Category Archives: Internet Security

Fraud warnings. Ransomware and the pressure to pay. MobiKwik update. – The CyberWire

At a glance.

The Cybersecurity Division of the New York Department of Financial Services (DFS) has published a letter warning of a cybercrime operation targeting public-facing instant insurance quote websites. In a follow-up to an initial letter sent in February, which stated that cybercriminals are exploiting vulnerabilities in the application design and code of these sites in order to access user data, two new hacking techniques have been identified. First, hackers are capitalizing on vulnerabilities in the code of data prefill systems used to redact or mask portions of consumer data. Second, cybercriminals are using credential stuffing to infiltrate insurance agents accounts. DFS is urging financial services companies to avoid displaying prefilled NPI on these sites and to protect agent portals with access controls outlined in DFSs cybersecurity regulation.

Meanwhile, DFS announced a regulatory enforcement action against a New York licensed mortgage banker and loan servicer for violating cybersecurity regulations, JD Supra reports. The mortgage banker failed to report a data breach caused by an employee overriding the companys multi-factor authentication protocol. As the company had extensive software security in place, including antivirus and end-point protection software and automated detection rules, the incident highlights the need for more robust employee training procedures. The company agreed to pay a fine of $1.5 million, as well as improve its cyber risk and assessment protocols.

James McQuiggan, security awareness advocate at KnowBe4, commented on the place identity theft occupies in the underworld's criminal economy. Cyber criminals will take any information they can leverage and work to get the next bit of data. The result is identity theft to profit and sell it on the black market like the dark web," he said, adding, "Organizations need to ensure they are protecting all data exposed to the internet with additional authentication, namely multi-factor authentication. While it can still be bypassed using extreme measures, it can slow down the less capable cyber criminals from gaining further information.

As ransomware incidents have seen a rapid rise over the past year, ZDNet examines the reasons why. Increasingly, ransomware operators are not merely encrypting a targets networks, but also employing a double-extortion technique, threatening to publish sensitive data if ransom demands are not met. With more entities acquiring cyberinsurance, an ever great number of targets have the means to pay, making attacks even more attractive to cybercriminals. Ransomware-as-a-service operations have made the attack method accessible to more threat actors than ever before. But as a recent paper from defense think tank Royal United Services Institute and cybersecurity company BAE Systems warns, The more organizations that pay a ransom, the more acceptable the notion of paying a ransom to solve the problem becomes.

This pressure to pay, as well as the desire to resolve the attack before it ruins a targets reputation, has led to a rise in the need to enlist the help of professional ransomware negotiators, and SearchSecurity offers an inside look at these complex negotiations. In order to maximize discretion, many victims prefer the assistance of incident response firms over involving law enforcement. The negotiation process is impacted by a number of factors: the size of the ransom demand, the attackers record for restoring systems after payment, their history with extortion, the victims ability to pay, and the ransom deadline. COO of infosec consultancy Aggeris Group Kevin Kline says, "Taking a quick cash payment is more attractive to them than negotiating for days or even weeks and waiting for cyber insurance payments for $250,000 or $500,000 demands that they ultimately may not get." Complicating matters, the U.S. Department of the Treasury's Office of Foreign Assets Control recently issued an advisory stating that making payments to entities on the U.S. sanctions list is illegal and could result in civil penalties. That said, according to threat intelligence vendor GroupSense, 100% of their negotiations have ended in lower payments, many reduced by at least 10%.That hardly seems, however, enough to compensate for fueling a bandit economy.

As the CyberWire noted yesterday, earlier this month a researcher discovered that threat actors on the dark web had released the data of 99 million users allegedly stolen from Indian mobile payments startup MobiKwik. MobiKwik, however, denied a breach had even occurred, asserting that the researchers findings were a media-crazed attempt at sullying the companys name before Mobikwiks IPO launch. As Business Standard now reports, the Reserve Bank of India has asked the firm to perform a third-party forensic audit using a government-approved auditor, and MobiKwik has also involved the Computer Emergency Response Team. However, the Quint reports that as of yesterday the hackers have deleted all the data from the dark web. When asked why the sudden change of heart, they responded: All of India is worried about this leak...We had very long and deep conversations with some independent security researchers about the consequences if data is leaked or sold and decided we will delete all data from our end as MobiKwik is incompetent in that regard.

Read more here:
Fraud warnings. Ransomware and the pressure to pay. MobiKwik update. - The CyberWire

How the Internet of Medical Things (IoMT) Helps Combat Connected Health Security Threats? – CIO Applications

Hackers may use this same type of security flaw to gain access to a device and use it to cause harm or steal sensitive health information. During the device's lifetime, some of these same devices enable the patient to replace a device component or "consumable."

Fremont, CA: IoT networks are increasingly being used by the healthcare industry to safely connect a growing number of medical devices and equipment. In applications varying from hospital consignment inventory management to remotely controlling heart-rate monitors, insulin pumps, as well as other implantable devices using smartphones, these connected devices are transforming procedures and the continuum of care.

Device security is often overlooked in these and other Internet of Medical Things (IoMT) applications. Some solution providers make the dangerous assumption that security cannot be implemented cost-effectively. The industry is transitioning to a command-and-control model, utilizing commercial smartphones with built-in security features that are insufficient for safety-critical applications.

IoMT Threats and Opportunities

Unfortunately, cyberattacks or problems with IoMT integrity for connected implantable medical devices are becoming more common. In May of 2019, a Type 1 diabetes patient reprogrammed his insulin pump to customize his therapy and ended up in the hospital. He'd taken advantage of a security flaw in his FDA-approved, commercially available device, which, according to the FDA's safety warning, could put patients at risk if they didn't properly execute their own treatment customization.

Hackers may use this same type of security flaw to gain access to a device and use it to cause harm or steal sensitive health information. During the device's lifetime, some of these same devices enable the patient to replace a device component or "consumable." In terms of counterfeit substitution or integrity, the consumable itself presents a new threat.

