexa-core processor and an Adreno 418 GPU. It's stocked with 3 GB of low-power RAM and 32 GB of storage. There's an 18-MP shooter on its backsid...

SPOTLIGHT ON SECURITY

Mobile Malware’s Growth Slows, Nastiness Grows

The good news about mobile malware in 2015 is that growth has slowed down. The bad news is that the malware entering the market is more virulent than ever. While there hasn't been a sharp rise in the volume of mobile malware this year, the increasingly malicious nature of the types of malware and at...

The U.S. Senate on Tuesday voted 74-21 to pass the Cybersecurity Information Sharing Act, or CISA, in the face of strong opposition from legal and cybersecurity experts, the high-tech industry, privacy and civil liberties organizations, and members of the public. The Act calls for the United States ...

Russian spy ships and subs reportedly are hovering close to the routes of undersea communications cables. Military and intelligence officials apparently have observed increased Russian sub activity near cables located from the North Sea to Northeast Asia, as well as in waters close to American shore...

SPOTLIGHT ON SECURITY

Google Pushes Transparency for SSL Certificates

The padlock on a browser's address bar is supposed to give Net travelers some security in insecure virtual space, but that's not always the case. Some dangerous flaws lurk behind the padlock. They can weaken the effectiveness of encrypted Internet connections and compromise TLS/SSL processes, includ...

TalkTalk on Thursday announced that it received a ransom demand following a cyberattack that may have compromised the credit card and bank details of millions of its customers. The cyberbreach may have compromised customer data including names, addresses, birth dates, email addresses and account inf...

Technewsworld Channels