Quantcast
Channel: Mobility
Viewing all articles
Browse latest Browse all 424

This Week in Security News

$
0
0

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.

Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for highlights of the goings-on each week!

 

Pwn2Own Returns for 2017 to Celebrate 10 Years of Exploits

Pwn2Own™ 2017 is in nine weeks and is returning to CanSecWest, which is celebrating its 10th anniversary this year. A lot has changed in the world since the first Pwn2Own in 2007. The computing space has changed drastically, as well.  

We All Need to Be Aware of the Threats Out There

Smart cities are redefining the way we live and work. Blending cutting edge IoT technologies with virtualization, big data, cloud and more, they represent an urgent and ongoing attempt to overcome the challenges associated with rapid urbanization. 

Uncover the Inner Workings of EyePyramid

Two Italians referred to as the “Occhionero brothers” have been arrested and accused of using malware and a carefully-prepared spear-phishing scheme to spy on high-profile politicians and businessmen. This case has been called “EyePyramid,” which we first discussed last week 

Trojan Malware Blamed for Cyberattack at Barts Health NHS Hospitals

 Trojan malware has been blamed for the cyberattack against Barts Health NHS Trust which forced it to take computer systems offline on Friday. A number of computer systems including those in the pathology department were taken offline as a precaution.

3 Simple Steps to Disrupt Ransomware

Ransomware is one of the fastest rising attacks currently out there with no end to that growth in sight. Criminals are making a lot of money from ransomware. What can you do to make sure that you’re not another statistic?

Perform Practical Android Debugging Via KGDB

Kernel debugging gives security researchers a tool to monitor and control a device under analysis. On desktop platforms such as Windows, macOS, and Linux, this is easy to perform. However, it is more difficult to do kernel debugging on Android devices such as the Google Nexus 6P. 

Healthcare Industry Vulnerabilities Give Rise to Cybercrime

In November, at least 35 healthcare facilities in the U.S., U.K. and Canada were targeted by cybercriminals executing Business Email Compromise (BEC) campaigns. The organizations were defrauded by attackers who impersonated executives within the organizations. 

Everyone Is $$$ To Cybercriminals Using Ransomware

More than 50 percent of those polled have been victims of ransomware in some way, shape, or form recently. Nineteen percent are being attack more than 50 times per month and a disturbing 42 percent don’t know how often they’re being attacked with ransomware. 

When the Chips are Down, Trend Micro Pulls Together

We live in challenging times. The pressures facing us all individually, and society as a whole, have never been greater, and at times, we’ve never seemed more fractured and destructive. It has never been more important to reach out, engage and make a bigger contribution to society.  

The War for Cybersecurity Talent Hits the Hill

Many analysts and business leaders believe there is a severe need for qualified cybersecurity professionals. U.S. House Homeland Security Committee Chairman Michael McCaul (R-Texas) on Wednesday said more needs to be done to address the cybersecurity labor shortage. 

GCHQ Encourages Teenage Girls to Become Cybersecurity Professionals of the Future

Government surveillance agency GCHQ is running a tech skills competition for teenage girls as part of an initiative designed to encourage more women to join the fight to protect the UK from cyberattacks and hackers. 

Please add your thoughts in the comments below or follow me on Twitter; @JonLClay.


Viewing all articles
Browse latest Browse all 424

Trending Articles