Page 2,138«..1020..2,1372,1382,1392,140..2,1502,160..»

Top Crypto Trader Says Ethereum (ETH) Dip Is an Opportunity, Predicts Explosive Move for This Altcoin – The Daily Hodl

A popular cryptocurrency analyst is bullish on Ethereum (ETH) and singles out one altcoin that might outperform other large-cap crypto assets.

Pseudonymous crypto trader Smart Contracter tells his 204,800 Twitter followers that Ethereum retracing to slightly above $3,000 after surging to a high last reached in mid-January is an opportunity.

Smart Contracter says his bullish thesis is built on Ethereums price is resting above the major moving averages (MA) including the 50-period MA on the four-hour chart.

Lot of people freaking out again here but Im liking ETH.

Already cleared all the major four-hour moving averages and looks like a nice clean test of the 50 MA here.

Viewing the trend as up at the moment and this dip as an opportunity.

Ethereum is trading at $3,109 at time of writing.

Next up is the native token of Avalanche (AVAX), a smart contract-enabled blockchain. According to Smart Contracter, AVAX could perform relatively better than other large-cap crypto assets by market cap after withstanding a sell-off following its recent listing on the South Korean crypto exchange Upbit.

Seeing AVAX manage to hold its Upbit listing pump and not get faded seems pretty bullish to me.

I think it has a red hot chance at being the first top-10 coin to reach its prior all-time high.

Avalanche is trading at $90.36 at time of writing and is currently the 10thlargest crypto asset by market cap. It is about 38% down from its all-time high of roughly $145. The all-time high was reached in November of 2021.

Featured Image: Shutterstock/klyaksun

Continue reading here:
Top Crypto Trader Says Ethereum (ETH) Dip Is an Opportunity, Predicts Explosive Move for This Altcoin - The Daily Hodl

Read More..

3 Altcoins, not Bitcoin (CRYPTO:BTC), Have Triple-Digit Return Potential – The Motley Fool Canada

Image source: Getty Images

Any type of cryptocurrency other than the worlds most popular crypto, is called an altcoin. Ethereum (CRYPTO:ETH), Cardano (CRYPTO:ADA), and Ripple (CRYPTO:XRP) are examples of altcoins. The three are gaining investors attention and could be the best alternatives to Bitcoin.

You can liken digital currencies to growth stocks because of their massive return potentials. Bitcoin rose to an all-time high of US$67,566.83 on November 8, 2021, but the rally did not last. Bitcoins volatile nature showed once more and the price dropped 48.2% to US$35,030.25 on January 22, 2022.

As of this writing, BTC trades at US$44,388.80, a year-to-date loss of 4.2%. While the crypto has climbed above US$40,000, dont discount a pullback. Some crypto analysts think Ethereum, Cardano, and Ripple could have better chances of providing triple-digit returns in 2022.

Ethereum, the second-most popular cryptocurrency, outperformed Bitcoin last year. Its total return was 399.1% compared to BTCs 59.7%. This altcoin also went on a tailspin after peaking to US$4,812.90 in November 2021. The price sunk below US$3,000 but currently trades at US$3,239.46 (-12% year-to-date).

Many observers in the crypto sector believe that ETH has a higher price potential than BTC. The Ethereum blockchain is among the extensive networks in the industry and the upgrade to Ethereum 2.0 could propel the crypto higher. The networks overhaul began in 2020 and should finish by the summer of 2022.

ETH holders should welcome the upgrade because transaction fees will be lower. Moreover, replacing the proof-work mining structure with staking will make the traditional mining system obsolete. According to crypto experts, the Ethereum network is more versatile as other cryptos, including non-fungible tokens (NFTs), trade on the platform.

Some crypto bulls recommend Cardano because the open-source blockchain network boasts excellent prospects. Its platform is similar to Ethereum as developers can also build decentralized applications (dApps) and launch smart contracts. Thus, you can say that this fast-growing blockchain network is Ethereums chief rival or competitor.

Cardanos overall return in 2021 was an astronomical 622.3% and it currently trades at US$1.1948. Its potential increase in value hinges on the success of projects in the pipeline. One of its aims is to carry complex transactions without the need for conduit banks or brokers.

