Israel hacked Kaspersky Lab, tipped off US about Russian hackers, report says

Israeli intelligence officers watched Russian hackers use software from Moscow-based cybersecurity firm Kaspersky Lab to search for U.S. secrets, the New York Times reports.

The original article can be found here: http://www.foxnews.com/tech/2017/10/11/israel-hacked-kaspersky-lab-tipped-off-us-about-russian-hackers-report-says.html

Powered by WPeMatico

HP Enterprise Shared Pentagon’s Cyberdefense Source Code With Russia

449808-generic-security-hacking

Hewlett Packard has acknowledged sharing cybersecurity source code with the Russians as part of a product evaluation. While not unusual, it raises serious questions about how best to secure systems the US depends on.

The post HP Enterprise Shared Pentagon’s Cyberdefense Source Code With Russia appeared first on ExtremeTech.

The original article can be found here: https://www.extremetech.com/internet/256852-hp-enterprise-shared-pentagons-cyberdefense-source-code-russia?source=Computing

Powered by WPeMatico

Russian cybersecurity firm Kaspersky Lab a 'danger' to US security, senator warns

Prominent cybersecurity firm Kaspersky Lab poses a danger to U.S. security, warns Democratic Sen. Jeanne Shaheen, who is pushing to prohibit the federal government from using the Moscow-based company’s products.

The original article can be found here: http://www.foxnews.com/tech/2017/09/05/russian-cybersecurity-firm-kaspersky-lab-danger-to-us-security-senator-warns.html

Powered by WPeMatico

Petya's Ransomware Cloaking Device


Recent ransomware threats have escalated into a global crisis, and cybersecurity experts and government authorities have redoubled their investigative efforts. Of grave concern is the possibility that the recent Petya attack had more sinister motives than typical ransomware operations, and that state actors were involved behind the scenes. The Petya attack — which disrupted major government agencies, infrastructure sites, multinational companies and other organizations — actually used ransomware as a cover.

The original article can be found here: http://www.ecommercetimes.com/story/84659.html?rss=1

Powered by WPeMatico

North Korea, cyberattacks and 'Lazarus': What we really know

With the dust now settling after “WannaCry,” the biggest ransomware attack in history, cybersecurity experts are taking a deep dive into how it was carried out, what can be done to protect computers from future breaches and, trickiest of all, who is to blame.

The original article can be found here: http://www.foxnews.com/tech/2017/06/02/north-korea-cyberattacks-and-lazarus-what-really-know.html

Powered by WPeMatico

WannaCry attacks likely linked to North Korea, experts say

It is “highly likely” that the WannaCry cybersecurity attack that infected more than 300,000 computers across the world this month was the handiwork of a hacking group linked to North Korea, Symantec Corp, the Silicon Valley-based cybersecurity firm, wrote in a blog post on Monday.

The original article can be found here: http://www.foxnews.com/tech/2017/05/23/wannacry-attacks-likely-linked-to-north-korea-experts-say.html

Powered by WPeMatico

Tech Q&A: Checking in on hackers, meshing your networks

We often talk about cybersecurity and how many threats are looming out there on the web, but isn’t it possible that we’ve already been compromised? How could we know? Hackers might wait for weeks or even years to use that information against us. It’s unlikely they’re going to get in touch and tell us how much personal data they’ve stolen. Luckily, there’s a website that gives you a pretty good idea of which accounts may have been hacked. You may be surprised.

The original article can be found here: http://www.foxnews.com/tech/2017/05/21/tech-q-checking-in-on-hackers-meshing-your-networks.html

Powered by WPeMatico

WannaCry ransomware attack: How average computer users contributed to global spread of malware

As cybersecurity experts clamored to contain and explain the massive global ransomware attack that infected several hundred thousand computers over the weekend in more than 150 countries, it’s the average computer user who should be concerned, multiple experts said.

The original article can be found here: http://www.foxnews.com/tech/2017/05/15/wannacry-ransomware-attack-how-average-computer-users-contributed-to-global-spread-malware.html

Powered by WPeMatico

22-year-old cybersecurity researcher helped thwart unprecedented cyberattack

A 22-year-old cybersecurity researcher and a cheap domain registration helped thwart the cyberattack that spread malicious software around the world, shutting down networks at hospitals, banks and government agencies.

