New DDoS attacks misuse NetBIOS name server, RPC portmap, and Sentinel licensing servers
Akamai has observed three new reflection DDoS attacks in recent months: NetBIOS name server reflection, RPC portmap reflection, and Sentinel reflection.In a reflection DDoS …
Are IT security pros optimistic or naïve?
Half of IT security practitioners in the U.S. view their organization as an unlikely target for attack, according to a Ponemon Institute survey of 614 IT security …
Attackers are turning MySQL servers into DDoS bots
Someone has been compromising MySQL servers around the world and using them to mount DDoS attacks. The latest targets of these attacks are an (unnamed) US hosting provider and …
US Library of Congress makes tinkering with your car software legal
The US Digital Millennium Copyright Act (DMCA) makes it illegal to circumvent technological measures used to prevent unauthorized access to copyrighted works. But, there are …
What can we expect from 2016? A growth in online extortion, hacktivism and mobile malware
Next year, continued growth in online extortion, hacktivism and mobile malware is expected, as well as a shift to an offensive cybersecurity posture for government entities …
The security community’s reaction as CISA passes US Senate
On Tuesday, the US Senate has passed the Cybersecurity Information Sharing Act (CISA), a legislation that will allow companies to share information about the cyber attacks …
Europe’s new “net neutrality” regulation is full of loopholes
The European Parliament voted yesterday for a Regulation on a Single Market for Electronic Communications. The new regulation brings a complete ban on roaming charges for …
Social experiment: 200 USB flash drives left in public locations
Nearly one in five people who found a random USB stick in a public setting proceeded to use the drive in ways that posed cybersecurity risks to their personal devices and …
One in 20 apps on private PCs are end-of-life
Secunia Research revealed the state of security for PC users in a total of 14 countries, including the US. One in 20 applications on private US PCs are end-of-life and 12 …
The average organization experiences 9 insider threats each month
After analyzing actual cloud usage across over 23 million employees, Skyhigh Networks uncovered how user behaviours put companies at risk and how catching and managing this …
How can we decide on surveillance and privacy when we can’t see the whole picture?
“The surveillance of communications faces a legitimization crisis,” says James Losey, a fellow with the Open Technology Institute, the technology program of the …
Regin spyware found on German Chancellery staff’s personal laptop
The German Federal Prosecutor’s Office has started an investigation regarding the discovery of the infamous Regin backdoor on the private laptop owned by a staff member …
Featured news
Resources
Don't miss
- Signal blocks Microsoft Recall from screenshotting conversations
- The hidden gaps in your asset inventory, and how to close them
- CTM360 report: Ransomware exploits trust more than tech
- Lumma Stealer Malware-as-a-Service operation disrupted
- Data-stealing VS Code extensions removed from official Marketplace