Ripple might have a significant market share by now if not for the U.S. SEC lawsuit filed last December 2020. The company operates RippleNet, a payment and exchange network. XRP is the national token of the network that offers faster and more affordable money transfer fees. Cross-border payments are likewise instant compared with traditional systems.

Unfortunately, Ripple cant take off due to the pending case. On February 8, 2022, CoinDesk reported that XRPs market cap rose above US$40 billion to overtake Cardano. Its now the sixth-largest cryptocurrency in the world. The price climbed to $0.878 and some analysts say XRP could appreciate exponentially if the court rules in favour of Ripple soon.

Bitcoin is the still the undisputed crypto king with its market cap of US$832.32 billion. However, that doesnt mean its the most appealing cryptocurrency. Ethereum and Cardano have delivered higher gains already and Ripple could soon too.

More:
3 Altcoins, not Bitcoin (CRYPTO:BTC), Have Triple-Digit Return Potential - The Motley Fool Canada

Read More..

What the Duck? Why an EU Proposal to Require "QWACs" Will Hurt Internet Security – EFF

It's become easier over the years for websites to improve their security, thanks to tools that allow more people to automate and easily set-up secure measures for web applications and the services they provide. A proposed amendment to Article 45 in the EUs Digital Identity Framework (eIDAS) would roll back these gains by requiring outdated ideas for security and authentication of websites. The amendment states that web-browsers shall ensure that the identity data provided using any of the methods is displayed in a user-friendly manner. The amendment proposal emphasizes a specific type of documentation, Qualified Web Authentication Certificates, or QWACs, to accomplish this goal. The problem is that, simply put, the approach the amendment suggests has already been debunked as an effective way to convey security to users.

QWACs use guidelines similar to Extended Validation (EV) certificates. Both are digital certificates issued to domain owners with an added process that establishes an identity check on the domain owner. This approach has been proven ineffective over the years.

For a short while, browsers made a point of showing EV certificates to the user, displaying the certificate details in green. They assumed that this clear marker would indicate more security for users. However, nefarious parties ended up obtaining EV Certificates and hosting phishing sites. This highlights that HTTPSsupported by certificatesestablishes a secure connection between you and that website, but does not guarantee the website itself is storing or using the information you may submit to it ethically. Nor is it an assurance that a company's business practices are sound. That is what consumer protection laws are for.

Because emphasizing these certificates proved ineffective in helping user security, Chrome and Firefox in 2019 decided to no longer emphasize EV Certified websites in the URL bar. Safari stopped in late 2018. However, EV certificates are significantly more expensive and some Certificate Authorities (CAs) that sell them still inaccurately suggest that browsers emphasize EV certificates in their sales pitch for these products. Requiring that QWACs be displayed in the same fashion is just further pursuing the illusion that displaying identity information to the user will be worth the effort.

Requiring browsers to trust these certificates by EU government-mandated CAs, could impact users outside the EU as well. Rather than improve security as intended, this would likely force the adoption of a security-hindering feature into the internet experiences of users within and outside the EU. People could be susceptible to poor response of security incidents with EU-mandated CAs, breach of privacy, or malware targeting.

Its even been ludicrously suggested by Entrust (a CA) that any website that doesnt use QWACs or EV certificates be flagged by the browser with a warning to the user when they submit data. Such a warning would make no sense, because standard Domain Validation (DV) certificates provide the same security for data in transit as EV does.

Trust Services Forum - CA Day 2021

Transport Layer Security (TLS) is the backbone to secure your connection to a website. When this occurs, it is called HTTPS. Think of it as HTTP(S)ecure.

Browsers have worked for years to show people that their connection is secure without confusing them. This proposal would undo much of that user education by potentially unleashing a flood of warnings for sites that were actually adequately secured with DV certificates.

This amendment also makes problematic assumptions about how much consumers know about the identity of companies. Large corporations like Unilever own many products and brands, for example, and consumers may not realize that. Some well known brands, like Volvo automobiles, are owned by companies with seemingly unrelated names. Its also not impossible for two companies that offer completely different products to share a name; the marketing term brand twins describes this. Examples include Delta Airlines and Delta Faucet, or Apple Records and tech giant Apple, Inc.