Tracking of Asset

Hospital asset tracking, which ensures that equipment is always available and usable, is another popular application for IoMT solutions, and consignment inventory management is one of the most promising. Vendors are increasingly selling goods, equipment, and related consumables on consignment to hospitals, issuing invoices only when the items are used. Additionally, OEMs must ensure that consigned inventory meets OEM specifications for temperature, humidity, and other environmental factors before it is used in inpatient care.

From their receipt at the hospital to their use as well as restocking, all information about these items was previously manually entered. Adopting an IoMT solution for these processes reduces errors while increasing efficiency, but security is essential for maintaining the supply chain's integrity as well as all financial transactions.

See Also :-Top IoT Solution Companies

Read the original:
How the Internet of Medical Things (IoMT) Helps Combat Connected Health Security Threats? - CIO Applications

The State of Endpoint Threats and Internet Security in 2021 – TechDecisions

WatchGuard Technologies has released its Internet Security Report for Q4 2020, including new endpoint protection threat insights based on their product and a recent acquisition.

The report reveals that fileless malware and cryptominer attack rates grew by nearly 900% and 25% respectively, while unique ransomware payloads plummeted by 48% in 2020 compared to 2019.

Additionally, the WatchGuard Threat Lab found that Q4 2020 brought a 41% increase in encrypted malware detections over the previous quarter and network attacks hit their highest levels since 2018.

Here are some of the trends Corey Nachreiner, CTO of WatchGuard, says IT departments should watch out for in 2021.

Youve likely heard of malware before, but with most strains, the goal is to be persistent and live on a victim for a long time to maximize the return on investment for the bad guy.

Fileless malware rates in 2020 increased by 888% over 2019. These threats can be particularly dangerous due to their ability to evade detection by traditional endpoint protection clients and because they can succeed without victims doing anything beyond clicking a malicious link or visiting a compromised website.

The good part about traditional filed malware is a lot of the security mechanisms you rely on whether you call it anti virus Endpoint Protection, anti malware, those protections in the past traditionally have been very geared to looking for those files, Nachreiner says.

This malware is different in that attackers are using different attack techniques to run code on your computer to get something to run as code without necessarily using a file persistently.

Toolkits like PowerSploit and CobaltStrike allow endpoint protection threat actors to easily inject malicious code into other running processes and remain operational even if the victims defenses identify and remove the original script. Deploying endpoint detection and response solutions alongside preventative anti-malware can help identify these threats.

Related:Tips for Buying Cybersecurity Technology

Maybe theres a malicious email that has a Word document with a lot of people think is a benign file. But Word documents can contain things like active content, scripts, or macros, he explains.

If you get a Word document and you allow that content to run, that script can be the entry point for an attacker to actually run something like PowerShell. If youre a Windows IT person, PowerShell is a very legitimate Windows application used to do lots of administrative tasks. But if me as an attacker, if I can run PowerShell with your privilege, theres a lot of evil things I can do on your computer.

Fileless malware typically starts with some sort of script and its a way of of using programs that come with operating systems typically windows but other operating systems to administrative software thats on a Windows operating system to do bad stuff.

Because old school antivirus doesnt detect this, it wriggles a way around security controls.

Nachreiner says IT departments to consider Endpoint Detection and Response, making sure your EDR suite includes post execution and file list detection capabilities.

For the second year in a row, the number of unique ransomware payloads trended downward in 2020, falling to 2,152 unique payloads from 4,131 in 2019 and the all-time-high of 5,489 in 2018.

These figures in the report represent individual variants of ransomware that may have infected hundreds or thousands of endpoints worldwide. The majority of these detections resulted from signatures originally implemented in 2017 to detect WannaCry and its related variants, showing that ransomworm tactics are still thriving over three years after WannaCry burst onto the scene.

Between 2013 through 2016, or 17, bad guys were using what we call crypto ransomware, the kind that actually encrypts your files, and thats how they extorted, Nachreiner says.

It was new, and it was very effective. As a result, the extortionists had a kind of shotgun approach, where they would blast ransomware emails to everybody.

But what happened between 2017 and now is the industry as a whole got better at detecting this kind of shotgun blast ransomware, so the reason you see the volume in the variants decline but not the victims necessarily decline is these bad guys have switched to a very targeted method where now they are targeting and only sending ransomware to very specific people, he explains.

The report details how the Linux.Generic virus (a.k.a. The Moon) directly targets IoT devices and network devices to exploit vulnerabilities. WatchGuards investigation uncovered Linux-specific malware designed for ARM processors and another payload designed for MIPS processors within the attackers infrastructure, indicating a clear focus on evasive attacks against IoT devices.

The reason its Linux-based is a lot of these IoT devices run a Linux subsystem, Nachreiner says.

The Moon is an IoT threat that specifically targets consumer routers, consumer network access storage devices, and even in some cases, other consumer IoT devices. We saw this target use a very specific version of the NASA network access storage operating system that many use.

One of the interesting things about all these devices is your normal computer is probably an x86 computer, and most of them have an x86 processor. The issue there is a lot of these kind of embedded low cost devices are using these arm and MIPS processors, so the malware you need to create for these IoT devices is pretty specific.

The main takeaway is to to make sure to have a layered security strategy where its not just endpoint protection on your desktops.

The Trojan.Script.1026663 made its way onto WatchGuards top five most widespread malware detections list in Q4.

The attack begins with an email asking victims to review an order list attachment. The document triggers a series of payloads and malicious code that ultimately lead the victim machine to load the final attack: the Agent Tesla remote access trojan (RAT) and keylogger.

Its not until the script downloads that you would actually have something really bad. So you really need to pay attention to these multi staged approaches to to running malware. The reason they have these stages of starting with a document then script to finally downloading the payload, is to try to evade your security. So make sure you have those layers that can catch these different types of attacks, including the EDR.

See the original post here:
The State of Endpoint Threats and Internet Security in 2021 - TechDecisions

Worldwide Internet of Things (IoT) Security Industry to 2025 – Key Drivers, Challenges and Trends – ResearchAndMarkets.com – Yahoo Finance

The "Global Internet of Things (IoT) Security Market 2021-2025" report has been added to ResearchAndMarkets.com's offering.

