Category: IT Security

Defender ATP security to Windows 7 PC

Microsoft opens top-tier Defender ATP security to Windows 7 PCs Windows Defender ATP, which can detect ongoing attacks on corporate networks and recommend a response, is now available for Windows 7 and 8.1. Microsoft’s Windows Defender Advanced Threat Protection (ATP) service is now available for PCs running Windows 7 and Windows 8.1.   The decision to add devices powered by those operating systems was first announced a year ago. At the time,…

IPv4 Versus IPv6

Is The Internet Facing A Split? “Many players in the ISP segment are aware of the issues and the urgency to act.” The Internet is facing a technical split, we are entering into a future where it contains two sets of underlining Internet Protocols: IPv4 and the newest version IPv6. This is according to a new study published Wednesday by the Georgia Institute of Technology’s Internet Governance Project. A key finding of…

The cybersecurity legislation agenda

The cybersecurity legislation agenda: 5 areas to watch The 116th Congress is only a few months old, but far-reaching cybersecurity bills to protect infrastructure and the supply chain, ensure election integrity, and build a security workforce are now being considered. Here’s the list. New digital threats that could topple business, government, military, and political institutions are moving cybersecurity to the top of the congressional agenda.   The newly seated 116th Congress…

GandCrab Ransomware Slingers Target MSPs

GandCrab Ransomware Slingers Target MSPs A software company has been forced to remind customers to patch a two-year-old flaw in a third-party plug-in, after reports it is being exploited to infect scores of companies with GandCrab ransomware via their managed security provider (MSP). The issue relates to CVE-2017-18362, a flaw that affects the Connectwise Manage plug-in for the Kaseya VSA remote-monitoring tool. ConnectWise Manage is a professional services automation (PSA) product popular among…

Average DDoS attack volumes increase by 194%

Average DDoS attack volumes grew by 194% in 12 months The volume and complexity of DDoS attacks continued to grow in Europe during the final quarter of 2018, according to Link11. While Link11’s Security Operations Center (LSOC) registered 13,910 attacks in Q4 (12.7% down compared to Q3), the average attack volume grew by 8.7% to 5Gbps, and 59% of attacks used multiple attack vectors. Key findings of Link11’s Q4 DDoS report include:…

End to end security solution for LoRaWAN

Microchip and The Things Industries announce industry’s first end-to-end security solution for LoRaWAN devices CryptoAuthentication™ device and managed LoRa join servers enable developers to deploy secure connected applications on LoRaWAN™ networks. As the LoRa® (Long Range) technology ecosystem accelerates, security remains an area for improvement in the market due to vulnerabilities that leave the network and application server keys accessible in the memory of modules and microcontrollers (MCUs) paired with…

Mac Malware Targets Cryptocurrency Wallets

New Mac Malware Targets Cookies to Steal From Cryptocurrency Wallets Mac users need to beware of a newly discovered piece of malware that steals their web browser cookies and credentials in an attempt to withdraw funds from their cryptocurrency exchange accounts. Dubbed CookieMiner due to its capability of stealing cookies-related to cryptocurrency exchanges, the malware has specifically been designed to target Mac users and is believed to be based on DarthMiner, another…

The Financial Impact of Data Breach?

Worried About the Financial Impact of Data Breach? 5 Reasons to Insure Given the complexities and ever-changing threats, it is important to be as proactive as possible. Despite the rising cost of data breaches, most organisations are unprepared to deal with the financial and reputational repercussions. Joe Collinwood Founder and CEO of CySure explains why cyber insurance is a business essential. The cyber risk remains a key concern for every boardroom and…

5 Resolutions for Your IoT Security Strategy

A new year has arrived, and with it comes the opportunity to make all kinds of transformations to help your business. No matter how you navigated the dangerous threat landscape during the past years, it’s time for all of us in operational technology (OT) security to make firm decisions to do or not do something for the safety of our business and environment. This year, we will see more breaches where bad…