US transport agency guidance on vehicle cybersecurity irks lawmakers

Guidance from the National Highway Traffic Safety Administration for improving motor vehicle cybersecurity has attracted criticism from lawmakers who said that mandatory security standards were required. “This new cybersecurity guidance from the Department of Transportation is like giving a take-home exam on the honor code to failing students,” said Senators Edward J. Markey, a Democrat…

Black Hat Europe 2016 S:  How Artificial Intelligence Will Liberate Security

T. Kuhn’s The Structure of Scientific Revolution outlined an episodic model in which periods of “normal science” were interrupted by periods of “revolutionary science.” It challenges us as a society to consider new paradigms, to change the rules of the game, our standards and our best practices. The advent of applied Artificial Intelligence (AI), also…

Cybercrime not slowing down anytime soon

In Q3 2016, cybercriminals were increasingly more ingenious, using innovative technologies and new tools to spread their wares. This is confirmed by the 18 million new malware samples captured by PandaLabs in this quarter alone, an average of 200,000 each day. Measuring cybercrime is very complex. Cybersecurity professionals who combat these threats on a daily…

Software updates are critical, so automate them

Why do we need to update our software, anyway? Well, the first thing to understand is that there are different kinds of updates. Some of them add new features or improve existing ones. Others make your software compatible with other programs, different protocols, new or updated operating systems, and so forth. With greater compatibility you’ll…

IDG Contributor Network: Fasten your seatbelt in the IoT cybersecurity race

Using very old and simple techniques such as brute force attacks, cybercriminals are gaining control over a population of insecure internet of things (IoT) devices with arsenals of malware. Brian Krebs’ website was recently targeted in the largest ever distributed denial-of-service (DDoS) attack. The source code that powered the IoT botnet responsible for the attack…

Easy-to-exploit rooting flaw puts Linux computers at risk

The maintainers of Linux distributions are rushing to patch a privilege escalation vulnerability that’s already being exploited in the wild and poses a serious risk to servers, desktops and other devices that run the OS. The vulnerability, tracked as CVE-2016-5195, has existed in the Linux kernel for the past nine years. This means that many…