In a remarkable development, President Trump has thrown an olive branch to controversial Chinese telecom firm ZTE.
Suppose, just for a moment, just for argument’s sake, that (some) cryptocurrencies are not a giant scam, and what’s more, they’re not just another kind of financial asset. Come on. Don’t look at me like that. Work with me here. Imagine, just for a moment, that there exist plausible futures in which they matter.
This report (Spanish version) was co-researched and authored by Giancarlo Fiorella (@invenezuelablog), author of In Venezuela, and Aliaume Leroy(@Yaolri), member of the Bellingcat Investigation Team. Bellingcat undertook the investigation in collaboration with Forensic Architecture who have constructed a navigable three-dimensional digital platform of El Junquito in which the more than 60 pieces of evidence are located in space and time.
It’s being reported that that between 2016 and 2017, there was a 182% increase in raw identity records discovered by intelligence threat company 4IQ. “Raw” identity records refer to social security numbers and other pieces of PII associated with children, which fraudsters can purchase to amass unchecked credit on dark web forums. Tim Helming, Director of Product Management at DomainTools commented below.
Saturday 12th May will mark one year since the WannaCry attack on the NHS. There’s been plenty of critical assessment about how the health service could avoid another WannaCry attack. But, as the anniversary of the attack looms, we need to understand that improving cybersecurity for the NHS cannot be done instantly. Last year, the government pledged to boost investment in data and cyber security for the NHS by over £50m. However, the size and complexity of the organisation’s IT estate means this investment is not going to deliver positive outcomes for several years.
Ubuntu Security Notice USN-3645-1
May 11, 2018
With just two weeks until GDPR comes into force, IT security experts commented below.
It has been revealed that the Hide and Seek Botnet has resurfaced, bringing with it stronger defences to help it remain on infected devices. Security researchers found that it can now survive device reboots, which would normally remove IoT malware. IT security experts commented below.
Spring is typically a busy period for government organisations to request details on tax related issues. Unfortunately, cybercriminals know this and are ready to pounce on an obvious weak link – our distracted, emotive human nature.
In May’s Patch Tuesday, 68 Windows vulnerabilities have been patched, including two where exploitation had been detected. A vulnerability discovered in VBScript could allow attackers to execute code in the context of the logged in user. This vulnerability could be exploited via certain web browsers or Microsoft Office documents. The second flaw is a privilege escalation vulnerability affecting Win32k which could allow an attacker to execute code in kernel mode. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-777 on Wednesday, May 9th.
In response to the findings of a recent study from Outpost24 which revealed that 42 percent of IT professionals have ignored critical security issues because they couldn’t fix them, IT security experts commented below.
News broke today that the number of people who reported ransomware infections to US authorities has gone down last year, according to a yearly FBI Internet crime report. During 2017, the FBI says it received only 1,783 complaints regarding ransomware infections, a number far smaller than the 2,673 complaints it received in 2016, and the 2,453 complaints received in 2015. Andy Norton, Director of Threat Intelligence at Lastline commented below.
Tomorrow, May 12, is the one-year anniversary of the WannaCry ransomware outbreak.
Compromised credentials give the bad guys access to your data. Attackers use a legitimate username and password to initially obtain access and then escalate privileges in order to access increasingly valuable data. Relying on old-school authentication methods gives the bad guys a helping hand.
To close numerous security gaps, Microsoft, Adobe, Apple, Red Hat, Xen, VMware and other vendors have released a number of patches in the first 10 days of May. We discussed some of these in our recent blog post, Microsoft May Madness. However, one issue that stands out because it impacts multiple operating system platforms is the chip giant Intel’s CVE-2018-8897. A problem that’s being framed as a “developers documentation misunderstanding” has turned into a cross-platform patch requirement to secure the kernel. To be clear, the issue doesn’t exist in the chip itself – rather, in the way developers have built their software stacks to interact with the processor.
This week marked National Teacher Appreciation Week here in the United States. I was happy to see that many other countries celebrate educators in all the other months of the year. All of us have at least one teacher, instructor or professor who really made a difference in our lives. There are two for me, and while they may not remember me out of the thousands they taught over the years, I definitely remember them. The first one helped me realize that I could write, and had me focus my frustration through poetry and essays as a 10-year-old moving from a city of almost two million (at the time) to a small town with 3,000 people trying to fit in. The second one validated my love for writing and journalism in college, encouraged me to ask the tough questions (don’t forget the five Ws and the H!) and reminded me to never bury the lead. He never forgave me for “going to the dark side” – that was his definition for marketing – but told me that as long as I’m still writing in some capacity, he was happy.
A new ordinance in Madison, Mississippi, requires external security cameras on the buildings of all retail locations; businesses were given until March 2018 to comply with the ordinance.
Stocks for cybersecurity giant Symantec took a sharp decline Friday a day after the company disclosed an internal investigation, while providing little information on the subject of the probe.
This is Chapter 4 from “Design Leadership”—read the full book on O’Reilly’s learning platform.