Loose .zips sink chips: How poisoned archives can hack your computer

Booby-trapped archive files can exploit vulnerabilities in a swath of software to overwrite documents and data elsewhere on a computer’s file system – and potentially execute malicious code.

Specifically, the flaws, dubbed “Zip Slip” by its discoverers at security outfit Snyk, is a path traversal flaw that can potentially be exploited to perform arbitrary code execution attacks. It affects certain tools that handle .zip, .tar, .war, .cpio, and .7z formats.

Complete Article

Intel, Microsoft to use GPU to scan memory for malware

Since the news of the Meltdown and Spectre attacks earlier this year, Intel has been working to reassure the computer industry that it takes security issues very seriously and that, in spite of the Meltdown issue, the Intel platform is a sound choice for the security conscious.

To that end, the company is announcing some new initiatives that use features specific to the Intel hardware platform to boost security. First up is Intel Threat Detection Technology (TDT), which uses features in silicon to better find malware.

Complete Article

Tenable Research Discovers Vulnerability in Critical Infrastructure

Tenable®, Inc., the Cyber Exposure company, recently discovered a critical remote code execution vulnerability in two Schneider Electric applications used in manufacturing, oil and gas, water, automation and wind and solar power facilities. If exploited, the vulnerability could give cybercriminals complete control of the underlying system. Attackers would also be able to use the compromised system to move laterally through the network, exposing additional systems to attack, including human-machine interface (HMI) clients. In a worst case scenario, attackers could use the vulnerability to disrupt or even cripple plant operations.

Complete Article

The AI cybersecurity arms-race: The bad guys are way ahead

For its recently released 2018 State of Cyber Resilience study, Accenture surveyed 4,600 enterprise security practitioners representing companies with annual revenues of $1 billion or more in 15 countries. 83% of respondents to the survey agree that advanced technologies are essential and they would commit funding to them if they could. But only 40% are investing in AI, machine learning, and automation technologies to improve their security defenses.

Complete Article

A lack of cybersecurity funding and expertise threatens U.S. infrastructure

Most leaders in infrastructure-related industries take cyber risk seriously, but their public sector counterparts need to start addressing vulnerabilities with more urgency. Many experts and pundits are already pressuring lawmakers and regulators to take more decisive action across all of our physical systems. Despite this pressure, there are a number of obstacles that need to be addressed alongside the implementation of new policies.

Complete Article

4 telecom companies form a cybersecurity alliance. What will the impact be?

Telecom alliance

The four telecom companies – Singapore’s Singtel, Japan’s Softbank, United Arab Emirates’ Etisalat and Spain’s Telefonica – are creating the Global Telco Security Alliance. The alliance members say they expect to share intelligence on cyber threats and leverage their global reach, assets and cybersecurity capabilities to serve customers worldwide.

Complete Article

Why router-based attacks could be the next big trend in cybersecurity

-Routers have recognizable flaws that are subject to penetration. Open vulnerabilities must be recognized in our cybersecurity efforts.

Routers are high value targets for attacks. Given the position routers play in normal network operations,
the ability to utilize these devices in man-in-the-middle attacks is extremely attractive for attackers.
Considering the multitude of models router vendors produce — and the difficulty of supporting and updating so
many devices — the relative insecurity of routers (particularly devices intended for home or home office use)
makes these devices low hanging fruit for hackers.

Complete Article

Top cyber security certifications: Which certs do you need?

Are you wondering what certs you may need to pursue a career in cybersecurity?

Cybersecurity jobs are requiring candidates to obtain and maintain certifications in the industry.
The following article goes into further detail on which cert to focus on.

Two of the most common questions i’m asked are, “Is having a computer security certification
helpful in getting a job or starting a career in computer security?, and if so, “Which certification
should someone get?” The answer to the first question is a definite yes. Getting a certification, while
not a cumulative showing of your entire experience and knowledge in a particular area, can only help you.

Complete Article

Cybersecurity engineering: A new academic discipline

Cybersecurity analyst’s are among the top paid in the industry

According to the U.S. Department of Labor’s Bureau of Labor Statistics,
the median pay in 2018 for a cybersecurity analyst is likely to reach well
over $100,000.

With 3.5 million cybersecurity jobs expected to open by 2021, employers
will continue to seek out prospective job candidates from technical schools
and undergraduate programs to fill them.

Complete Article