Symantec: Look for cryptojacking to tie into IoT devices

In its newest yearly report, cybersecurity giant Symantec says internet-connected devices are becoming an attractive target for hackers looking to hijack processing power to mine cryptocurrency. The Internet Security Threat Report, which looks back on threat trends for 2017, states cryptojacking — co-opting unsuspecting users’ CPU power to mine cryptocurrency — was one of the biggest growth areas in cybercrime last year. Combine that threat with an overall increase in attacks on devices that make up the Internet of Things, and there is now a wide new target for criminals to potentially exploit for financial gain. “Symantec already found a 600 percent increase in overall IoT attacks in 2017, which means that cyber criminals could exploit the connected nature of these devices to mine en masse,” the report says. The company has seen some instances of connected devices being used to mine for cryptocurrency, according to Kevin Haley, director of Symantec Security Response. He anticipates growing […]

The post Symantec: Look for cryptojacking to tie into IoT devices appeared first on Cyberscoop.

Continue reading Symantec: Look for cryptojacking to tie into IoT devices

Domino’s recipe for good enterprise cybersecurity

A good team and a proactive mindset are key for companies that want to respond in the event of a cybersecurity incident, says John Gift, director of information security at Domino’s Pizza. Gift would know. Tasked with helping Target Corp. respond in the wake of its well-known data breach in 2013, Gift has used the lessons he’s learned from that high-profile incident to shape the way Domino’s deals with its security challenges. Gift was drawn to Domino’s three years ago because of the company’s culture, including its supportive executives. He works out of the company’s Ann Arbor, Michigan headquarters, and reports directly to Domino’s Chief Information Security Officer. The security team at Domino’s has grown to around 30, Gift said. CyberScoop caught up with Gift at South By Southwest in Austin, just after he finished speaking on a panel dubbed “Welcome to the ‘Internet of Threats.’”  CyberScoop: What’s keeping you […]

The post Domino’s recipe for good enterprise cybersecurity appeared first on Cyberscoop.

Continue reading Domino’s recipe for good enterprise cybersecurity

Infosec experts to consumers: You’ve got the power

Consumers need to use their buying power to send a message that they value security, experts said Saturday during a panel at the 2018 South by Southwest Interactive Conference in Austin. The panel, dubbed “Welcome to the ‘Internet of Threats’” intended to break down concerns in a rapidly-changing security landscape where more and more devices are being connected to the internet.  These devices sometimes have no reason to be connected to the internet and often come from companies that have spent little time considering privacy or security matters. “How many of you are quite used to seeing something in the news around a data breach, or product that was insecure?” said John Gift, director of information security at Domino’s Pizza, during the panel.  “A lot of these organizations, they do recover relatively quickly, which is a great thing, but… understand your power with regards to: if something does happen and […]

The post Infosec experts to consumers: You’ve got the power appeared first on Cyberscoop.

Continue reading Infosec experts to consumers: You’ve got the power

Pentagon hackers-for-hire take just 4 hours to find critical vulnerability in sensitive system

This article first appeared on FedScoop. The Pentagon’s cybersecurity swat team has hosted highly-publicized challenges to find flaws in department and military branch websites, but it also recently orchestrated a more secret, complex project. The Defense Digital Service wanted to hire outside researchers to root out vulnerabilities in systems carrying sensitive department data — but without worrying about compromising the […]

The post Pentagon hackers-for-hire take just 4 hours to find critical vulnerability in sensitive system appeared first on Cyberscoop.

Continue reading Pentagon hackers-for-hire take just 4 hours to find critical vulnerability in sensitive system