Top 4 global security threats businesses will face in 2017

While the political, social and economic implications are not fully clear, gigabit connectivity represents a significant overnight leap forward. This will enable the IoT and a new class of applications to emerge that will “exploit the combination of big data, GPS location, weather, personal-health monitoring devices, industrial production and much more. Connectivity is now so…

Obama’s cybersecurity plan faces uncertainty with Trump

U.S. consumers could one day see cybersecurity ratings on technology products, much like today’s EnergyStar ratings, if the findings of a government-sponsored cybersecurity commission are heeded. Although like much in Washington right now, a lot depends on  incoming U.S. President Donald Trump and his views on cybersecurity are far from clear. The report, published on…

Millions of User Accounts Allegedly Stolen From Dailymotion

Data breach notification service LeakedSource has obtained a database containing the details of roughly 85 million Dailymotion users, including usernames, email addresses and, in many cases, passwords. According to LeakedSource, the database stores 87 million records with 85 million unique email addresses. More than 18 million of the entries also include password hashes. LeakedSource said…

Where Cybercriminals Go To Buy Your Stolen Data

With nothing more than a standard Web browser, cyber-criminals can find personal, private information all over the public Internet. It isn’t just legitimate services – from genealogy sites to public records and social media – that can be mined and exploited for nefarious purposes. Openly malicious criminal activities are also happening on the public Internet….

The Threat Model of 2017

The threat model is one of the most basic tools IT professionals use to analyze security incidents and scenarios. It is the first stop along the security path where potential hazards can be identified and quantified. Threat models involve judgments about which threats are important to a particular situation. An automated tool that simply lists…

San Francisco’s Muni transit system reportedly hit by ransomware

San Francisco’s Muni transit system was reportedly hit by ransomware since Friday, leading to the message “You Hacked, ALL Data Encrypted” being displayed on the computer screens at stations, according to newspaper reports. The message asked that cryptom27 at yandex.com should be contacted for the key to unlock the data.

Configuring the Windows firewall

Show of hands—How many of you have heard someone say something like this: “You don’t need an extra firewall. The one that comes with Windows is sufficient for home users”. While this may be true for the default settings when it comes to protection, how many who have heard this remark are able to check…