Researcher Ian Carroll filed the necessary paperwork to incorporate a business called Stripe Inc

For these reasons, it is nearly impossible for a QWAC to achieve its stated goal of making the entity that owns a domain easily apparent to the people visiting a websiteespecially across the globe. QWACs also put up a weak defense against the simplest and most effective forms of hacking: social engineering. The very peoplescammers, phishers, etc.who are allegedly hindered with an EV or QWAC certificate, have and will find a way around them, because the validation process is still led by humans. Also, we shouldnt endorse the dangerous premise that only the right people in other words, those who can afford itshould have encrypted services.

This proposal to bind TLS to a legal identity across all domains that qualify is not achievable or scalable. QWACs will not readily solve this issue on the modern web or with mobile applications either; even with their slight technical differences from EV. Mozilla and other vendors (Apple, Google, Microsoft, Opera, and Vivaldi) have made sufficient suggestions for eIDAS to validate identity without binding identity to the TLS deployment process itself or using TLS Certificates at all. The push to use QWACs to achieve this goal is a detrimental framework that would discourage affordable and more efficient TLS.

Interoperability across borders is a great ideal to have, but the mandate to emphasize QWACs in the browser ironically hinders interoperability. The eIDAS Article 45 proposal attempts to guarantee the legal and safe identity of the website ownerbut that is not the problem TLS was built to solve.

Standard Domain Validated certificates by CAs have achieved the level of security that website visitors need globally. Tools like Certbot and the free CA Lets Encrypt have contributed to making TLS deployment and automation more widespread and accessible. Today, domain owners can utilize automated hosting services for services between businesses and with their own customers that alleviate traffic-handling and optimizing costs. Mandating QWAC emphasis threatens to set us back. Domain owners will likely have to use self-managed certificate options to maintain their web security. That would increase inequality across the internet. A large company can acquire the infrastructure to do this; They may even achieve partial automation, as has happened with EV certificates. However, smaller companies and individuals may not be able to acquire these tools as easily. Requiring all domain owners to have the technical expertise and the monetary resources to self-manage their certificates sets TLS deployment back 6 years, by raising the difficulty and barriers to complying with the eIDAS regulation.

This is all very reminiscent of a time when TLS deployment was more difficult, costly, and time consuming. This amendment to emphasize QWACs in the browser frames free security as bad security. In this case, that is neither truthful nor useful to internet users everywhere.

This post was updated on 2/9/22 to correct the involvement of the joint position paper linked in this post: https://blog.mozilla.org/netpolicy/files/2020/10/2020-10-01-eIDAS-Open-Public-Consultation-EU-Commission-.pdf

See the rest here:
What the Duck? Why an EU Proposal to Require "QWACs" Will Hurt Internet Security - EFF

Read More..

Avast’s Online Protection and Secure Browser Products Win Latest Anti-Phishing Comparison Test – PRNewswire

AV-Comparatives' study, which ran from 13 January to 28 January 2022, tested all browser and antivirus products in parallel, exposing each to 250 valid and independently-selected phishing URLs, and 250 clean URLs for false alarm detection. The phishing protection provided by the AV products was tested on Windows 10 using Google Chrome 97.0 with Google Safebrowsing disabled. The browser extensions of the AVs were installed and enabled, and the competing browsers were tested without an antivirus program running. At the time of testing, all products were updated to their latest software versions.

"For many years, Avast's threat detection engine has been a standout performer achieving excellent results in the Malware Protection, Advanced Threat Protection and Real-World Protection Tests," said Andreas Clementi, Founder and CEO of AV-Comparatives. "Recently, Avast has excelled in the anti-phishing category, which is bad news for opportunistic cybercriminals who often depend on the high success rates of phishing attacks as a means of generating greater return on investment."

In 2021, our threat detection engine has identified and blocked nearly four million unique phishing URLs each month on average," said Siggi Stefnisson, Head of Threat Labs, at Avast. "Phishing is one of the most common threats for both businesses and consumers, often because it's easier to exploit the human condition through urgency, fear or pressure than it is to hack a system. Phishing attacks, particularly those which are targeted and personalized, and phishing URLs have become so widespread, hard to identify as malicious and successful in achieving their goals of theft, fraud and corporate espionage, that it's of paramount importance we maintain an industry-leading detection rate to apply to our products and services so our customers remain safe and secure online."

