The Latest in IT Security

1

Researchers have demonstrated that it’s possible to create synthetic DNA strands containing malicious computer code that, if sequenced and analyzed, could compromise a computer. The main goal of their research was to test open-source bioinformatics software commonly used by researchers to analyze DNA data for security flaws;

Read more ...

1

41 year-old Russian national Maxim Senakh was sentenced to 46 months in prison by a US federal court in Minnesota, after pleading guilty in May for developing and managing a Linux botnet using Ebury malware. Senakh was arrested in 2015 in Finland and extradited to the US to await trial for wire fraud and violating the Computer Fraud and Abuse Act.

Read more ...

1

As enterprises get better about encrypting network traffic to protect data from potential attacks or exposure, online attackers are also stepping up their Secure Sockets Layer/Transport Layer Security (SSL/TLS) game to hide their malicious activities. In the first half of 2017, an average of 60 percent of transactions observed by security company Zscaler have been […]

Read more ...

1

Security researchers at SafeBreach have created proof-of-concept (PoC) malware that can exfiltrate data from endpoints that don’t have a direct Internet connection by exploiting cloud-enhanced anti-virus (AV) agents. Although highly secure enterprises might employ strict egress filtering, meaning that endpoints either have no direct Internet connection or have a connection restricted to hosts required by […]

Read more ...

Categories

MONDAY, AUGUST 21, 2017

Featured

Archives

Latest Comments

Social Networks