Microsoft Sees Significant Corporate Upgrades to Windows 10

Microsoft Windows got a boost due to the increase in cyberattacks, with a 21 percent jump in sales of Windows 10 licenses last quarter, mainly to corporate clients; a 21 percent lift in bulk sales of Windows licenses and cloud services; and an expected growth of 13 percent in the current quarter. Although Windows is the most widely used operating system worldwide, PC shipments have seen no growth, says International Data Corp. Instead, the Windows 10 sales indicate a widespread move to update older software versions. Continue reading Microsoft Sees Significant Corporate Upgrades to Windows 10

Unregulated IoT Devices Now Entry Point for Elaborate Hacks

The Internet of Things is more vulnerable than previously proven. Up until now the most common attack via IoT device has been to enlist thousands of them into botnets. Another method of attack is to find entry via a weak IoT device to conduct a ransomware attack. Now, IoT security firm Senrio has demonstrated that attackers can jump from one IoT device to another, without moving through PCs and servers, making their path even harder to discover. In other words, one vulnerable IoT device can create network disruption. Continue reading Unregulated IoT Devices Now Entry Point for Elaborate Hacks

Machine Learning Used in Detection of Harmful Android Apps

The Google Play Protect detection service, which scans Android apps for malicious activity, is enabled on more than 2 billion devices and detected 60.3 percent of Potentially Harmful Apps (PHAs) in 2017 using machine learning, according to Google’s Android Security 2017 Year in Review report. Google removed over 700,000 apps for violating its policies last year. While Play Protect uses a variety of tactics, machine learning is highly effective for catching PHAs, detecting things like inappropriate content, impersonation, and malware.

Continue reading Machine Learning Used in Detection of Harmful Android Apps

WPA2 Wi-Fi Flaw Revealed, Android & Linux Most Vulnerable

According to researchers, the WPA2 protocol for Wi-Fi connectivity contains a significant weakness that makes it vulnerable to attackers. A hacker within range of connected devices would reportedly be able to exploit this weakness to hijack passwords, emails and other “encrypted” data, or even place ransomware into a website the user is visiting. The research, which has been ongoing for weeks, reveals that the WPA2 core vulnerability could affect operating systems and devices including Android, Linux, OpenBSD, MediaTek, Linksys, macOS and Windows. Continue reading WPA2 Wi-Fi Flaw Revealed, Android & Linux Most Vulnerable

Goldman Sachs Exploring Creation of a Bitcoin Trading Desk

Goldman Sachs Group, in the early stages of considering whether to start a trading operation for Bitcoin, could become the first blue-chip Wall Street company to deal directly in the virtual currency. If it does so, it will give Bitcoin more credibility among investors. Bitcoin and other virtual currencies were first used and are still perceived as commonly used for illegal activities. The currency is still controversial, banned by China and deemed a “fraud” by J.P. Morgan Chase & Co. chief executive James Dimon. Continue reading Goldman Sachs Exploring Creation of a Bitcoin Trading Desk

As Threats to Cybersecurity Grow, So Does Cyberinsurance

Increasingly pervasive threats to cybersecurity have jumpstarted the cyberinsurance business to reach beyond technology companies, its core customers. Covering financial loss, including theft of data and ransomware, cyberinsurance is reportedly the fastest-growing coverage among U.S. companies; cyberinsurance firms provide competing tools to distinguish their offerings in the marketplace. Insurance is not in lieu of good security practices, but the idea of cyberinsurance is appealing even though it is largely untested. Continue reading As Threats to Cybersecurity Grow, So Does Cyberinsurance

Sources Say China Is Planning to Shutter Bitcoin Exchanges

The Chinese government, increasingly uneasy about virtual currency, is on the verge of shutting down the country’s Bitcoin exchanges, say sources. The move comes as the government focuses on preventing capital from leaving to digital currencies. But if China, the world’s No. 2 economy, does indeed take this step, the market for cryptocurrencies, including all the new companies using it, will feel the impact. Of all the virtual currencies, Bitcoin is the largest, since restrictions on it were loosened in Japan and elsewhere. Continue reading Sources Say China Is Planning to Shutter Bitcoin Exchanges

