The Security Ledger

Military documents about MQ-9 Reaper drone leaked on dark web

The Security Ledger - Thu, 07/12/2018 - 10:35am

Hackers have put up for sale on the dark web sensitive military documents, some associated with the U.S. military’s MQ-9 Reaper drone aircraft, one of its most lethal and technologically advanced drones, security research firm Recorded Future recently discovered. The firms’ Insikt Group on June 1 observed a bad actor trying to sell...

Read the whole entry... »

Related Stories
Categories: The Security Ledger

Fitness apps: Good for your health, not so much for military security

The Security Ledger - Tue, 07/10/2018 - 5:15pm

Fitness apps are proving to be a lot less beneficial to military security than they are for military fitness. That after researchers in the Netherlands discovered that data from the Polar fitness app revealed the homes and habits of those exercising in clandestine locations around the world, including intelligence agencies, military bases, nuclear...

Read the whole entry... »

Related Stories
Categories: The Security Ledger

Episode 103: On the Voice-Controlled Internet, How Will We Authenticate?

The Security Ledger - Tue, 07/10/2018 - 1:24pm

Voice based interfaces are growing in popularity, complexity and influence. But securing these interfaces has, thus far, been an afterthought. If we are destined to interact with the smart systems around us using our voice, how exactly will we manage to authenticate to those devices? In this podcast we speak with Ben Rafferty of the firm Semafone...

Read the whole entry... »

Related Stories
Categories: The Security Ledger

Quantum Principles Eyed to Solve Current Limitations in Encryption, Data Protection

The Security Ledger - Wed, 07/04/2018 - 5:23pm

Quantum principles are set to transform the next generation of Internet security, with new quantum-based technologies on tap to improve encryption and data communication which researchers believe could solve some of the limitations with current technology. Security researchers in the United Kingdom are among those leading the move toward quantum...

Read the whole entry... »

Related Stories
Categories: The Security Ledger

Kaspersky Deems Crypto-jacking the New Ransomware as Crypto-miners up Their Game

The Security Ledger - Tue, 07/03/2018 - 6:20pm

Because of its potential to earn hackers millions in a steady stream of cash, Kaspersky Labs has deemed crypto-jacking the new ransomware in a report that arrived  just as researchers spotted two new types of malware targeting the growing popularity of cryptocurrencies. In its report released last Wednesday, Kaspersky declared that crypto-mining...

Read the whole entry... »

Related Stories
Categories: The Security Ledger

Episode 102: Is Blockchain the Foundation for a Secure Internet of Things?

The Security Ledger - Mon, 07/02/2018 - 10:45am

In this episode of the Security Ledger Podcast (#102): we think of blockchain as the immutable and distributed ledger that vouches for crypto currency transactions. But is its real potential as a foundation for a secure Internet of Things? We speak with Vaughan Emery, the CEO of the start-up Atonomi, which markets itself as a secure ledger for...

Read the whole entry... »

Related Stories
Categories: The Security Ledger

Opinion: With Internet of Things, Devices become Insider Threat

The Security Ledger - Thu, 06/28/2018 - 10:58am

Connected devices aren’t just fodder for botnets. They increasingly act as malicious “insiders” capable of spying on their surroundings and providing valuable intelligence on homes and offices, argues Yotam Gutman of the firm Securithings in this industry perspective.  Connected devices present unique challenges to enterprises...

Read the whole entry... »

Related Stories
Categories: The Security Ledger

Mobile, automation-industry leaders promote two new IoT security efforts

The Security Ledger - Wed, 06/27/2018 - 3:32pm

Recognizing the persistent need for security to protect connected devices, industry leaders are collaborating through two separate efforts on Internet of Things (IoT) standards and guidelines to help combat the emerging IoT threat landscape. On the mobile front, a number of global operators including  AT&T, China Mobile, China Telecom, China...

Read the whole entry... »

Related Stories
Categories: The Security Ledger

Akamai Report finds DDoS Attacks more Sophisticated, Adaptive

The Security Ledger - Tue, 06/26/2018 - 8:13am

Though they are some of the oldest cyber attacks, Distributed Denial of Service (DDoS) attacks show no signs of going away, with an increase in the number, scope and sophistication of DDoS attacks in the past year, according to a recent report by cloud-delivery platform provider Akamai Technology. The summer edition of Akamai’s State of the...

Read the whole entry... »

Related Stories
Categories: The Security Ledger

IoT, Machine Learning and AI in the Security Operations Center

The Security Ledger - Tue, 06/26/2018 - 8:00am

A tsunami of security data from Internet of Things endpoints could break the will of SOC analysts. What is needed are better tools for analyzing that data, including the use of machine learning. But AI and machine learning aren’t magic bullets. In this opinion piece, RSA Chief Technology Officer Dr. Zulfikar Ramzan presents a 5 point plan...

Read the whole entry... »

Related Stories
Categories: The Security Ledger

Episode 101: The Dystopian IoT looks a lot like the Printer Ink Aisle and City of Atlanta Employees phished on Rogue Wi-Fi

The Security Ledger - Mon, 06/25/2018 - 8:30am

In this episode of the podcast (#101): will the Internet of Things enable a glorious future of intelligent and subservient “things”? Or will it birth “ink jet nation:” a dystopia of closed and expensive technology silos that use patents, software licensing and lawsuits constrain the use, reuse and repair of connected...

Read the whole entry... »

Related Stories
Categories: The Security Ledger

Spotlight Podcast: Why North Korean Summit won’t End Hacking Threat

The Security Ledger - Thu, 06/21/2018 - 10:19am

In this Spotlight Podcast, Jon Condra, the Director of Asia Pacific Research at Flashpoint talks about why U.S. President Donald Trump’s summit with North Korean leader Kim Jong Un won’t put an end to North Korea’s online predation. That is just one conclusion in Flashpoint’s semi yearly Business Risk Intelligence Report. ...

Read the whole entry... »

Related Stories
Categories: The Security Ledger

‘Olympic Destroyer’ resurfaces; targets financial organizations, chemical-threat-prevention labs

The Security Ledger - Wed, 06/20/2018 - 11:03am

The Olympic Destroyer malware behind an attack on the 2018 Winter Olympic Games in Seoul resurfaced with new targets in its sites: financial organizations and biological and chemical threat prevention laboratories, according to new research from Kaspersky Lab. Olympic Destroyer was first spotted back in February as a cyberattack on the...

Read the whole entry... »

Related Stories
Categories: The Security Ledger

Evasive new botnet can take over enterprise devices to steal data, spread ransomware

The Security Ledger - Tue, 06/19/2018 - 10:51am

A new, extremely evasive botnet has been discovered that takes unique leverage of command and control servers and can completely take over an enterprise device to execute any type of code it wishes, from ransomware to trojans to data extraction, according to researchers at endpoint and mobile security firm Deep Instinct. The malware–which is...

Read the whole entry... »

Related Stories
Categories: The Security Ledger