The original article can be found here: http://www.foxnews.com/tech/2017/05/14/22-year-old-cybersecurity-researcher-helped-thwart-unprecedented-cyberattack.html

Powered by WPeMatico

The scent of cybersecurity: Kaspersky Lab launches perfume

Can hackers smell fear? Cybersecurity firm Kaspersky Lab is raising awareness of the digital threats facing users … by launching a perfume.

The original article can be found here: http://www.foxnews.com/tech/2017/03/13/scent-cybersecurity-kaspersky-lab-launches-perfume.html

Powered by WPeMatico

UN pushes for cyber surveillance treaty, but controversy may arise

As cybersecurity threats around the globe rise, the United Nations is pushing to come up with an international treaty to protect people’s data from government surveillance.

The original article can be found here: http://www.foxnews.com/tech/2017/03/10/un-pushes-for-cyber-surveillance-treaty-but-controversy-may-arise.html

Powered by WPeMatico

US Pushes Cybersecurity Acquisition Tools as Contracts Flow


Vendors of cybersecurity offerings are finding that the U.S. government is serious about improving the protection of federal IT assets. A steady stream of data protection contracts has been flowing to providers, including some notable high-value transactions during the last half of 2016. One example is a Department of Homeland Security contract, with a potential value of $395 million, for various cybersecurity protection services designed to prevent, detect, contain and eradicate cyberthreats.

The original article can be found here: http://www.ecommercetimes.com/story/84231.html?rss=1

Powered by WPeMatico

Feds Need to Bolster Cyberprotection Speed and Range


Providing cybersecurity adequate to meet increasing threats is a perpetual catch-up process. Public sector agencies are particularly sensitive targets, with high visibility not only to the citizens they serve, but also to cyberattackers. Despite the emphasis on cyberprotection spurred by the major OPM breach in 2015, government agencies have struggled to maintain adequate levels of protection. A recent survey uncovered both a lack of speed in detecting and responding to attacks, and weak defenses of the full range of possible attack channels.

The original article can be found here: http://www.ecommercetimes.com/story/84114.html?rss=1

Powered by WPeMatico

US Launches IT Contract to Spur Cybersecurity Purchases


The U.S. government plans to initiate an updated contracting vehicle for the acquisition of cybersecurity information technologies for federal agencies this month. The purpose of the program is to make it easier and more efficient for federal agencies to obtain cyberprotection services. Specifically, GSA will include cybertechnology providers on a major listing of approved federal contractors known as “Schedule 70.” The stakes are significant for vendors offering cyber-related capabilities to the federal government.

The original article can be found here: http://www.ecommercetimes.com/story/83964.html?rss=1

Powered by WPeMatico

Hacking, Russia, loom large during first presidential debate

Cybersecurity took center stage during Monday’s first presidential debate as Hillary Clinton and Donald Trump clashed on keeping America’s networks safe.

The original article can be found here: http://www.foxnews.com/tech/2016/09/27/hacking-russia-loom-large-during-first-presidential-debate.html

Powered by WPeMatico

HummingBad: Chinese malware infects 10 million Android devices, experts warn

Experts at cybersecurity specialist Check Point have issued an APB to all Android device users: the HummingBad malware problem is about to get worse.

The original article can be found here: http://www.foxnews.com/tech/2016/07/05/hummingbad-chinese-malware-infects-10-million-android-devices-experts-warn.html

Powered by WPeMatico

Cybersecurity Goals to Guide Federal Software Spending


The U.S. government is on track to significantly boost spending on cybersecurity solutions. However, evolving requirements to greatly improve federal protection of information technology resources will shape that spending. In fact, federal cyberprotection goals should be augmented and significantly modified, according to recent studies of the federal market. The linkage between increased federal investing in cybersecurity and the requirements for bolstering IT protection are portrayed in two newly released reports.

The original article can be found here: http://www.ecommercetimes.com/story/83459.html?rss=1

Powered by WPeMatico

IT Execs Join Federal Cybersecurity Panel


Key components of the Obama administration’s multipronged cybersecurity initiative keep falling into place. One of the most recent developments was the formation of a federal Commission on Enhancing National Cybersecurity. Another was the formal introduction in Congress of the administration’s information technology investment plan, which is heavily tilted toward cybersecurity protection. Both are elements of the Cybersecurity National Action Plan, or CNAP, which was launched earlier this year.

The original article can be found here: http://www.ecommercetimes.com/story/83430.html?rss=1

Powered by WPeMatico