Category: Security

Security

How blockchain-based apps and sites resist DDoS attacks

GUEST: Sometimes, truth is stranger than fiction! The recent Distributed Denial-of-Service (DDoS) attacks on Final Fantasy XIV’s gaming platform are quite surreal, yet a timely signpost of where things are heading. Using traditional cyber security technology, we are playing “whack a mole” against the ever-changing DDoS attacks. We live in an age where DDoS attacks…

Security

Obama reportedly ordered implants to be deployed in key Russian networks

Enlarge (credit: Wikimedia Commons/Maria Joner) In his final days as the 44th president of the United States, Barack Obama authorized a covert hacking operation to implant attack code in sensitive Russian networks. The revelation came in an 8,000-word article The Washington Post published Friday that recounted a secret struggle to punish the Kremlin for tampering…

Security

Check Point says Fireball malware hit 250 million; Microsoft says no

Enlarge (credit: Corinne Kuhlmann ) Microsoft sparked a curious squabble over malware discovery and infection rates. At the start of the month security firm Check Point reported on a browser hijacker and malware downloader called Fireball. The firm claimed that it had recently discovered the Chinese malware and that it had infected some 250 million systems….

Security

Tech firms including Cisco, IBM, and SAP allow Russian authorities to review product source code

(Reuters) — Western technology companies, including Cisco, IBM and SAP, are acceding to demands by Moscow for access to closely guarded product security secrets, at a time when Russia has been accused of a growing number of cyber attacks on the West, a Reuters investigation has found. Russian authorities are asking Western tech companies to…

Security

How the CIA infects air-gapped networks

Enlarge / A configuration screen found in the Drifting Deadline exploit. (credit: WikiLeaks ) Documents published Thursday purport to show how the Central Intelligence Agency has used USB drives to infiltrate computers so sensitive they are severed from the Internet to prevent them from being infected. More than 150 pages of materials published by WikiLeaks…

Security

Google proposes regulation that gives law enforcement easier access to user data stored abroad

(Reuters) — Alphabet’s Google will press U.S. lawmakers on Thursday to update laws on how governments access customer data stored on servers located in other countries, hoping to address a mounting concern for both law enforcement officials and Silicon Valley. The push comes amid growing legal uncertainty, both in the United States and across the…

Security

Honda shuts down factory after finding NSA-derived Wcry in its networks

Enlarge (credit: S-8500 ) The WCry ransomware worm has struck again, this time prompting Honda Company to halt production in one of its Japan-based factories after finding infections in a broad swath of its computer networks, according to media reports. The automaker shut down its Sayama plant northwest of Tokyo on Monday after finding that…

Security

SoftBank injects $100 million into Cybereason’s security software

Cybereason , which helps companies counter cyberattacks in real time, announced today that it has received a whopping $100 million from SoftBank. “Too much of the security industry focuses on building walls, but you can’t build a big enough wall to keep the bad guys out,” wrote Cybereason cofounder and CEO Lior Div, in an…