Many people, particularly older folks, proudly declare they avoid using the Web to manage various accounts tied to their personal and financial data — including everything from utilities and mobile phones to retirement benefits and online banking services. The reasoning behind this strategy is as simple as it is alluring: What’s not put online can’t be hacked. But increasingly, adherents to this mantra are finding out the hard way that if you don’t plant your flag online, fraudsters and identity thieves may do it for you.
The crux of the problem is that while most types of customer accounts these days can be managed online, the process of tying one’s account number to a specific email address and/or mobile device typically involves supplying personal data that can easily be found or purchased online — such as Social Security numbers, birthdays and addresses.
Complete article on krebsonsecurity.com
Booby-trapped archive files can exploit vulnerabilities in a swath of software to overwrite documents and data elsewhere on a computer’s file system – and potentially execute malicious code.
Specifically, the flaws, dubbed “Zip Slip” by its discoverers at security outfit Snyk, is a path traversal flaw that can potentially be exploited to perform arbitrary code execution attacks. It affects certain tools that handle .zip, .tar, .war, .cpio, and .7z formats.
Complete article on theregister.co.uk
Since the news of the Meltdown and Spectre attacks earlier this year, Intel has been working to reassure the computer industry that it takes security issues very seriously and that, in spite of the Meltdown issue, the Intel platform is a sound choice for the security conscious.
To that end, the company is announcing some new initiatives that use features specific to the Intel hardware platform to boost security. First up is Intel Threat Detection Technology (TDT), which uses features in silicon to better find malware.
Complete article on arstechnica.com
Tenable®, Inc., the Cyber Exposure company, recently discovered a critical remote code execution vulnerability in two Schneider Electric applications used in manufacturing, oil and gas, water, automation and wind and solar power facilities. If exploited, the vulnerability could give cybercriminals complete control of the underlying system. Attackers would also be able to use the compromised system to move laterally through the network, exposing additional systems to attack, including human-machine interface (HMI) clients. In a worst case scenario, attackers could use the vulnerability to disrupt or even cripple plant operations.
Complete article on prnewswire.com
For its recently released 2018 State of Cyber Resilience study, Accenture surveyed 4,600 enterprise security practitioners representing companies with annual revenues of $1 billion or more in 15 countries. 83% of respondents to the survey agree that advanced technologies are essential and they would commit funding to them if they could. But only 40% are investing in AI, machine learning, and automation technologies to improve their security defenses.
Complete article on forbes.com
Just as HIPAA compliance does not guarantee security, next-generation firewalls and intrusion detection systems do not make for a comprehensive security program.
Artificial intelligence-powered threat detection and response can be very valuable – as long as it’s researched and deployed with care and planning.
Most leaders in infrastructure-related industries take cyber risk seriously, but their public sector counterparts need to start addressing vulnerabilities with more urgency. Many experts and pundits are already pressuring lawmakers and regulators to take more decisive action across all of our physical systems. Despite this pressure, there are a number of obstacles that need to be addressed alongside the implementation of new policies.
Complete article on forbes.com
The four telecom companies – Singapore’s Singtel, Japan’s Softbank, United Arab Emirates’ Etisalat and Spain’s Telefonica – are creating the Global Telco Security Alliance. The alliance members say they expect to share intelligence on cyber threats and leverage their global reach, assets and cybersecurity capabilities to serve customers worldwide.
Complete article on govinfosecurity.com
Routers are high value targets for attacks. Given the position routers play in normal network operations,the ability to utilize these devices in man-in-the-middle attacks is extremely attractive for attackers.
Considering the multitude of models router vendors produce — and the difficulty of supporting and updating so many devices — the relative insecurity of routers (particularly devices intended for home or home office use) makes these devices low hanging fruit for hackers.
Complete article on techrepublic.com
Cybersecurity jobs are requiring candidates to obtain and maintain certifications in the industry.The following article goes into further detail on which cert to focus on.
Two of the most common questions i’m asked are, “Is having a computer security certification helpful in getting a job or starting a career in computer security?, and if so, “Which certification should someone get?” The answer to the first question is a definite yes. Getting a certification, while not a cumulative showing of your entire experience and knowledge in a particular area, can only help you.
Complete article on csoonline.com