A highly active ransomware strain once considered a joke is now capable of encrypting files using a solid encryption scheme. Advertise on IT Security News. Read the complete article: DeathRansom evolves from joke to actual ransomware
U.S. government limits exports of AI software
The Trump administration took measures to crimp exports of AI software to keep sensitive technologies out of the hands of rival powers like China. Advertise on IT Security News. Read the complete article: U.S. government limits exports of AI…
How the US Prepares Its Embassies for Potential Attacks
In addition to securing physical structures, the Diplomatic Security Service runs simulations of protests in a model city in Virginia. Advertise on IT Security News. Read the complete article: How the US Prepares Its Embassies for Potential Attacks
Xiaomi IoT Cameras Leak Private Stills via Google Home Hub
Worried Xiaomi Mijia IP camera users are finding other people’s images displayed on their Google Home Hubs. The problem seems to linked to a botched software update. The post Xiaomi IoT Cameras Leak Private Stills via Google Home Hub appeared first…
The Week in Ransomware – January 3rd 2020 – Busy Holiday Season
Normally ransomware activity slows down over the December break, but this year was an exception with a quite a few interesting, and sad, stories such as FBI alerts being issued, companies being shut down, and organizations being encrypted by a…
Universal Directory vs Active Directory
Learn the key differences between Active Directory and Universal Directory, and what to consider when choosing between the two. The post Universal Directory vs Active Directory appeared first on JumpCloud. The post Universal Directory vs Active Directory appeared first on…
The Soleimani Strike: One Person Decides
The Soleimani Strike: One Person Decides Advertise on IT Security News. Read the complete article: The Soleimani Strike: One Person Decides
Qassem Soleimani and Beyond
Qassem Soleimani and Beyond Advertise on IT Security News. Read the complete article: Qassem Soleimani and Beyond
IT Security News Daily Summary 2020-01-03
Friday Squid Blogging: Giant Squid Video from the Gulf of Mexico
Fantastic video: Scientists had used a specialized camera system developed by Widder called the Medusa, which uses red light undetectable to deep sea creatures and has allowed scientists to discover species and observe elusive ones. The probe was outfitted with…
India’s Reaction to the Killing of Iranian Commander Qassem Soleimani
India’s Reaction to the Killing of Iranian Commander Qassem Soleimani Advertise on IT Security News. Read the complete article: India’s Reaction to the Killing of Iranian Commander Qassem Soleimani
Clop Ransomware Now Kills Windows 10 Apps and 3rd Party Tools
The Clop Ransomware continues to evolve with a new and integrated process killer that targets some interesting processes belonging to Windows 10 apps, text editors, programming IDEs and languages, and office applications. […] Advertise on IT Security News. Read…
Iran could conduct cyberattacks as retaliation
CNBC's Kate Fazzini reports on the risks of a cyberattack from Iran on "Closing Bell." Advertise on IT Security News. Read the complete article: Iran could conduct cyberattacks as retaliation
Did the President Have the Domestic Legal Authority to Kill Qassem Soleimani?
Did the President Have the Domestic Legal Authority to Kill Qassem Soleimani? Advertise on IT Security News. Read the complete article: Did the President Have the Domestic Legal Authority to Kill Qassem Soleimani?
Life after G-Suite/Postini
Postini was a technology darling in the mid-2000s that sold email filtering technology as a service to companies struggling to combat the onslaught of SPAM and malicious emails that were sprayed at corporate inboxes. For small companies or small footprints,…
Is the inability to baseline systems crippling cybersecurity progress and oversight?
Rather than just guessing where attackers may be or trying to harden systems in a tactical sense, baselining actually operationalizes enterprise risk management. Advertise on IT Security News. Read the complete article: Is the inability to baseline systems crippling…
Packet Clearing House: A Letter, And, One More Thing.
In an enlightening email conveyed message from the Directors of the Packet Clearing House (PCH)(the world-wide group which provisions operational security and support to crucial Internet infrastructure – inclusive of the planet-spanning Domain Name System (DNS) and Exchange Points also…
Time is running out for Federal 100 nominations!
The final deadline for submissions is Tuesday, Jan. 7. Advertise on IT Security News. Read the complete article: Time is running out for Federal 100 nominations!
GAO: USPS last-mile data useful, but unlikely to generate much revenue
To offset increased costs associated with mail delivery, the Government Accountability Office weighs the pros and cons of leveraging the Postal Service’s last-mile delivery network. Advertise on IT Security News. Read the complete article: GAO: USPS last-mile data useful,…
Microsoft Products Reaching End of Life in 2020
Several major Microsoft products will reach their end of support during 2020, with Office 2010, Visual Studio 2010, Windows 7, Windows Server 2008 (including 2008R2), and multiple Windows 10 versions including 1803 and 1903 being some of the most important…
Iran May Respond With Cyberattacks to Killing of Qassem Soleimani
read more Advertise on IT Security News. Read the complete article: Iran May Respond With Cyberattacks to Killing of Qassem Soleimani
Killing of Iranian general spurs concern about cyber retaliation
Iran has threatened to respond to the targeted killing of senior general Qassem Soleimani, and analysts say the goal will be to punish the U.S. by targeting its IT and critical infrastructure while avoiding traditional military conflict. Advertise on…
Breaking out biometrics funding
Agencies are investing in biometrics and identity management to improve national security. Advertise on IT Security News. Read the complete article: Breaking out biometrics funding
DARPA takes the IoT to sea
The Ocean of Things program envisions a network of low-cost, sensor-enabled floats that collect, transmit and analyze environmental data via satellite for real-time monitoring of maritime activity. Advertise on IT Security News. Read the complete article: DARPA takes the…
Mac Pro Hands-On: Adding Additional SSD Storage Using a PCIe Slot
When the Mac Pro became available for purchase a few weeks ago, we bought a base model and have since been demonstrating upgrades with third-party components for those interested in boosting their Mac Pro’s capabilities without having to shell out…
Take your career to the next level with CompTIA and Infosec Skills | Cyber Work Podcast
Whether you’re new to cybersecurity or an experienced professional, CompTIA has a certification for you — and training for those certifications is easier than ever with the new on-demand training platform Infosec Skills. This episode of the Cyber Work podcast…
Ransomware Victim Southwire Sues Maze Operators
Attackers demanded $6 million from the wire and cable manufacturer when they launched a December ransomware campaign. Advertise on IT Security News. Read the complete article: Ransomware Victim Southwire Sues Maze Operators