Experts Stress Better Election Security Following DefCon Report

There has been a lot of rumor and speculation about the 2016 U.S. presidential election and the possibility that the results were manipulated or hacked in some way. While investigations continue and there is no hard evidence I am aware of that any succ… Continue reading Experts Stress Better Election Security Following DefCon Report

Three-year old startup Vera scores huge deal to protect all of GE’s IP

 When Box landed GE as a customer in 2014, it marked a turning point for the cloud content management company, giving them momentum ahead of their IPO. Three years later, Vera, a data rights management startup is getting a similar feeling, announcing GE’s 300,000 employees would be using Vera to protect the company’s intellectual property as it moved through the world. “This… Read More Continue reading Three-year old startup Vera scores huge deal to protect all of GE’s IP

Extortion hacks have completely rattled the entertainment industry

Chris Unthank, the director of digital systems for Larson Studios, was in a panic this past December. The company he works for, a California-based postproduction studio, had apparently been hacked. Files containing the company’s work were being held hostage by a criminal known as TheDarkOverlord. Among the property stolen was 10 episodes of the new season of Netflix’s show “Orange is the New Black.” Unthank found all of the studio’s data stolen and deleted, and the hackers demanded payment via bitcoin in exchange for the data’s safe return. “Once I was able to look at our server, my hands started shaking, and I almost threw up,” Unthank told Variety in an interview. TheDarkOverlord demanded 50 bitcoin, roughly $50,000, to not leak the unaired episodes of the Netflix series. After conferring with federal law enforcement, studio President Rick Larson and his wife and business partner Jill Larson negotiated with hackers and […]

The post Extortion hacks have completely rattled the entertainment industry appeared first on Cyberscoop.

Continue reading Extortion hacks have completely rattled the entertainment industry

New infosec products of the week​: June 16, 2017

Uplevel Systems unveils managed VPN service infrastructure Uplevel Systems has added VPN capabilities to its hybrid managed service platform to help providers differentiate and increase profitability. Uplevel delivers the core IT elements small businesses need most – wired and Wi-Fi networking, storage and backup, and security – through one device installed at the customer site and managed by providers via the cloud. Waterfall Security adds Microsoft Azure support to its Unidirectional CloudConnect offering Waterfall Security … More Continue reading New infosec products of the week​: June 16, 2017

New infosec products of the week​: December 16, 2016

Ixia enhances network assessment and monitoring platform Ixia’s Hawkeye, which proactively generates and analyzes synthetic network and application traffic to assess how applications and services will perform, now includes proactive monitoring of Wi-Fi readiness. Expanded coverage in Hawkeye spans WANs, LAN VPNs and cloud access to WLAN architectures. As a result, Hawkeye can validate that complex business-critical services over Wi-Fi are available 24×7. First digital identity certificate for drones Drone ID is a publicly-trusted SSL/TLS … More Continue reading New infosec products of the week​: December 16, 2016

65% of Windows devices still running Windows 7, released in 2009

To analyze the current state of device security, Duo Security analyzed more than two million devices, 63 percent of which were running Microsoft operating systems. Seriously outdated Windows versions Researchers found that 65 percent of all Windows devices are running Windows 7, affected by approximately 600 security vulnerabilities. To make things even more dangerous, tens of thousand of devices are still running Windows XP 15 years after its release. This represents more than 700 vulnerabilities, … More Continue reading 65% of Windows devices still running Windows 7, released in 2009

Why attaching security to each piece of data is critical

Following in Edward Snowden’s footsteps, yet another NSA contractor has leaked highly classified trade secrets and government information. My question to you: Are we really all that surprised? What’s most alarming is that even if the NSA had the best security measures in the world, what does this say about the our overall state of security? Executives, government officials and politicians especially, are paying close attention to cybersecurity, but it’s clear that a fundamental change … More Continue reading Why attaching security to each piece of data is critical

How to choose a perfect data control solution for your enterprise

Not long ago, people used to come to work and work off of a desktop computer, tied to the network. Today, they work on their mobile devices, physically untethered to it. In fact, the majority of the work and email is done on mobile devices, and this changed how people interact with data and how we keep it safe. Prakash Linga at Vera HQ This shift is why it’s important for businesses to maintain a … More Continue reading How to choose a perfect data control solution for your enterprise

Flawed code hooking engines open endpoints to compromise

Six common security issues stemming from the incorrect implementation of code hooking and injection techniques have been unearthed by EnSilo researchers in over 15 different products, including anti-virus (AV) and anti-exploitation solutions, data loss prevention software (DLP) and host-based intrusion-prevention systems (HIPS). The fact that some of these issues also affect three different hooking engines, including the most popular one (Microsoft Detours), means that thousands of product are likely affected – and not just security … More Continue reading Flawed code hooking engines open endpoints to compromise