Virtual Private Networks: Why Their Days Are Numbered

As companies move to the cloud and depend less on physical servers and network connections, their reliance on VPNs for security will eventually evolve, if not disappear altogether. Virtual private networks (VPNs) have for a generation been viewed as the connectivity solution for the distributed enterprise, enabling secure remote access for mobile workers and branch offices…

Thanatos Ransomware Makes Data Recovery Impossible

A newly discovered ransomware family is generating a different encryption key for each of the encrypted files but saves none of them, thus making data recovery impossible. Dubbed Thanatos, the malware was discovered by MalwareHunterTeam and already analyzed by several other security researchers. When encrypting files on a computer, the malware appends the .THANATOS extension…

A view of the global threat landscape: Cybercrime and intrusion trends

Established and well-resourced cyber operations will continue to innovate, developing new methods of distributing crimeware and incorporating advanced tactics to infiltrate, disrupt and destroy systems, according to a new report by CrowdStrike. “We’ve already seen cyber adversaries launch massive, destructive attacks that render organizations inoperable for days or weeks. Looking ahead, security teams will be under…

The global cyber war is heating up: Why businesses should be worried

Last Friday, the Department of Justice indicted 13 Russians and three Russian companies for interfering with the 2016 elections. Also last week, several countries including the U.S., the U.K., Canada, Australia, and Denmark accused Russia of being behind last summer’s NotPetya attack. “[NotPetya] was part of the Kremlin’s ongoing effort to destabilize Ukraine, and it demonstrates ever more clearly…

Google Researcher Finds Critical Flaws in uTorrent Apps

Google researcher Tavis Ormandy discovered several critical vulnerabilities in the classic and web-based versions of BitTorrent’s uTorrent application. Patches have been released, but it appears that not all flaws have been fixed properly. Ormandy found that the uTorrent Classic and the uTorrent Web apps create an HTTP RPC server on ports 10000 and 19575, respectively….

Top Experts Warn Against ‘Malicious Use’ of AI

Artificial intelligence could be deployed by dictators, criminals and terrorists to manipulate elections and use drones in terrorist attacks, more than two dozen experts said Wednesday as they sounded the alarm over misuse of the technology. In a 100-page analysis, they outlined a rapid growth in cybercrime and the use of “bots” to interfere with…

Getting Started with IoT Security in Healthcare

There’s a hazard that comes with introducing any new element into patient care whether it’s a new drug or a connected device. These four steps will help keep patients safe. It’s estimated that by 2025, more than 30 percent of all Internet of Things (IoT) devices will be dedicated to the realm of healthcare – more than…

3 Million New Android Malware Samples Discovered in 2017

More than 3 million new malware samples targeting the Android operating system were discovered in 2017, marking a slight decrease from the previous year, G Data reports. The security firm counted 3,002,482 new Android malware samples during 2017, at an average of 8,225 per day, or 343 new malware samples every hour. Although the number…

Over 30 Lawsuits Filed Against Intel for CPU Flaws

More than 30 lawsuits have been filed by Intel customers and shareholders against the chip giant following the disclosure of the Meltdown and Spectre attack methods. Three class action lawsuits were filed against Intel within a week of the Meltdown and Spectre flaws being disclosed, but the number had reached 32 by February 15, according to an annual…