The publisher has been monitoring the internet of things (IoT) security market and it is poised to grow by $83.25 billion during 2021-2025 progressing at a CAGR of 30% during the forecast period.

The reports on internet of things (IoT) security market provides a holistic analysis, market size and forecast, trends, growth drivers, and challenges, as well as vendor analysis covering around 25 vendors.

The report offers an up-to-date analysis regarding the current global market scenario, latest trends and drivers, and the overall market environment. The market is driven by the increasing incidence of cyberattacks and growing adoption of cloud-based services.

The internet of things (IoT) security market analysis includes end-user segment geographical landscapes. This study identifies the government regulations driving IoT security as one of the prime reasons driving the internet of things (IoT) security market growth during the next few years.

Companies Mentioned

The report on internet of things (IoT) security market covers the following areas:

Internet of things (IoT) security market sizing

Internet of things (IoT) security market forecast

Internet of things (IoT) security market industry analysis

The study was conducted using an objective combination of primary and secondary information including inputs from key participants in the industry. The report contains a comprehensive market and vendor landscape in addition to an analysis of the key vendors.

The publisher presents a detailed picture of the market by the way of study, synthesis, and summation of data from multiple sources by an analysis of key parameters such as profit, pricing, competition, and promotions. It presents various market facets by identifying the key industry influencers. The data presented is comprehensive, reliable, and a result of extensive research - both primary and secondary. The market research reports provide a complete competitive landscape and an in-depth vendor selection methodology and analysis using qualitative and quantitative research to forecast an accurate market growth.

Story continues

Key Topics Covered:

1. Executive Summary

2. Market Landscape

Market ecosystem

Market characteristics

Value chain analysis

3. Market Sizing

4. Five Forces Analysis

5. Market Segmentation by End-user

Market segments

Comparison by End user

Industrial sector - Market size and forecast 2020-2025

Commercial sector - Market size and forecast 2020-2025

Consumer sector - Market size and forecast 2020-2025

Market opportunity by End user

6. Customer landscape

7. Geographic Landscape

Geographic segmentation

Geographic comparison

North America - Market size and forecast 2020-2025

Europe - Market size and forecast 2020-2025

APAC - Market size and forecast 2020-2025

MEA - Market size and forecast 2020-2025

South America - Market size and forecast 2020-2025

Key leading countries

Market opportunity by geography

Market drivers

Market challenges

Market trends

8. Vendor Landscape

Overview

Competitive scenario

Landscape disruption

9. Vendor Analysis

10. Appendix

For more information about this report visit https://www.researchandmarkets.com/r/b5cw82

View source version on businesswire.com: https://www.businesswire.com/news/home/20210331005522/en/

Contacts

ResearchAndMarkets.comLaura Wood, Senior Press Managerpress@researchandmarkets.com For E.S.T Office Hours Call 1-917-300-0470For U.S./CAN Toll Free Call 1-800-526-8630For GMT Office Hours Call +353-1-416-8900

Read more here:
Worldwide Internet of Things (IoT) Security Industry to 2025 - Key Drivers, Challenges and Trends - ResearchAndMarkets.com - Yahoo Finance

Glonal Internet Security Audit Market 2021 Industry Outlook, Research, Key Trends and Forecast to 2026 SoccerNurds – SoccerNurds

The Internet Security Audit market report provides information about the companys product, sales in terms of volume and revenue, technologies utilized, and innovations carried out in recent years. Additionally, it provides details on the challenges faced by them in the market. Also, the global Internet Security Audit report gives in detailed insights on the regional landscape, which involves determining the potential of the worth of investment in the region/country.

Objectives of the Report

Get a Sample Copy of the Internet Security Audit Market Report 2021-2026 Including TOC, Figures, and [emailprotected]https://www.inforgrowth.com/sample-request/6671309/Internet Security Audit-market

A Brief Outlook of the Leading Organizations in the Internet Security Audit market, Focusing on Companies such as

Internet Security Audit Market: Product Type Segment Analysis:

Internet Security Audit Market: Application Segment Analysis:

Leading regions covered in this research report:

North America (United States, Canada, and Mexico), Europe (Germany, France, UK, Russia, and Italy), Asia-Pacific (China, Japan, Korea, India and Southeast Asia), South America (Brazil, Argentina, Colombia, etc.), Middle East & Africa (Saudi Arabia, UAE, Egypt, Nigeria, and South Africa).

Also, the Internet Security Audit Market report provides a Detailed Analysis of Market-Definitions, Classifications, Applications, and Market Overview;product specifications; manufacturing processes; cost structures, raw materials, and so on. The report considers theimpact of the novel COVID-19 pandemic on the Internet Security Audit marketwith Competitive Intensity and How the Competition Will Take Shape in Coming Years. The report also covers the trade scenario, Porters Analysis, PESTLE analysis, value chain analysis, and company market share.

For more Customization, Connect with us athttps://www.inforgrowth.com/enquiry/6671309/Internet Security Audit-market

Key Attributes of Market Report:

Internet Security Audit market along with Report Research Design:

Internet Security Audit Market Historic Data (2015-2020):

Internet Security Audit Market Influencing Factors:

Internet Security Audit Market Forecast (2021-2026):

If you are an investor/shareholder in the Internet Security Audit Market, the provided study will help you to understand the growth model of the Internet Security Audit Industry after the impact of COVID-19. Request for sample reporthttps://www.inforgrowth.com/CovidImpact-Request/6671309/Internet Security Audit-market

For all your Research needs, reach out to us at:

Contact Person:Rohan

Email:[emailprotected]

US:+1-909-329-2808

See original here:
Glonal Internet Security Audit Market 2021 Industry Outlook, Research, Key Trends and Forecast to 2026 SoccerNurds - SoccerNurds

State of the Internet / Security: Adapting to the Unpredictable – BankInfoSecurity.com

Please fill out the following fields:

CountryUnited StatesCanadaIndiaAfghanistanAlbaniaAlgeriaAmerican SamoaAndorraAngolaAnguillaAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean Trty.Brunei DarussalamBulgariaBurkina FasoBurundiCambodiaCameroonCape VerdeCayman IslandsCentral African RepublicChadChileChinaChristmas IslandCocos (Keeling) IslandsColombiaComorosCongoCook IslandsCosta RicaCote D'IvoireCroatiaCubaCyprusCzech RepublicDenmarkDjiboutiDominicaDominican RepublicEast TimorEcuadorEgyptEl SalvadorEquatorial GuineaEritreaEstoniaEthiopiaFalkland Islands (Malvinas)Faroe IslandsFijiFinlandFranceFrance, MetropolitanFrench GuianaFrench PolynesiaFrench Southern TerritoriesGabonGambiaGeorgiaGermanyGhanaGibraltarGreeceGreenlandGrenadaGuadeloupeGuamGuatemalaGuineaGuinea-BissauGuyanaHaitiHondurasHong KongHungaryIcelandIndonesiaIran (Islamic Republic of)IraqIrelandIsraelItalyJamaicaJapanJordanKazakhstanKenyaKiribatiKoreaKorea (Democratic)KosovoKuwaitKyrgystanLaosLatviaLebanonLesothoLiberiaLibyaLiechtensteinLithuaniaLuxembourgMacauMacedoniaMadagascarMalawiMalaysiaMaldivesMaliMaltaMarshall IslandsMartiniqueMauritaniaMauritiusMayotteMexicoMicronesiaMoldovaMonacoMongoliaMontserratMoroccoMozambiqueMyanmarNamibiaNauruNepalNetherlandsNetherlands AntillesNeutral ZoneNew CaledoniaNew ZealandNicaraguaNigerNigeriaNiueNorfolk IslandNorthern Mariana IslandsNorwayOmanPakistanPalauPanamaPapua New GuineaParaguayPeruPhilippinesPitcairnPolandPortugalPuerto RicoQatarReunionRomaniaRussian FederationRwandaSaint HelenaSaint Kitts and NevisSaint LuciaSaint Pierre and MiquelonSaint Vincent and the GrenadinesSamoaSan MarinoSao Tome and PrincipeSaudi ArabiaSenegalSerbiaSeychellesSierra LeoneSingaporeSlovakiaSloveniaSolomon IslandsSomaliaSouth AfricaSpainSri LankaSudanSurinameSvalbard and Jan MayenSwazilandSwedenSwitzerlandSyrian Arab RepublicTaiwanTajikistanTanzaniaThailandTogoTokelauTongaTrinidad and TobagoTunisiaTurkeyTurkmenistanTurks and Caicos IslandsTuvaluUgandaUkraineUnited Arab EmiratesUnited KingdomUruguayUS Minor Outlying IslandsUzbekistanVanuatuVatican City StateVenezuelaViet NamVirgin Islands (British)Virgin Islands (US)Wallis and FutunaWestern SaharaYemenYugoslaviaZaireZambiaZimbabwe

Title Level Analytics/Architecture/Engineering Attorney / General Counsel / Counsel AVP Board of Director C - level C Level - Other CCO CEO / President CFO Chairperson CIO CISO / CSO CISO/CSO/CIO COO CRO CTO Director EVP / SVP / FVP Head Healthcare Professional Manager / Supervisor Partner Specialist/Other Staff VP --Other Title Level--

Job Function Anti-Money Laundering (AML) Audit BSA Business Continuity/Disaster Recovery Business Development Cashier / Customer Service / Administrative Clinical Healthcare Professional Cloud - IT Cloud - Security Compliance Compliance / BSA Data Management Debit/Credit Card/Electronic Banking eCommerce / eBusiness Executive Management Finance / Accounting Founder / Owner Fraud HR / Training Information Security Information Technology Legal Lending Loss Prevention Marketing Network / Systems / Web Operations Others Policies / Procedures Product Management Project Regulatory Affairs Risk Management Sales Security / Privacy Vendor Management --Other Job Function--

Subscription Preferences:

BankInfoSecurity

InfoRiskToday

DataBreachToday

CareersInfoSecurity

Subscribe

Continued here:
State of the Internet / Security: Adapting to the Unpredictable - BankInfoSecurity.com

WatchGuard reports the ups and downs of malware – iTWire

Security vendor WatchGuard Technologies' Internet Security Report for Q4 2020 shows fileless malware attack rates grew by nearly 900% while unique ransomware payloads plummeted by 48%.

Fileless malware rates in 2020 increased by 888% over 2019, according to WatchGuard.

One problem with fileless attacks is that they can evade detection by traditional endpoint protection products. Another is that all it takes to become a victim is visiting a malicious or compromised web page.

Once the malware is delivered, toolkits such as PowerSploit and CobaltStrike can be used to inject malicious code into legitimate processes, which will continue to run even if the script that delivered the code is detected and removed.

Applying endpoint detection and response alongside regular anti-malware products can help identify these threats.

Cryptocurrency prices have trended upwards, and cryptominer malware detections climbed more than 25% in 2020. 850 unique variants were detected during the year.

Double-digit growth was also seen in encrypted malware attacks. In the fourth quarter of 2020, 47% of all attacks detected by WatchGuard at the network perimeter were encrypted.

A new trojan Trojan.Script.1026663 found its way around email scanners and entered WatchGuard's list of the top five most-widespread malware detections in the same period. An email asking victims to review an order list attachment, but the malicious document triggers a series of payloads and malicious code that ultimately installs the Agent Tesla remote access trojan (RAT) and keylogger.

Botnet malware targeting IoT devices and routers is a growing issue. The Linux.Generic virus (aka The Moon) entered WatchGuard's list of top 10 malware detections. Linux-specific malware designed for ARM processors and another payload designed for MIPS processors shows a clear attack on IoT devices.

Despite some well-publicised cases, ransomware attack volumes shrank for the second year running. The number of unique ransomware payloads also continued to fall, from a record 5,489 in 2018 to 4,131 in 2019 and 2,152 in 2020. Each variant may have infected hundreds or thousands of endpoints worldwide.