*This report was commissioned by Avast, however, AV-Comparatives' anti-phishing test of all products was carried out impartially and under identical conditions. The phishing sites were selected independently by AV-Comparatives without instruction, influence, dispute or review from Avast or any of the tested parties.

A complete breakdown of the antivirus and browsers products tested are listed below:

Antivirus Products:Avast Free Antivirus 21.11, Avast One Essential 21.11, Avira Free Antivirus 15.0, Bitdefender Internet Security 26.0, ESET Internet Security 21.3, Malwarebytes Premium 4.5, McAfee Total Protection 16.0, Microsoft Defender 4.18 (with Defender browser plugin for Chrome), NortonLifeLock Norton 360 22.21.

Browsers:Avast Secure Browser 97.0, Google Chrome 97.0 (with Safebrowsing), Microsoft Edge 97.0, Mozilla Firefox 96.0, Opera 82.0.

About Avast:Avast (LSE:AVST), a FTSE 100 company, is a global leader in digital security and privacy, headquartered in Prague, Czech Republic. With over 435 million users online, Avast offers products under the Avast and AVG brands that protect people from threats on the internet and the evolving IoT threat landscape. The company's threat detection network is among the most advanced in the world, using machine learning and artificial intelligence technologies to detect and stop threats in real time. Avast digital security products for Mobile, PC or Mac are top-ranked and certified by VB100, AV-Comparatives, AV-Test, SE Labs and others. Avast is a member of Coalition Against Stalkerware, No More Ransom, and the Internet Watch Foundation. Visit:www.avast.com.

Keep in touch with Avast:

Media Contact:[emailprotected]

SOURCE Avast Software, Inc.

See more here:
Avast's Online Protection and Secure Browser Products Win Latest Anti-Phishing Comparison Test - PRNewswire

Read More..

Pandemic helps heartless romance fraudsters infect the internet – The Guardian

Fraudsters who engage in romance scams are becoming increasingly brazen about how they operate and are willing to spend five months building up a relationship with their victims, according to a security expert.

In some cases, criminals will even have video calls with victims, luring them into a false sense of security that they are involved with someone who is genuinely interested in them.

The number of romance scams, where people hand over money to someone they believe they are in a relationship with, doubled during the pandemic with the average victim losing 6,100, according to figures from TSB. Women are twice as likely to be victims as men.

Jake Moore, a cyber-security adviser at internet security firm ESET, says fraudsters can spend four to five months in establishing a fake relationship before carrying out the crime. During this time, they will often be working on several victims.

Theyre very good at remembering all the stories that lead along that journey [ending in] an elaborate scam as to why they want the money, he says.

These scams can be as simple as a person claiming their car has broken down on the way to visit and that they need money to repair it, he explains. In another instance reported by TSB, a soldier claimed he needed funds to get home from a foreign posting.

Victims, who TSB says are an average age of 47, have been increasingly targeted through social media and dating apps.

There have been warnings to consumers to beware of scams before Valentines Day .

Many scammers used restrictions on movement during the pandemic as an excuse not to meet up with victims. Refusing to meet in real-life, or face to face for a video call, are both things that should ring alarm bells.

However, Moore says that criminals are now taking more risks and making face-to-face video calls where they are fully visible.

There are male and female fraudsters who put in video calls every night, really creating this perfect story as to how this relationship unfolds.

He advises daters to change the times of the calls and to be spontaneous about when they happen, as this could upset a fraudsters timetable.

If they are controlling and saying its got to be this time then that could be a red flag, he says.

Katherine Hart from the Chartered Trading Standards Institute, which represents trading standards officers, says the pandemic increased peoples reliance on indirect communications through phones.

Theres the thinking that theyre protected by a computer screen to a certain extent, and will easily, and quite readily, pass on a lot of personal information via text or emails, she says.

Unfortunately, quite often we only find out about these things when somebody has actually intervened, whether that be a bank or a family member, or the victim has caused themselves such mental anguish there is a referral from social services.

In some instances, criminals will scan the death announcements and target lonely widowers in the following months with the promise of companionship, she says.

Action Fraud reported instances of romance fraud were up 40% in the year to April last year with almost 74m being lost.

Read more:
Pandemic helps heartless romance fraudsters infect the internet - The Guardian

Read More..

