ESET warns of Malware capable of cause power outages

Two cyber security firms have uncovered malicious software that they believe caused a December 2016 Ukraine power outage, they said on Monday, warning the malware could be easily modified to harm critical infrastructure operations around the globe. ESET, a Slovakian anti-virus software maker, and Dragos Inc, a U.S. critical-infrastructure security firm, released detailed analyses of …

Trump Administration to revise driverless car guidelines

The Trump administration is said to be revising the existing guidelines for driverless vehicles. Updated guidance on the emerging technology is expected to be released in the next few months, Transportation Secretary Elaine Chao said, according to multiple reports. “The pressure is mounting for the federal government to do something,” Chao said during a conference …

Report Urges Security providers to consider offering DDoS protection as a service

A new report by Corero Network Security suggests that offering DDoS protection as a service is a viable business idea. Out of its respondents, 82 percent see a “clear business opportunity” in providing DDoS protection as a service to its customers. Also, 93 percent see providing DDoS mitigation in relation to other types of security …

Google’s new cloud-based service shows increasing need of IoTs

Google has launched a new cloud-based service called IoT Core that enables its enterprise customers to manage their IoT devices, as well as collect and analyze the data those devices produce. IoT Core has access to all its data processing, analytics, and machine learning capabilities of Google’s cloud and supports devices equipped with Intel, ARM, …

How DNSSEC Works

With DNSSEC, a DNS response now contains not only an answer but also a digital signature over that data made by the private key of the zone where the data originates. Validating this signature requires the zone’s public key – which DNSSEC conveniently stores in the DNS – so obtaining the required key for validation is …

Symantec’s annual Internet Security Threat Report Details a Scary 2017

Symantec’s 2017 Internet Security Threat Report reads more like a catalog of horrors for CIS and their staffs, with cyber spies and criminals running amuck everywhere. In 2016 as internet security threats mushroomed, cyber criminals and state-sponsored saboteurs pursued aggressive capers that included multi-million dollar virtual bank heists, some of the biggest distributed denial of …

Cyber Breaches on the Financial sector skyrocketed in 2016

More than 200 million financial services records were breached in 2016, representing a 937% percent increase over the previous year, according to data from IBM. The monetary gains associated with corporate and customer data available throughout the financial sector proved appetising to cybercriminals in a year which saw hackers switch their focus away from the …

Cyber criminals shift target to financial advisers

Digital experts have warned that hackers could increasingly target financial advice firms now retail banks are splurging on cyber security to protect customers’ cash. Cyber security has become a hot topic in recent months, with the government launching the National Cyber Security Centre to address weaknesses in the IT systems of financial firms, particularly big …

FBI Warns Cyber Criminals Targeting FTP Servers For Health Data

The Federal Bureau of Investigation FBI issued a warning that cyber criminals are actively targeting File Transfer Protocol (FTP) servers operating in “anonymous” mode and associated with medical and dental facilities to access protected health information (PHI). The federal agency said in a release that cyber criminals are targeting FTP servers to access PHI as …

Finnish F-Secure Signs MOU European Union’s Europol to curb cyber crime

On 28 April 2016 Europol’s Cybercrime Centre (EC3) signed a Memorandum of Understanding (MoU) with the online security company F-Secure Corporation at Europol’s headquarters in The Hague. F-Secure has 20 country offices and a presence in more than 100 countries, with Security Lab operations in Helsinki, Finland and in Kuala Lumpur, Malaysia. Through more than …