Salted Hash: RSA Conference 2017 – Live Blog

All this week, Salted Hash will be on location at the RSA Conference in San Francisco. We’ll be updating the blog multiple times a day with news and other content from the show – so check-back often. Yesterday, we mentioned a lawsuit filed by CrowdStrike, which attempted to prevent NSS Labs from releasing test results…

‘Shock And Awe’ Ransomware Attacks Multiply

RSA CONFERENCE 2017 – San Francisco – The data-hostage crisis isn’t going away anytime soon:  In fact, it’s starting to get a lot scarier and destructive, and with a more unpredictable outcome. Security experts long have warned that ponying up with the ransom fee only plays into the hands of ransomware attackers; it doesn’t necessarily…

IaaS Creating New Variant of Shadow IT

Organizations cannot rely on commercial off-the-shelf (COTS) software to fulfil all their IT requirements: almost all companies develop their own custom apps. The majority of these apps, whether internal or internet-facing, currently run on datacenters owned or operated locally. By the end of 2017 this will change — the majority of enterprise custom apps will…

Simulation Shows Threat of Ransomware Attacks on ICS

Researchers at the Georgia Institute of Technology have demonstrated the potential impact of ransomware on industrial control systems (ICS) by simulating an attack aimed at a water treatment plant. David Formby, a Ph.D. student in the Georgia Tech School of Electrical and Computer Engineering, and his faculty advisor, Raheem Beyah, identified several commonly used programmable…

Privacy groups claim FBI hacking operation went too far

Privacy advocates are claiming in court that an FBI hacking operation to take down a child pornography site was unconstitutional and violated international law. That’s because the operation involved the FBI hacking 8,700 computers in 120 countries, based on a single warrant, they said.

Are companies doing enough on the IoT security front?

We continue to hear dire warnings about the inherent security risks of the Internet of Things (IoT), and indeed IoT-related incidents are happening. With many companies beginning to capture IoT data from connected devices, a key question is are they doing enough to ensure that data and networks are secure? If security executives thought they…

Keep Employees Secure, Wherever They Are

As workers grow more dispersed, organizations need to focus on three areas to maintain security. Nearly 80% of professionals work remotely at least one day a week, and 1.55 billion others are expected to work outside the boundaries of the corporate office by 2020, according to Frost & Sullivan research. This shift to a mobile…

How AI is stopping criminal hacking in real time

Almost every day, there’s news about a massive data leak — a breach at Yahoo that reveals millions of user accounts, a compromise involving Gmail phishing scams. Security professionals are constantly moving the chess pieces around, but it can be a losing battle. Yet, there is one ally that has emerged in recent years. Artificial…