Industrial Internet of Things Raises New Security Implications – Journal of Petroleum Technology

Industry implementation of the industrial Internet of Things (IIoT) for oil and gas operations will result in a significant alteration of the existing operations technology/information technology (OT/IT) digital architecture, causing a change in cyber-physical security because of new and additional cybersecurity vulnerabilities.

The conventional defense strategies for cybersecurity are based primarily on traditional IT network security designs and practices, such as assuring data integrity and protecting the confidentiality of data and intellectual property. The primary threat to oil and gas operations, however, comes from the growth in attacks designed and directed at OT systems, which can result in significant negative operational events. In recent years, this has spurred the development of expanded OT defense strategies and the technical hardening of industrial control systems.

The U.S. Department of Homeland Security has recorded the annual cyber incidents relating to different sectors (Fig. 1). The results indicate that the energy sector (including petroleum) is one of the primary potential attack targets.

Source: U.S. Department of Homeland Security

Changes in digital technologies and architectures arising from the implementation of the IIoT in oil and gas operations have brought intrinsic changes in the security landscape. The goal of this paper is to aid oilfield security planning and design processes through improved recognition of the cyber-physical security effects arising from the implementation of IIoT architectures and technologies into field OT domains.

The paper identifies and compares the current oilfield OT logical structures with the designs emerging through the IIoT implementations. The analysis includes extensive review of developing standards, such as those proposed by Industrial Internet Consortium, and ongoing published experiences to find the primary points of transition.

The security risks stemming from IIoT implementation appear to raise significant concerns with regard to potentially severe cybersecurity outcomes, which could materially affect the integrity and safety of oilfield operations. The study concentrated on the cybersecurity threats that could pose negative physical and operational conditions resulting from loss of visibility or loss of control of the operational processes in field facilities.

Extensive literature reviews were the basis for identifying the implications of cybersecurity risks in the ongoing stages of integrating the IIoT into the field. The reviews identified the modified strategies for cyber-physical systems, including potential threats and countermeasurements for the field IIoT model. These proposed strategies, however, still miss a fundamental denominator: The assessments generally ignore that it is the fundamental nature of IIoT structure itself that creates cyber-security vulnerabilities.

To investigate further, the authors performed a contrasting analysis based on specific case studies of field IIoT devices such as the pumpoff controller and OT architectures. The following three foundational threat implications emerged on the transformation of IIoT architecture into the oil field:

The cornerstone of the distinctive IIoT attributes illustrated in the paper contributes to the potential loss of control, leading to the potential for serious damages to operational outcomes in the field.

Download the complete paper from SPEs Health, Safety, Environment, and Sustainability Technical Discipline page for free until 23 February.

Find paper SPE 200858 on OnePetro here.

See the article here:
Industrial Internet of Things Raises New Security Implications - Journal of Petroleum Technology

Read More..

Internet security company issue warning over sextortion scam doing the rounds in Irish… – The Irish Sun

AN internet security company have issued a warning about a 'sextortion' scam doing the rounds in Irish.

ESET, an online security company that offers anti-virus and firewalls, is urging people not to interact with the bogus email.

2

2

The scam email, which is written to the sender in Irish, comes from a South Korean address.

The scammer claims that they have a video of the sender watching pornography and threatens to make the footage public.

They then asks for 1,200 in bitcoin to make the footage go away.

The terrifying letter warns: "Final warning! All your data was copied. The login was successful.

"Greetings. Your system is compromised by the Trojan virus. It entered your device through the adult portals you visit.

"Some racy videos have malicious code that acts after being posted. All data has already been copied to my servers.

Most read in The Irish Sun

"I have full control over the device you have access to on the Internet.

"I can see your screen, use your microphone and camera. You wont notice it accordingly. Ive already done a screen recording."

They then ask for 1,200 in bitcoin at which point they say they will remove the virus from the person's device.

ESET said it is important to note that most sextortion letters are bluffs and the sender does not have the footage they are claiming.

They said: "It is important to note that most of these sextortion letters are bluffs and the sender doesnt actually have anything.

"These mails are just spammed out to millions of email addresses in hope someone will bite."

They urged the public not to respond to such emails and instead flag them as spam and warn their friends not to fall for it.

They added: "However in some cases the extortionists do have something and offer proof, they should be reported toAnGardaSochnas Cyber Crime Bureau."