Most ransomware detections were against signatures implemented in 2017 to detect WannaCry and related variants.

The decline in volume reflects a shift from scattergun campaigns to highly targeted attacks against targets that are particularly sensitive to downtime, including healthcare organisations and manufacturing firms.

In 4Q20, WatchGuard appliances blocked more than 20.6 million malware variants (456 per device) and nearly 3.5 million network threats (77 detections per appliance).

"The rise in sophisticated, evasive threat tactics last quarter and throughout 2020 showcases how vital it is to implement layered, end-to-end security protections," said WatchGuard CTO Corey Nachreiner.

"The attacks are coming on all fronts, as cyber criminals increasingly leverage fileless malware, cryptominers, encrypted attacks and more, and target users both at remote locations as well as corporate assets behind the traditional network perimeter. Effective security today means prioritising endpoint detection and response, network defences and foundational precautions such as security awareness training and strict patch management."

WatchGuard's Q4 2020 Internet Security Report is available here.

Visit the iTWire Shop, a leading destination for stylish accessories, gear & gadgets, lifestyle products and everyday portable office essentials, drones, zoom lenses for smartphones, software and online training.

PLUS Big Brands include: Apple, Lenovo, LG, Samsung, Sennheiser and many more.

Products available for any country.

We hope you enjoy and find value in the much anticipated iTWire Shop.

ENTER THE SHOP NOW!

We work with you to develop the message and conduct the interview or product review in a safe and collaborative way. Unlike other Tech YouTube channels, we create a story around your message and post that on the homepage of ITWire, linking to your message.

In addition, your interview post message can be displayed in up to 7 different post displays on our the iTWire.com site to drive traffic and readers to your video content and downloads. This can be a significant Lead Generation opportunity for your business.

We also provide 3 videos in one recording/sitting if you require so that you have a series of videos to promote to your customers. Your sales team can add your emails to sales collateral and to the footer of their sales and marketing emails.

See the latest in Tech News, Views, Interviews, Reviews, Product Promos and Events. Plus funny videos from our readers and customers.

SEE WHAT'S ON ITWIRE TV NOW!

See the rest here:
WatchGuard reports the ups and downs of malware - iTWire

How did the cyber attack on Nine and Parliament House happen? – ABC News

Both federal Parliament and Channel Nine faced major IT disruptions on Sunday, something one expert said could be a coincidence, but could also be linked to previous malicious attacks likethoseon Microsoft Exchange servers.

The system disruptions left parliamentary staff without mobile access to their emails over the weekend, while the "cyber attack" on Channel Nine prevented the broadcaster from airing several programs, including Weekend Today.

The Australian Cyber Security Centre (ACSC) is investigating both incidents.

Edith Cowan University Security Research Institute director Craig Vallisaid attacks or disruptions could happen when systems were not "patched" or protected against specific malicious codes.

He said when systems were not protected against a "known" attack code, they could be compromised.

Supplied (ECU)

If it was an unknown attack and an unknown exploit tool, it was considered more sophisticated, because it would have taken more advanced planning.

"If it's unknown, it tends to be either [a] new code that spins off the back of something like this Microsoft Exchange [attack], or sophisticated actors who are being paid go after the information itself," he said.

Professor Valli said there could be motivation for a sophisticated attack on Channel Nine, "giventhat Channel Nine may be working on stories where they're holding confidential information, as journalists do, that may be of interest to criminal gangs to find leaks".

ABC News

Professor Valli said if the attack on either federal Parliament or Channel Nine was "known" and it was similar to the recent Microsoft Exchange attacks, they could have been prevented by patches, something he likened to vaccines.

"The longer you leave it unpatched, the probability that someone's going to attack you will increase," he said.

Rachael Falk, chief executive of Cyber Security Cooperative Research Centre, said she could not yet say if the attack was because the target systems were vulnerable or if the attack was simply too sophisticated.

"It's a timely reminder for everyone, from the chair and the board and the CEO [of Channel Nine] down, that you cannot be complacent about cyber attacks," she said.

"If it can happen to Channel Nine, it can happen anywhere, because we all run on connected systems."

In early March, the ACSC published a series of alerts warning organisations using Microsoft Exchange to urgently patch their software after it was compromised by hackers.

Reuters: Dado Ruvic

That was because malicious codes evolved in a similar way to variants of human diseases like COVID-19 do, Professor Valli said.

"If you launch a piece of malicious codeand it's network-aware, which most of them are, it will spread through the internet basically at the speed of light," he said.

"As soon as someone finds a new technique to exploit a system, then others will copy it, because it's efficient, because they don't have to invent their own."

Channel Nine described the attack as the largest on a media company in Australia's history.

Professor Valli was not convinced that was necessarily the case, but he said it might have had the largest consequencesbecause it impactedprograms over several hours.

In a subsequent email to staff yesterday, Channel Nine CEO Mike Sneesby said the attackwas "significant in scale with high potential to disrupt our business", while the network's chief information and technology officer Damian Cronin called it "sophisticated and complex".

Supplied: Nine Network

He said technology teams had "isolated the attacker and thespecific destructive activity that was initiated", but several services were still not available.

"This will have a significant impact on business-as-usual processes across the organisation it will take time before all our systems are back up and running," he said.

Federal government sources told the ABC the attack on their email access was not sophisticatedbut that does not mean it was not potentially serious.

One person with knowledge of the investigation said a hacker "tried so clumsily to compromise the [Department of Parliamentary Services]system in particular, that the system itself noticed and shut down, exactly like [it was] designed to do".

Referring to the federal Parliament disruption, Professor Valli said there was "every possibility" it was state-sponsored but it could also have been because the system was not patched.

Professor Valli said if it was not state-sponsored, it was more of a concern because it shows how vulnerable their systems are.

Ms Falk said it was too early to tell who was responsible for the attack.

She said it could have been a state-based attackbut she said in many casesthese types of attacks were "opportunistic".

Professor Valli said it was too early to tell if anything had been accessed, but the ASCS wasinvestigating.