Ransomware: Hackers Extort $1 Million From One Company

In the largest ransomware payout to date, South Korean web provider Nayana has agreed to pay $1 million to hackers who originally demanded 550 Bitcoins, about $1.62 million. Following negotiations, Nayana has agreed to pay $1 million in three installments. The ransomware, identified as Erebus by cybersecurity firm Trend Micro, impacted 153 Linux servers and more than 3,400 websites hosted by Nayana. “This is the single largest-known payout for a ransomware attack, and it was an attack on one company,” reports CNET. “For comparison, the WannaCry ransomware attacked 200,000 computers across 150 countries, and has only pooled $127,142 in Bitcoins since it surfaced.” Continue reading Ransomware: Hackers Extort $1 Million From One Company

Experts Ponder Implications of IoT Vulnerabilities and Risks

The Internet of Things is now made up of approximately 8.4 billion devices, in cars, voice-activated assistants, home security systems, personal fitness trackers and health-monitoring devices. Much of the “connection” is behind the scenes and involves machine learning-enhanced communication. But an increasing number of IoT products are embedded in the things of daily life, from toothbrushes and dental floss to baby monitors, umbrellas and remote-controlled pet food dispensers. Security and safety issues are now a focus. Continue reading Experts Ponder Implications of IoT Vulnerabilities and Risks

Advice on Keeping Smaller Businesses Safe From Cybercrime

The threat of ransomware and malware are growing. The “WannaCry” attack impacted at least 200,000 computers in 150 countries before peaking last week. Adylkuzz is another piece of malware currently threatening computers around the world. As computers become increasingly connected, so opportunities for cybercrime expand, say the experts. Part of the problem is that the Internet wasn’t designed with cybersecurity protections, and criminals are attracted to cybercrimes for the relatively easy profits they can make. Continue reading Advice on Keeping Smaller Businesses Safe From Cybercrime

Extortion Hacking On the Rise, But Does Not Always Pay Off

Cyberattacks are on the rise, with major corporations, media companies, the healthcare industry and even the federal government becoming targets of hacking. Recent incidents involved media content as hackers threatened early releases of movies and streaming series if the property owners failed to pay ransoms. Hackers called the Shadow Brokers told the NSA they would release secret espionage tools unless the agency pays up. Security experts suggest that this type of extortion has had mixed results thus far. Continue reading Extortion Hacking On the Rise, But Does Not Always Pay Off

Enterprise Security Provider CrowdStrike Raises $100 Million

Digital security provider CrowdStrike, which recently helped the Democratic National Committee respond to its hacking, has raised $100 million in new capital, bringing its total fundraising to $256 million and value close to $1 billion. The Irvine, California-based tech company, founded by two former McAfee execs in 2011, provides SaaS endpoint protection, threat intelligence and incident response through its cloud-based Falcon platform. CrowdStrike now has more than 650 employees worldwide. The company’s subscriptions have grown 476 percent in the last year as cybersecurity becomes a growing concern. Continue reading Enterprise Security Provider CrowdStrike Raises $100 Million

Major Cyberattack Hits 150 Countries, Could Keep Spreading

A cyberattack impacted computer systems in more than 150 countries over the weekend. The weapon used to initiate the attack is believed to be based on recently published vulnerabilities stolen from the National Security Agency. The attack, one of the largest ever, took over computers, encrypted their files and demanded payment in Bitcoin of $300 or more. Among the major institutions and government agencies impacted were FedEx in the U.S., the Russian Interior Ministry and Britain’s National Health Service. The attack also hit smaller venues, such as a car manufacturing factory in Romania owned by Renault. Continue reading Major Cyberattack Hits 150 Countries, Could Keep Spreading

Hacker Releases Original Netflix Content, Threatens Networks

A hacker group that goes by the name “TheDarkOverlord” has reportedly stolen episodes from a number of television shows. Over the weekend, 10 episodes from the upcoming fifth season of “Orange Is the New Black” was shared after Netflix did not meet ransom requests. The hackers may have access to up to three dozen series from networks including ABC, CBS, Fox, FX, IFC, NatGeo and NBC. It provided a list of TV series and a few movies to cybersecurity blog DataBreaches.net, claiming that the content was stolen from audio post-production facility Larson Studios. Continue reading Hacker Releases Original Netflix Content, Threatens Networks

Cybersecurity and How to Build Speed Bumps Against Hackers

At a CES CyberSecurity Forum, journalist/author Wayne Rash led a discussion on the various ways that companies are failing to protect their intellectual property and remain vulnerable to malicious code and ransomware. According to Yubico chief executive Stina Ehrensvard, 70 percent of hacks are related to passwords. “The password is the weak link,” agrees Authentic8 chief executive Scott Petry. “Reusing passwords is a problem. If you use your Yahoo password for other sites, you’re in trouble.” Continue reading Cybersecurity and How to Build Speed Bumps Against Hackers