Access Management Resolution in the Digital Era

There seems to be continuing confusion about what access management means. In layman’s terms, accessing an application implies the process of authentication — i.e., opening a browser or accessing a link — where you may be prompted to enter your credentials. If the user provides the right set of credentials, he or she gains access…

Protecting smart hospitals: A few recommendations

The European Union Agency for Network and Information Security (ENISA) has released a new report to help IT and security officers of healthcare organizations implement IoT devices securely and protect smart hospitals from a variety of threats. We all know that attacks against hospitals are increasing, but according to security experts, ransomware and DDoS attacks…

Microsoft’s EMET Protects Apps Better Than Windows 10, Researcher Says

While packed with a load of new security features, Window 10 doesn’t offer some of the additional protections that Microsoft’s Enhanced Mitigation Experience Toolkit (EMET) brings, CERT vulnerability analyst Will Dormann warns. Released in 2009, EMET was meant to provide mitigation against certain zero-day software vulnerabilities, filling a gap created by the release of major…

San Francisco’s Muni transit system reportedly hit by ransomware

San Francisco’s Muni transit system was reportedly hit by ransomware since Friday, leading to the message “You Hacked, ALL Data Encrypted” being displayed on the computer screens at stations, according to newspaper reports. The message asked that cryptom27 at yandex.com should be contacted for the key to unlock the data.

Tips to shop safely on Cyber Monday

As consumers gear up for Cyber Monday, the largest online shopping day of the year, cybercriminals are also preparing to take advantage of deal-seekers. IBM X-Force researchers are monitoring malicious activity closely to help organizations and consumers stay safe during the holiday shopping season. Researchers have already seen cybercriminals actively masking malicious malware in emails…

Researchers Demo Method For Turning A PC Into An Eavesdropping Device

Researchers at Israel’s Ben-Gurion University of the Negev have devised a way to turn any computer into an eavesdropping device by surreptitiously getting connected headphones or earphones to function like microphones. In a paper titled “SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit,” the researchers this week described malware they have developed for reconfiguring…

NTP fixes denial-of-service flaws

The Network Time Foundation’s Network Time Protocol Project has patched multiple denial-of-service vulnerabilities with the release of ntp-4.2.8p9. The last update to the open source protocol used to synchronize computer clocks was in June. “NTP users are strongly urged to take immediate action to ensure that their NTP daemons are not susceptible to being used…

BrandPost: Desperately seeking cybersecurity help

Security executives desperate to fill cybersecurity openings face the worst IT skills shortage in memory with the workforce gap in the information security field expected to reach 1.5 million cybersecurity job openings by 2019. The White House grew so concerned that it introduced the Cybersecurity National Action Plan earlier this year. The government’s investment to…