Link:
Internet security company issue warning over sextortion scam doing the rounds in Irish... - The Irish Sun

Read More..

Right of Boom Live Blog: MSP Security Conference Takeaways – MSSP Alert

by Joe Panettieri Feb 10, 2022

Andrew Morgan, founder, Cyber Nation & CyberCall

The Right of Boom security conference for MSPs is under way in Tampa, Florida. Both MSSP Alert and ChannelE2E are on-hand to cover the event. Keep checking this blog for ongoing updates from the event, which is hosted by Andrew Morgan founder of The Cyber Nation and host of The CyberCall.

Heres what weve heard from the event so far:

1. Can Your MSP Really Survive a Cyberattack? We raised and explored that topic ahead of the event. Among our areas of concern: What percentage of MSPs are really qualified to offer MDR (Managed Detection and Response), and how many of those MDR-focused service providers actually offer credible response capabilities? Well be seeking answers at the event.

Beau Bullock, Black Hills Information Security

2. Top 10 Cloud Security Risks MSPs and MSSPs Need to Mitigate: This topic surfaced during a pre-conference workshop led by Beau Bullock of Black Hills Information Security.

3. MSP Ecosystem Embraces Physical and Virtual CISOs: Full-time chief information security officers, virtual CISOs and associated technology startups are popping up across the MSP software industry leading a multi-year journey that is starting to deliver improved MSP industry security and enhanced risk mitigation. Its a safe bet the vCISO trend as well as actual CISOs including Dattos Ryan Weeks will be on hand at the conference.

Wes Spencer

4. Laggards In This Journey Get Left Behind: Thats the key takeaway from Wes Spencer, who called on the MSP sector to move together, continue to shift right and make sure no MSP gets left behind in the cyber journey especially as MSPs begin to master detection and extend their focus to effective right.

5. Wes Spencer Joins Rewst: Details about Spencer joining Rewst are here from ChannelE2E. Rewst is a Robotic Process Automation (RPA) software startup focused on MSPs.

Jon Murchison, CEO, Blackpoint Cyber

6. MSP Security Progress: In the past three years, the MSP industry has made 10 years of progress, Morgan asserted. I agree.

7. Blackpoint Cyber CEO Jon Murchison: Most of the initial targeting involves RDP being open to the Internet, an unpatched firewall or phishing. Youd be surprised how many Exchange Servers remain unpatched. Also, be careful of rogue RMM (remote monitoring and management) installs and related free trials that may not be secure, he noted.

Phyllis Lee, Center for Internet Security

8. DMZs Are Dead: Move to the Zero Trust Model for a proper path forward, Murchison said.

9. Get to Know the Center for Internet Security: A key name to know is Phyllis Lee, senior director for controls at the Center for Internet Security. Lee pointed out that MSPs need to really understand effective cyber hygiene to maintain a proper posture, and be aware of where you data is going, records you care about and the fact that your network ends at your employees and partners fingertips. Also, read up on the Microsoft 365 security guidance from CIS, Murchison said.

John Hammond, Huntress

Jennifer VanderWier, F1 Solutions

10. The Year of Supply Chain Vulnerabilities and Mass Exploitation: Here, guest speakers John Hammond of Huntress and Jennifer VanderWier of F1 Solutions emphasized that MSPs have to look beyond their RMM to really analyze the security of every toolset the test/adopt. In F1 Solutions case, the MSP created a standardized list of security questions that team members ask their tool vendors. And in many cases, F1 Solutions will ask multiple sources at a software company about their cyber posture to see if all the statements match.

11. Ten Security Vendors MSPs Should Ask Their Software Suppliers: Thank you to VanderWier and Hammond for the list.

Sounil Yu

12. The Irony of Automation: A great paper, recommended by keynote speaker Sounil Yu, CISO & head of research at JupiterOne.

13. Resources from Sounil Yu: Thank you to Kyle Jackson, senior program manager at ConnectWise, for that high-value link.

14. The Cyber Defense Matrix: The grid is below. For more info, check out Sounil Yus website. The site is required reading for MSPs and MSSPs. The grid is all about helping organizations to map and improve their security controls.

