Sign up for our weekly newsletter!
REGISTER NOW
Blogs
Content posted in November 2018
UPnProxy Still Infecting Thousands of Home & Small Business Routers
Larry Loeb  
11/30/2018   12 comments
An analysis by Akamai finds that UPnProxy is still out in the wild and still targeting routers mainly used in homes and by small businesses.
New Worm Helps Spread Fileless Version of Bladabindi RAT
Larry Loeb  
11/28/2018   10 comments
An updated version of the Bladabindi RAT is fileless and can now be spread through removable USB and other storage devices.
Rowhammer Vulnerability Can Bypass ECC Memory Chips
Larry Loeb  
11/27/2018   17 comments
New research finds that the Rowhammer vulnerability can be adjusted to bypass ECC memory chips, exposing processors to an attack.
12 Cloud Backup Tips to Protect Your Business's Back-End Servers
Alan Zeichick  
11/27/2018   28 comments
The cloud can offer cost-effective backups for enterprise web servers, file servers and other critical infrastructure. Here are a dozen tips on how to make cloud backups safe and efficient.
Carbon Black: Cyber Attacks Could Jump 60% During Holidays
Jeffrey Burt  
11/26/2018   20 comments
Spear-phishing campaigns are the most common form of attack as shoppers go to the stores and online and employees hit the road, according to a survey from Carbon Black.
GDPR Presents New Challenges in Backup & Disaster Recovery Management
Joe Stanganelli  
11/23/2018   3 comments
GDPR applies not only to primary systems, but also to backup and recovery systems. Cloud storage, combined with a modicum of common sense, may prove essential to helping with GDPR compliance for these systems.
Perceptual Ad Blockers Have Security Flaws, Too
Larry Loeb  
11/22/2018   15 comments
Blocking ads is more than stopping annoying pop-ups. There's a security component as well. However, a crop of perceptual ad blockers that use machine learning have their own flaws and shortcomings.
Geoblocking, Even at Low Levels, Restricts Internet Freedom – Study
Larry Loeb  
11/21/2018   Post a comment
A new research paper from the University of Michigan and Cloudflare finds that geoblocking or geofencing is not as extensive as some believe. However, even at low levels, this practice can restrict Internet freedom.
IoT Security Problems Can Cost Enterprises Millions
Jeffrey Burt  
11/20/2018   Post a comment
A survey by DigiCert finds that the IoT is a priority for most companies, but many enterprises struggle when it comes to security and privacy. This can translate into firms losing millions.
Employees Traveling This Holiday? Don't Forget Good Security Practices
Larry Loeb  
11/19/2018   Post a comment
A survey finds that employees are more likely to bypass good security practices when they travel during the holiday season, but still log onto the corporate network to work.
Security Concerns Increasing as BYOD Programs Continue to Grow
Jeffrey Burt  
11/19/2018   1 comment
Businesses are expanding their BYOD programs to include partners, customers and others, but most are behind in securing their mobile environments, according to a Bitglass survey.
New Spectre & Meltdown Attacks Show Limits of CPU Vulnerabilities
Larry Loeb  
11/16/2018   8 comments
A group of researchers from Belgium, Austria and the US have uncovered more Spectre and Meltdown flaws in CPU architectures, but their paper also shows the limits of these vulnerabilities in real-world attacks.
Google Data Center Traffic Rerouted to Nigeria, China & Russia
Larry Loeb  
11/14/2018   4 comments
For over an hour this week, some Internet traffic from Google's data centers was rerouted through a Nigerian ISP and possibly sent to Russia and China.
Metamorfo Trojan Revamped to Evade Antivirus Protections
Larry Loeb  
11/12/2018   1 comment
The Metamorfo Trojan, which has targeted banks and other financial institutions in Brazil, has been revamped by threat actors to better evade antivirus and other security protections.
DJI Drones Buzzed Over Security Flaw in Company's User Forum
Larry Loeb  
11/9/2018   3 comments
Check Point researchers found a flaw in the DJI's online user forum that could allow an attacker to access and steal information from one of the company's drones.
'Outlaw' IRC Bot Roughs Up Windows & Open Source Environments
Larry Loeb  
11/7/2018   Post a comment
Trend Micro is having a showdown with a IRC bot developed by a group dubbed 'Outlaw,' which is targeting Windows, Ubuntu and even Android environments.
'BLEEDINGBIT' Bluetooth Vulnerability Leaves Enterprises Exposed to Attacks
Larry Loeb  
11/5/2018   5 comments
Security firm Armis has found two, zero-day vulnerabilities in the BLE protocol of Texas Instrument chips that researchers call 'BLEEDINGBIT.'
On Eve of 2018 Midterm Elections, All Eyes Still on Cybersecurity
Jeffrey Burt  
11/5/2018   2 comments
Netscout and McAfee executives talk about the myriad challenges facing state and county election officials as voting for the 2018 midterm elections is about to get underway.
RDP Attacks Prompt New Slate of Security Warnings
Larry Loeb  
11/2/2018   3 comments
Following a warning by the FBI, Trend Micro has issued its own alert about an increase in RDP attacks that have targeted enterprises all around the world.
Let's Get Physical: Why Protecting Hardware Is Essential to Good Cybersecurity
Alan Zeichick  
11/1/2018   7 comments
Enterprises need to consider physical security as part of any comprehensive cybersecurity plan.




Latest Articles
Report found that DNS Amplification contributed to the largest share, compared to other methods, of attack activities in Q2 2019.
The threat of escalation attacks and forged administration levels has plagued Kerberos authentication systems for years. Data-analytics startup Qomplx claims to do the math that solves the problem.
Global network of honeypots measured more than triple the attack traffic of the previous period, to a total of over 2.9 billion events.
But to prepare for something usually means you have an idea about what you are preparing for, no?
An emerging and increasingly sophisticated threat campaign is employing obscure file formats.
Flash Poll
Video
In a wide-ranging interview, Cisco security boss Gee Rittenhouse talks about how machine learning, AI, blockchain and other emerging technologies ...
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
Radio Shows
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2019 Light Reading, part of Informa Tech,
a division of Informa PLC. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with