Malware

SPOTLIGHT ON SECURITY

Malvertisers Use Digital Fingerprints to Avoid Detection

In the world of computer security, fingerprints are found in more places than where the tips of hands touch. That's because the term is applied to any data set that can be used to make a unique identification. For example, antifraud programs used by online retailers can identify customers by the str...

Hollywood Presbyterian Medical Center on Wednesday announced that it paid approximately $17,000 to resume normal operations after digital extortionists knocked its computer systems offline. The Los Angeles hospital discovered its computer network infected with ransomware earlier this month. Ransomwa...

The Internet Archive on Friday cut the ribbon on its online Malware Museum, an online compendium of malware programs computer users in the 1980s and 1990s sometimes encountered. Everything old is new again, so the saying goes, and apparently that retro fascination applies to computer viruses. The mu...

Ukrainian officials earlier this week said they had launched a probe into the source of a cyberattack that targeted a Kiev Airport. The attack may be related to the BlackEnergy malware attacks that recently targeted Ukrainian infrastructure facilities, apparently from Russia. CERT-UA on Monday warne...

SPOTLIGHT ON SECURITY

Privacy as a Service Advocates Promise Better Data Protection

There's been a lot of wailing and gnashing of teeth about the Sisyphean task of protecting privacy in the Digital Age, but that hasn't stopped innovators from searching for ways to preserve it. One of the latest ideas to emerge in the field is Privacy as a Service. As with many emerging technologies...

SPOTLIGHT ON SECURITY

Iranian Cyberattack on American Dam Viewed As Rarity

Just days before Christmas, a rare event occurred: the report of a successful intrusion into America's infrastructure by overseas hackers. Although the event -- penetration of the control system of a dam 20 miles from New York City -- was more than two years old, it just made it into the public ligh...

SPOTLIGHT ON SECURITY

Security Execs Sweat Insider Threats

Insider threats are becoming increasingly worrisome to corporate security executives. That is one of the findings in a survey of C-level businesspeople Nuix released last week. "The insider threat seems to be a bigger concern this year than it was in previous years," said Nuix's Keith Lowry. "People...

The idea of a "Cyber Geneva Convention" has gained steam in the last five years. Based on the original Geneva Convention, which dates back to 1864, it would ensure that certain types of attacks, as well as specific targets, would remain off-limits in a cyberwar. The concept of rules dictating what s...

As 2016 approaches, it's time to get the crystal ball out and predict next year's cybersecurity trends. Here are some predictions from security pros TechNewsWorld interviewed. Fantasy sports sites like DraftKings and FanDuel in 2015 caught the attention of states' attorneys general, who wanted to tr...

FBI Director James Comey on Wednesday told members of a U.S. Senate committee that high-tech companies may need to adopt a new business model regarding encryption in order to get on the same page with law enforcement. "Encryption is getting in the way of our ability to have court orders effective to...

SPOTLIGHT ON SECURITY

‘Tis the Season for Online Predators

While visions of holiday shoppers dance in retailers' heads, those visions are also on the minds of online marauders. Net predators are sticking to scams that have made them money throughout the year. "Over the last 12 months, we've seen a return to attachments with innocuous macros in them," said K...

SPOTLIGHT ON SECURITY

New Tech Targets Enterprise Ransomware

SentinelOne last week introduced an addition to its behavioral solution designed to address the problem of ransomware scrambling files on a computer. Ransomware has been a scourge not only for consumers, but for the enterprise, too. The malicious software can be particularly nettlesome for enterpris...

Dojo-Labs on Thursday introduced Dojo, a device that plugs into the router of a home network and acts as a watchdog to ensure that everything connected to the network is operating on its best behavior. The device brings some of the advanced technologies used to protect corporate networks to the home...

Technewsworld Channels