AC/DC Act: Good in Theory, Terrible in Practice

Earlier this month, Georgia Congressman Tom Price introduced H.R. 4036, the Active Cyber Defense Certainty Act (AC/DC Act). The legislation would permit certain “victims” of cyberattacks to engage in certain types of “active defense” or “hack back” free from both civil and criminal liability under the Computer Fraud and Abuse Act. It would also empower..

The post AC/DC Act: Good in Theory, Terrible in Practice appeared first on Security Boulevard.

Continue reading AC/DC Act: Good in Theory, Terrible in Practice

SecBlvd Chats: Aqua Security Seeks to Lock Down Container Security

The migration to container-based application infrastructure is accelerating at a faster pace even than we saw with hypervisor-based infrastructure 18 or so years ago. Hand in hand with this is the race to provide better security solutions that are native to—and purpose-built for—containerized environments. Aqua Security is one such company doing that. It has established..

The post SecBlvd Chats: Aqua Security Seeks to Lock Down Container Security appeared first on Security Boulevard.

Continue reading SecBlvd Chats: Aqua Security Seeks to Lock Down Container Security

Sowbug Cyberespionage Group Hits South America, South Asia

Security researchers have identified a cyberespionage group that has been stealing data from policy and diplomatic organizations in South America and South Asia since at least 2015. “While cyberespionage attacks are often seen against targets in the U.S., Europe, and Asia, it is much less common to see South American countries targeted,” researchers from Symantec..

The post Sowbug Cyberespionage Group Hits South America, South Asia appeared first on Security Boulevard.

Continue reading Sowbug Cyberespionage Group Hits South America, South Asia

Russia: An Expert in Active Measures, Including Cyber Meddling

Russia, neatly tucked away in the rather large northeast corner of Europe and Asia with its 11 time zones, is the bastion of a most colorful political history. Since time immemorial there has always been underlying efforts to adjust perception, foment … Continue reading Russia: An Expert in Active Measures, Including Cyber Meddling

Fake WhatsApp on Google Play Shows How Easy Users Can Be Tricked

Google removed a rogue version of the WhatsApp Messenger application from Google Play that had been installed by more than 1 million people. A subsequent search by users and researchers revealed that it was one of many similar fake apps hosted on the a… Continue reading Fake WhatsApp on Google Play Shows How Easy Users Can Be Tricked

Fancy Bear Cyberspies Hide Phishing Pages Behind Blogspot Links

Security researchers have identified a new phishing campaign launched by Russian cyberespionage group Fancy Bear that uses rogue blogspot.com URLs to bypass spam filters. These latest attacks were aimed at Bellingcat, a group of volunteers who perform … Continue reading Fancy Bear Cyberspies Hide Phishing Pages Behind Blogspot Links

Hezbollah Amplifies Message Through Savvy Use of Media

Hezbollah, the “Party of Allah” (aka Party of God) recognized as a Shi’a Islamist political party and militant group based in Lebanon, has repeatedly demonstrated its mastery of the use of media and social networks to shape public opinion and grow sympathetic followers. Even recently the group has placed its operatives within Israel to regularity..

The post Hezbollah Amplifies Message Through Savvy Use of Media appeared first on Security Boulevard.

Continue reading Hezbollah Amplifies Message Through Savvy Use of Media

New Trojan ‘Silence’ Uses Stealth to Attack Banks

Security researchers have discovered a new attack against financial organizations, in which hackers break into their infrastructure and stay lurking for months to learn their internal procedures before starting to steal money. Because of the extended period of time when attackers monitor and learn the behavior of their victims, researchers have dubbed the Trojan program..

The post New Trojan ‘Silence’ Uses Stealth to Attack Banks appeared first on Security Boulevard.

Continue reading New Trojan ‘Silence’ Uses Stealth to Attack Banks

Update Your WordPress Website Now, Researcher Warns

WordPress version 4.8.3, released Oct. 31, fixes a serious security issue that could result in SQL injection attacks. Details about the vulnerability are now public, so attacks could soon follow. “If you haven’t updated yet, stop right now and update,” Anthony Ferrara, VP of engineering at Lingo Live and the researcher who identified the flaw..

The post Update Your WordPress Website Now, Researcher Warns appeared first on Security Boulevard.

Continue reading Update Your WordPress Website Now, Researcher Warns

Supreme Court to Decide Major Internet Privacy and Jurisdiction Case

We love the cloud. We store our documents there. Our e-mails travel through cloud or other third-party providers. Now the U.S. Supreme Court is poised to decide whether the physical location of both the communications or documents themselves, or the lo… Continue reading Supreme Court to Decide Major Internet Privacy and Jurisdiction Case