About Shane Berger

This author has not yet filled in any details.
So far Shane Berger has created 192 blog entries.

LinkedIn CEO: Here are the real skills you need to be successful at work

LinkedIn CEO Jeff Weiner stressed the importance of interpersonal skills in a changing digital world.   In a job market that stresses the importance of finding employees with strong technological skills, a new LinkedIn study showed that workers with interpersonal skills are harder to come by. Recently LinkedIn CEO Jeff Weiner appeared on CBS [...]

By | 2018-06-15T14:41:56+00:00 June 15th, 2018|Uncategorized|0 Comments

5 steps to mitigating wiper malware

Researchers from Cisco's Talos Intelligence Group offer advice on how to thwart wiper malware, which attempts to destroy systems and/or data.   Cisco's Talos Intelligence Group (TIG) has issued a warning. In the white paper, Wiper Malware: Attacking from the Inside, author Vitor Ventura, technical lead and security researcher at TIG, with contributions by Martin [...]

By | 2018-06-13T14:29:14+00:00 June 13th, 2018|Uncategorized|0 Comments

Net neutrality: A cheat sheet

Do internet service providers have a right to throttle certain traffic? That's the question at the heart of net neutrality, and here's everything you need to know about it.   Let's say you're an AT&T customer, circa 2012. You're trying to use FaceTime on your Apple device and it just isn't working. It [...]

By | 2018-06-11T17:02:23+00:00 June 11th, 2018|Uncategorized|0 Comments

How your stolen data ends up on the Dark Web marketplace

Terbium Labs chief research officer Munish Walther-Puri outlined the pathways that hacked data can travel, and who's involved in prevention efforts.   TechRepublic's Dan Patterson talked with Munish Walther-Puri, chief research officer of cybersecurity services provider Terbium Labs, about how personal and company data ends up on the dark web. Patterson: It's no [...]

By | 2018-06-08T19:45:58+00:00 June 8th, 2018|Uncategorized|0 Comments

How hackers can mine cryptocurrency in your serverless computing environment

A newly revealed attack could allow hackers to hijack serverless cloud computing functions to mine cryptocurrency at scale while you pay the bill.   Security researchers at PureSec have discovered an attack method that enables hackers to mine cryptocurrency in hijacked serverless computing environments. The attack has yet to be discovered in the wild, but [...]

By | 2018-06-06T13:52:09+00:00 June 6th, 2018|Uncategorized|0 Comments

Chrome, Firefox iframe exploit can steal Facebook profile info and other personal data

A side-channel attack on CSS could expose your personal data to malicious websites, unless you update your browser immediately.   A pair of independent security researchers has revealed a serious flaw in cascading style sheets (CSSes) that could leave private user data exposed to malicious websites. The exploit allows a malicious website to steal Facebook [...]

By | 2018-06-04T14:54:44+00:00 June 4th, 2018|Uncategorized|0 Comments

The 6 reasons why we’ve failed to stop botnets

A joint report from the Department of Commerce and the Department of Homeland Security says fighting botnets requires industry and government collaboration.   A joint report issued Wednesday by the Department of Homeland security and the Department of Commerce aims to outline a path to defeating botnets, but it will be no small task. The [...]

By | 2018-06-01T13:45:41+00:00 June 1st, 2018|Uncategorized|0 Comments

Trends 2018: Critical infrastructure attacks on the rise

Cyberthreats to critical infrastructure jumped into the headlines in 2017, starting with a Reuters report in January that a recent power outage in Ukraine “was a cyber-attack”. In last year’s Trends report we said that we expected infrastructure attacks to “continue to generate headlines and disrupt lives in 2017”. Sadly, we were right, and unfortunately, I have [...]

By | 2018-05-30T19:27:06+00:00 May 30th, 2018|Uncategorized|0 Comments

5-year-old IoT attack resurfaces, puts millions of devices at risk   Update: Z-Wave reached out in response and provided additional details about Z-Shave. Most critically, according to Raoul Wijgergangs, VP/GM of Z-Wave for Silicon Labs, and Lars Lydersen, senior director of product security, Silicon Labs, is that the vulnerability can't be forced from outside a Z-Wave IoT network, and the window to take advantage of [...]

By | 2018-05-29T13:16:40+00:00 May 29th, 2018|Uncategorized|0 Comments

GDPR: One rule to rule them all – legally

There is a certain similarity between J. R. R. Tolkien’s The Lord of the Rings trilogy and General Data Protection Regulation (GDPR) coming to force tomorrow, May 25 2018. As weird as it may sound, the regulation puts in place standards identical to those of the One Ring – GDPR is here to rule the world of data protection [...]

By | 2018-05-25T18:17:02+00:00 May 25th, 2018|Uncategorized|0 Comments