Monthly Archives: June 2018

Wi-Fi security gets a boost as WPA3 standard is launched

The new wireless security protocol is poised to make hacking Wi-Fi connections a whole lot harder   The Wi-Fi Alliance on Monday officially launched WPA3, a new Wi-Fi security protocol that is designed to enhance wireless security. The new standard “adds new features to simplify Wi-Fi security, enable more robust authentication, and deliver increased cryptographic strength for [...]

By |2018-06-29T13:04:38+00:00June 29th, 2018|Uncategorized|0 Comments

5 new cyberthreats pop up every second, here’s how to protect yourself

Cryptojacking, fileless malware, and ransomware are running rampant in 2018, according to McAfee.   https://www.techrepublic.com/videos/cryptojacking-the-evolution-of-ransomware/   The start of 2018 has seen a massive rise in cryptocurrency mining and cryptojacking attacks, along with steady numbers of familiar malware and ransomware attacks, according to a Wednesday report from McAfee. On average, five new threat samples arose every second [...]

By |2018-06-27T13:29:34+00:00June 27th, 2018|Uncategorized|0 Comments

Why Intel won’t patch TLBleed vulnerability, despite serious concerns for cloud users

A recently discovered flaw in how CPUs handle multithreading could leak cryptography keys, though Intel is declining to patch the issue.   https://www.techrepublic.com/videos/the-benefits-of-integrating-it-and-security-teams/   Yet another critical flaw has been found to affect Intel CPUs, according to researchers at VUsec, the Systems and Network Security Group at Vrije Universiteit Amsterdam, as reported by The Register. The vulnerability, [...]

By |2018-06-25T14:37:58+00:00June 25th, 2018|Uncategorized|0 Comments

US government report highlights gaps in battle against botnets

he United States’ Department of Homeland Security and Department of Commerce have released a joint report aimed at identifying actions to reduce threats posed by botnets. Called A Report to the President on Enhancing the Resilience of the Internet and Communications Ecosystem Against Botnets and Other Automated, Distributed Threats, the 51-page-long material notes the range of threats for which [...]

By |2018-06-19T17:01:41+00:00June 19th, 2018|Uncategorized|0 Comments

LinkedIn CEO: Here are the real skills you need to be successful at work

LinkedIn CEO Jeff Weiner stressed the importance of interpersonal skills in a changing digital world.   https://www.techrepublic.com/videos/top-it-jobs-and-hiring-trends-for-2018-listed-in-tech-pro-research-survey/   In a job market that stresses the importance of finding employees with strong technological skills, a new LinkedIn study showed that workers with interpersonal skills are harder to come by. Recently LinkedIn CEO Jeff Weiner appeared on CBS [...]

By |2018-06-15T14:41:56+00:00June 15th, 2018|Uncategorized|0 Comments

5 steps to mitigating wiper malware

Researchers from Cisco's Talos Intelligence Group offer advice on how to thwart wiper malware, which attempts to destroy systems and/or data.   https://www.techrepublic.com/videos/corporate-cyber-defense-spending-hits-a-new-high/   Cisco's Talos Intelligence Group (TIG) has issued a warning. In the white paper, Wiper Malware: Attacking from the Inside, author Vitor Ventura, technical lead and security researcher at TIG, with contributions by Martin [...]

By |2018-06-13T14:29:14+00:00June 13th, 2018|Uncategorized|0 Comments

Net neutrality: A cheat sheet

Do internet service providers have a right to throttle certain traffic? That's the question at the heart of net neutrality, and here's everything you need to know about it.   https://www.techrepublic.com/videos/net-neutrality-what-is-it-and-why-should-you-care/   Let's say you're an AT&T customer, circa 2012. You're trying to use FaceTime on your Apple device and it just isn't working. It [...]

By |2018-06-11T17:02:23+00:00June 11th, 2018|Uncategorized|0 Comments

How your stolen data ends up on the Dark Web marketplace

Terbium Labs chief research officer Munish Walther-Puri outlined the pathways that hacked data can travel, and who's involved in prevention efforts.   https://www.techrepublic.com/videos/understanding-the-supply-chain-of-stole-data/   TechRepublic's Dan Patterson talked with Munish Walther-Puri, chief research officer of cybersecurity services provider Terbium Labs, about how personal and company data ends up on the dark web. Patterson: It's no [...]

By |2018-06-08T19:45:58+00:00June 8th, 2018|Uncategorized|0 Comments

How hackers can mine cryptocurrency in your serverless computing environment

A newly revealed attack could allow hackers to hijack serverless cloud computing functions to mine cryptocurrency at scale while you pay the bill.   https://www.techrepublic.com/videos/how-to-understand-serverless-architecture-in-the-cloud/   Security researchers at PureSec have discovered an attack method that enables hackers to mine cryptocurrency in hijacked serverless computing environments. The attack has yet to be discovered in the wild, but [...]

By |2018-06-06T13:52:09+00:00June 6th, 2018|Uncategorized|0 Comments

Chrome, Firefox iframe exploit can steal Facebook profile info and other personal data

A side-channel attack on CSS could expose your personal data to malicious websites, unless you update your browser immediately.   https://www.techrepublic.com/videos/ssl-partly-responsible-for-dramatic-q1-2018-increase-in-malware-and-ransomware/   A pair of independent security researchers has revealed a serious flaw in cascading style sheets (CSSes) that could leave private user data exposed to malicious websites. The exploit allows a malicious website to steal Facebook [...]

By |2018-06-04T14:54:44+00:00June 4th, 2018|Uncategorized|0 Comments