Originally posted here:
How did the cyber attack on Nine and Parliament House happen? - ABC News

Internet Security Software Industry Insight report 2021-2026 Covering Prime Factors and Competitive Outlook by Key Players SoccerNurds – SoccerNurds

Global Internet Security Software Market 2021 by Manufacturers, Type, and Application, forecast to 2026 and published by In4Research provides a crucial analysis of this market and assesses its various segmentations. The report analyzes growth trends of the market components over the recent years and the scope for the market development. Moreover, the report also considers the governments policies in the evaluation of the market behavior to illustrate the potential opportunities and challenges of the market in each region. The report also covers the recent agreements including merger & acquisition, partnership or joint venture, and the latest developments of the manufacturers to sustain in the global competition of the Internet Security Software market.

Internet Security Software Market Report Provides Comprehensive Analysis on Following:

Get Sample Copy of the Premium Report, Contact us at https://www.in4research.com/sample-request/18614

Competitive Analysis of Internet Security Software Market:

The Internet Security Software market has been segmented by commodity type, end-users, technology, industry verticals, and regions. The in-depth research will allow readers to better understand well-established and emerging players in shaping their business strategies to achieve long-term and short-term goals. The report outlines a wide range of areas and locations where key participants could identify opportunities for the future.

The Major Players Covered in Internet Security Software Market Report are:

As a part of Internet Security Software market segmentation, our study exhibits a market analysis based on type, industry application, and geography.

By Product Type

By Application

By Region

For more Customization, Connect with us at https://www.in4research.com/customization/18614

Internet Security Software Market Research Methodology:

The study is all-inclusive of research that takes account of recent trends, growth factors, developments, competitive landscape, and opportunities in the global Internet Security Software Industry. With the help of methodologies such as Porters Five Forces analysis and PESTLE, market researchers and analysts have conducted a large study of the global Internet Security Software Market.

The analysis would provide data on the closest approximations to the market leaders/new entrants of the overall industry volume numbers and the sub-segments. This research will help stakeholders understand the business landscape, gain more information, and plan successful go-to-market strategies to better position their companies.

Internet Security Software Market landscape and the market scenario include:

The Internet Security Software industry development trends and marketing channels are analyzed. Finally, the feasibility of new investment projects is assessed, and overall research conclusions offered.

Ask Your Queries to our Analyst regarding Internet Security Software Report at https://www.in4research.com/speak-to-analyst/18614

Chapters Covered in Internet Security Software Market Report are As Follow:

Buy Full Research Report at https://www.in4research.com/buy-now/18614

FOR ALL YOUR RESEARCH NEEDS, REACH OUT TO US AT:

Contact Name: Rohan

Email: [emailprotected]

Phone: +1 (407) 768-2028

Go here to read the rest:
Internet Security Software Industry Insight report 2021-2026 Covering Prime Factors and Competitive Outlook by Key Players SoccerNurds - SoccerNurds

Meet the 2021 SC Awards judges | SC Media – SC Magazine

Each year, a select pool of experts from the cybersecurity community sets hours aside to review hundreds of entries received for the SC Trust and Excellence Awards. For 2021, the judges took on a record number of submissions, identifying which products, people and companies stood out during a tumultuous year.

Click here to see the full list of 2021 SC Award finalists

Below is our esteemed panel of SC Awards judges, contributing from health care, engineering, finance, education, manufacturing, nonprofit and consulting, among others.

Brian Levine is senior director of product security at Axway, a global security engineering organization delivering training, tools, processes and DevSecOps practices for secure applications and cloud services to the enterprise market. With a career spanning two decades as a technology provider to businesses and government agencies, Levine brings a strategic and pragmatic approach to building secure software and cloud services without disrupting product velocity.

Cedric Leighton is founder and president of Cedric Leighton Associates, a strategic risk and leadership management consultancy. Leighton honed his analytical and leadership skills during a 26-year career as an intelligence officer in the U.S. Air Force. He retired as a colonel in 2010. Since founding Cedric Leighton Associates, he has become an internationally known strategic risk expert.Leighton is also a founding partner of CYFORIX, specializing in the field of cyber risk.

Alissa Abdullah is Mastercards deputy chief security officer, leading the Emerging Corporate Security Solutions team and responsible for protecting Mastercards information assets as well as driving the future of security. She is also the host of the Mastering Cyber podcast. Prior to Mastercard, Abdullah was the chief information security officer at Xerox, where she established and led a corporate-wide information risk management program. She also served as the deputy chief information officer of the White House.

DanBasile is the chief information security officer for the RELLIS campus at the Texas A&M University System and director of Statewide Cybersecurity Services.These organizations create opportunities for advanced research and education, as well as provide cybersecurity services for public sector organizations across the state of Texas.

RootaAlmeida is the chief information security officer at Delta Dental of New Jersey and Connecticut, and has been instrumental in helping to establish Delta Dental of New Jerseys Office of Information Security. Almeida led the development and implementation of enterprise-wide information security strategy, policies, risk assessments and controls. Prior to joining Delta Dental,Almeidawas the CISO at Covanta Holding Corporation, a leader in energy-from-waste management services.

ToddBellserves as the chief information security officer and executive director at Valleywise Health. Hedrives the companys enterprise vision, strategy and programs to protect patients, critical data and clinical systems, within the organization and in conjunction with Arizona Health Education Alliance. Bell has more than 20 years experience in information technology and security strategy, most recently serving as chief security and trust officer for Verdigris Holdings, a mobile banking platform.

Chuck Brooks is president of Brooks Consulting International and an ambassador for the Cybersecurity Collaborative. In government, Brooks served under President George W. Bush as the first legislative director of the Science and Technology Directorate at the Department of Homeland Security, and as a top adviser to the late Senator Arlen Specter on Capitol Hill coveringsecurity and technology issues. In industry, Brooks has served in executive roles for General Dynamics, Xerox and SRA.

Lszl Dellei is the founding owner of KERUBIEL in Hungary and the U.S., providing solutions to protect clients pool of information. He is also a registered and active security expert for the European Commission. Dellei led and delivered many successful projects in security over the past 20 years, focusing primarily on the government and financial sectors.

GaryLong is an information security professional with over 25 years of experience working in the public and private sector in information security consulting, sales and management.Long served in such positions as information security officer at Cerner Corporation, principal at several information security consulting firms and as an enterprise sales team member for major vendors including Check Point and Cisco. Longis also an adjunct professor in cybersecurity at Northeastern State University.

PaulDumbletonis security operations and identity team manager at Gordon Food Service (GFS), the largest private food services company in North America.Dumbleton is an experienced IT and security professional, having served in most major roles over the past 25 years. Dumbletons focus on visibility, threat hunting and defense has contributed to a robust and effective security program at GFS.

AjitGaddamis head of cybersecurity products at Visa, where he is responsible for building large-scale, AI-driven cybersecurity products, leading engineering programs and providing expert guidance on cybersecurity matters. He is an active participant in various open source and standards bodies, is a prolific inventor of disruptive technologies (over 100 global patents) and moonlights as an instructor.

Terry Gold is the founder of D6 Research, a research and advisory firm specializing in cybersecurity across the physical and digital domains. He specifically focuses on practices and outcomes analysis. He dedicated years to developing extensive threat, controls, deployment and financial models built on real-world organizational operations that are in use across some of the largest corporations. Hes a board member of Security B Conferences of California and former board member of ISSA of Orange County.

Todd Grober is a manager in EYs cybersecurity consulting practice, specializing in threat exposure management and technology controls. He has 15 years of cybersecurity technical product and program management experience delivering cyber solutions and developing thought leadership across multiple verticals, with a focus on threat detection, threat exposure management, response/remediation and protection.

Dheeraj Gurugubelli is a director in EYs Strategy & Transactions Group. He is a cybersecurity and M&A professional, focusing predominantly within financial services, life sciences, healthcare and retail industries. He advises both private equity and corporateson cybersecurity strategy, risk and transformation across the capitalagenda. He has led cybersecurity diligence and/or security program transformation efforts inover 50 M&A deals across multiple industries globally.

John Bruggeman is chief technology officer at Hebrew Union College Jewish Institute of Religion. He directs the strategic use of information technology for the College-Institute and is responsible for both IT and E-Learning departments for a four campus network of 350+ computers distributed across two countries and 10 time zones.

JohnJohnsonis cybersecurity leader for a large consumer manufacturing company. He was previously senior manager at Deloitte, focused on IoT and industrial cybersecurity. Prior to that, he was chief technology officer at a technology startup, security architect at John Deere for 18 years, and developed and taught graduate cybersecurity for 16 years.

Ashutosh Kaps is the head of cybersecurity at IOOF Holdings Limited, one of the largest non-banking financial services organizations in Australia. He has been working in the information security, technology risk and compliance field in Australia for more than 25 years. Prior to IOOF, he has been security adviser for eight federal government departments. He has also advised state and local government, utilities, large infrastructure and logistics organizations.

ChrisLambrouis chief information officer at Metro MLS in Milwaukee. He has more than 20 years in MLS management, software architect, customer service and executive IT project leadership, and is an accomplished musician (in his own mind), baseball enthusiast and father of two (the most challenging task of all). Lambrou is workgroup chair for the Real Estate Standards Organization and executive committee member of the Institute of Electrical and Electronics Engineers.

DanielLieberis the president of Innovative Ideas Unlimited, with 25 years of experience in advanced computing security. He has actively worked with global organizations, banks, governments, security companies and law enforcement. His expertise is in social engineering, technology, security algorithms and business. In addition to running the successful consultancy, he has been a CIO and vCIO at various organizations. His passions include transforming health care and building strong communities.

Sean McElroy has been securing financial services solutions in the cloud for over 20 years. As a co-founder of Alkami Technology, he helped protect millions of consumers across online banking platforms.In his role as CISO of Lumin Digital, he is responsible for cybersecurity, risk management and compliance programs to scale the next generation of cloud-based digital banking.

Michelle Moore is the director of the Graduate Cyber Security Operations & Leadership program and professor of practice with the University of San Diego. She has over two decades of experience as a cybersecurity professional and over 10 years of experience as a professional educator. Moores research topics are dedicated to the ongoing progression of cyber law, cybercrime, national and international cyber policy, and disaster recovery efforts.

TravisPaakkihas worked in information technology for 25 years for Fortune 100 energy and manufacturing companies as well as businesses as small as early-stage startups. Pakkis focus areas have been in infrastructure, information security and IT leadership. He earned a doctorate in computer science, completing his dissertation after three years of research on the challenges of information security in K-12 education.He is deputy CTO for a large school district in the Pacific Northwest.

Mitchell Parker has served as chief information security officer at Indiana University Health for 11 years. He is responsible for providing policy and governance oversight and research, third-party vendor guidance, proactive vulnerability research and threat modeling services, payment card and financial systems security, and security research to IU Health and IU School of Medicine.

DavidPoeis the vice president of data architecture and shared solutions for United Way Worldwide.He is responsible for strategic technology systems that support and enhance the lives of people and communities across the globe. Over his 25+ year career, Poe worked in several other significant infosec related roles, most notably as chief technology officer of United Way of Greater St. Louis, and chief operating officer and CTO with Upic Solutions.

Marcus (Marc)Sachsis deputy director for research at Auburn Universitys McCrary Institute for Cyber and Critical Infrastructure Security, and serves as the chief security officer of Pattern Computer. A retired U.S. Army officer, Sachs served as deputy director of SRI Internationals Computer Science laboratory, vice president of national security policy at Verizon Communications, and SVP and CSO of the North American Electric Reliability Corporation. He was also director of the SANS Internet Storm Center.

Randolph (Randy) Sanovic is owner of RNS Consulting, having previously served as industrial engineer for the Youngstown Steel Company, manager of computer security planning for Mobil Corporation and director of information systems security for United Healthcare. In 1997, Sanovic became general director, information security for General Motors, responsible for GMs information security strategy, programs, plans and global information security posture.

LaurenZinkis an information security professional who has developed, expanded and maintained security awareness programs for numerous companies, including Opportun, AmTrust and Diebold Nixdorf. Zink is also a LinkedIn Learning cyber author of two security courses and a huge advocate for women in STEM, volunteering her time mentoring women as well as talking at schools, businesses and conferences.

Mike Calero is founder of Urbis Global LLC. As a chief security officer, he established an enterprise security risk management program. His career spans the private and public sectors, including startup companies, Fortune 500 enterprises, and federal, state and local government. His responsibilities have included protection of information systems, physical assets and critical infrastructure in strategic, tactical and operational capacities.

Ira Winkler is chief information security officer for Skyline Technology Solutions.He is known for espionage simulations, physically and technically breaking into companies and then sharing how they could better protect their computer infrastructure.Winkler was an intelligence and computer systems analyst at the National Security Agency, president of the Internet Security Advisors Group, chief security strategist at HP Consulting and director of technology at the National Computer Security Association.

VandanaVerma brings extensive experience across a range of security disciplines, from application security to infrastructure and now DevSecOps. She is part of the OWASP Global board of directors and works in various communities to advance diversity initiatives, including InfoSecGirls, WoSec and Null. Verma has worked with security teamsatIBM, AccentureandTime Inc. of India.

PaulFarleyis the deputy chief information security officer at NCR Corporation. He runs the NCR Cyber Defense Center and is responsible for the security engineering and support, threat intelligence, vulnerability management, adversary simulation, threat hunting and incident response functions.Farleywas previously the director of information risk and assurance. Prior to NCR, he held a variety of information security roles for Verint, Equifax and Cox Communications.

Tammy Moskites is the CEO and Founder of CyAlliance. She is a strategic adviser and alliance builder for companies, vendors and startups by leading and scaling security offerings while providing executive advisory services and professional services for companies worldwide. She is a career chief information security officer, and has held security and technology leadership roles at Accenture, Venafi, Time Warner Cable and The Home Depot. She is a venture advisor to YL Ventures.

Dr. Mansur Hasib has 30 years of experience, including 12 as chief information officer, leading organizational transformations through digital leadership and cybersecurity strategy in healthcare, biotechnology, education and energy. Dr. Hasib hosts a weekly video podcast called Conversations with #DrCybersecurity on which he answers questions about personal development, careers, education, leadership or public speaking.

Richard Timbol is a cybersecurity and compliance professional with over 26 years of global IT experience. Currently the head of cybersecurity at Davis Polk, he has also directed departments in InfoSec operations, network engineering, messaging and end point support. He has served on the New York State eHealth Information Privacy and Security Collaborative and on several security advisory boards, including, currently, as the vice chairman of the Threat Intelligence Committee for the LS-ISAO.

Glenda Lopez is a cybersecurity professional who leads the Policy Management and Security Awareness, Education and Communication Program at The Henry M. Jackson Foundation for the Advancement of Military Medicine (HJF). In this role, she ensures the security and privacy of HJFs information assets by creating, communicating, maintaining and assessing the effectiveness of the foundations security controls. Lopez previously worked in policy and security roles at Aetna and Bank of America.

Priscilla Tate is the founder and executive director of Technology Managers Forum, an association with a membership of over 1,000 IT managers working for mid-range and Fortune 1000 organizations in New York. She previously worked in enterprise technology management at Citibank, EF Hutton and Manufacturers Hanover Trust (now Chase). Tate produces Security Forum, an invitation-only conference held twice a year in New York City, and provides consulting services.

Erin Jacobs started @UrbaneSec in 2009 to conquer information security and compliance with boutique attention to detail, delivery and talent that organizations desperately need in todays technical landscape.Jacobs has established several industry best practices and fostered collaboration between the C-suite, practitioners that oversee day-to-day security challenges and the security research community at large to help them learn from each other and, ultimately, improve the industry.

Sandi Roddy is a senior cyber advisor at the Johns Hopkins Applied Physics Laboratory, advising strategic system resiliency modeling and testing. She served as chief scientist for the Cyber Warfare Operations Group, and, prior to Johns Hopkins, deputy director of the National Security Agencys Laboratory for Telecommunication Sciences. Roddy worked across NSA and DoD, focusing on public key infrastructure, identity and access management, sensor analysis and fusion, and SOAR technologies.

Krishna Vedula is chief operating officer at 365 Retail Markets. He previously served as vice president of technology at ACI Worldwide, delivering software that powers electronic transactions for financial institutions, processors and retailers around the world. He also spent a decade at CenturyLink, leading software development teams in the delivery of fully integrated enterprise IT solutions.

Patrick J. OGuinn, Sr. is a professor and program director of digital forensics and cyber investigation at University of Maryland Global Campus. He has spent 17 of his 28 years in higher education developing, teaching and directing Maryland digital forensics cyber Investigation programs.At Howard Community College, OGuinn developed courses in criminal justice and computer forensics, and created and directed the digital forensics program.

Stephen Davis is chief information security officer and chief privacy officer at Macmillan. He has spent the last 20+ years implementing information security, technology and privacy programs, overseeing technology groups, integrating security into software products and consumer goods, building corporate compliance programs, and providing oversight to data protection initiatives. Davis supported program management at a range of organizations, including TD Bank and Kaplan.

Kelley Misata survived years of cyberstalking, reaching out to nonprofits for help and finding little. She earned a Ph.D. in information security from Purdue University, focusing her dissertation on cyber preparedness of nonprofits working with victims of violence. She founded Sightline Security to change how nonprofits address cybersecurity. She serves as executive director of the Open Information Security Foundation, a nonprofit dedicated to building open source security technologies.

VJ Viswanathan is a veteran global technology executive, currently serving as a founding partner at CYFORIX, a global cybersecurity research, advisory and strategy firm delivering solutions to public and private sectors. He also serves as the CEO at TORQE, a specialized due diligence, advisory and technology services firm delivering value through analytics and automation. Viswanathan is also the co-host of ELEVATEINTEL, a podcast series at the nexus of technology, social and defense.

Here is the original post:
Meet the 2021 SC Awards judges | SC Media - SC Magazine