14. The Cyber Defense Matrix Where MSPs and MSSPs fit:Whats the difference between an MSP and an MSSP? Generally speaking, I often say that MSPs are in the shallow-end of the security pool and also offer general purpose IT support. MSSPs are in the deep-end of the security pool and focus purely on security. Thats my spin. But Yu gets even more granular by mapping out MSP and MSSP capabilities in the Cyber Defense Matrix. Note: Yus mapping is meant to be a general perspective rather than any type of official, firm guide for the services that MSPs and MSSPs generally offer. Heres the mapping:

15. Additional News Updates: Keep checking this blog for more updates. And if youd like to meet or say hi at the conference, then send me an email ([emailprotected]).

Read more:
Right of Boom Live Blog: MSP Security Conference Takeaways - MSSP Alert

Read More..

Donald Trump Would Have Been Executed Over Server Access Claims, Son Says – Newsweek

Eric Trump has suggested that his father would have been subjected to "capital punishment" if he was found to have gained access to the servers of the Barack Obama administration, while discussing the recent allegations highlighted by John Durham.

Speaking to Fox News' Sean Hannity, the son of the former president questioned why the media was not making a bigger deal of the claims made by Durham, the special counsel appointed to investigate the FBI's investigation into Russian interference in the 2016 election, in court filings submitted on Friday.

Durham alleged that a tech executive for company Neustar had accessed White House servers in order to look at internet traffic from Trump Tower and the White House to uncover "derogatory" information about the former president.

"At what point is it acceptable to break into the servers at the White House? That's the most cherished building in this country that has the most top secrets, everything in this country that runs our government," Eric Trump told Hannity.

"And it's okay just to break into servers? Why, Because you're a Democrat? Can you imagine if my father broke into servers in the Obama administration? It would be capital punishment, Sean."

Eric Trump was referencing the documents filed by Durham that allege that the person named in the legal filings as "Tech Executive-1"believed to be Rodney Joffeused his domain name system (DNS) to find out which computers and servers the White House servers were accessing while looking into supposed links between the Trump Organization and Alfa Bank of Russia.

The details were listed by Durham as part of a case brought against Michael Sussmann, a cybersecurity lawyer with links to the Clinton campaign who has been charged with making a false statement to the FBI during a 2016 meeting where he shared information about the Trump Organization and the Russian bank. Sussmann has pleaded not guilty to the allegations.

The filings suggest that Sussmann had obtained that information that a Russian-made smartphone, YotaPhone, had been used from networks serving the White House and Trump Tower from Joffe, a client of his.

"Tech Executive-1's employer, Internet Company-1, had come to access and maintain dedicated servers for the EOP [Executive Office of the President] as part of a sensitive arrangement whereby it provided DNS resolution services to the EOP. Tech Executive-1 and his associates exploited this arrangement by mining the EOP's DNS traffic and other data for the purpose of gathering derogatory information about Donald Trump," the filing stated.

Fox News had reported the claims as Clinton's presidential campaign paying a technology company to "infiltrate" servers tied to Trump, despite the word "infiltrate" not appearing in the motion.

Trump took the allegations as validation for his cries that the Obama administration had been spying on him during his time in office, even though the claim is now against the Clinton campaign, and that the Russian interference probe was nothing more than a "hoax."

Trump also appeared to suggest that members of Clinton's campaign staff should have been executed over the allegations.

"The latest pleading from Special Counsel Robert [sic] Durham provides indisputable evidence that my campaign and presidency were spied on by operatives paid by the Hillary Clinton Campaign in an effort to develop a completely fabricated connection to Russia," Trump said in a February 12 statement.

"In a stronger period of time in our country, this crime would have been punishable by death."

In a Monday statement, Trump speculated that "all hell would break loose and the electric chair would immediately come out of retirement" if the roles were reversed and he got "caught illegally spying"a claim that was echoed by his son Eric on Fox News.

Ohio congressman Jim Jordan also appeared to back Trump's calls for Clinton's aides to face the death sentence over the allegations, telling Fox and Friends that the former president was "right on target" with his remark.

In a statement to The Washington Post, a spokesman for Joffe said: "Contrary to the allegations in this recent filing, Mr. Joffe is an apolitical Internet security expert with decades of service to the U.S. Government who has never worked for a political party, and who legally provided access to DNS data obtained from a private client that separately was providing DNS services to the Executive Office of the President (EOP)."

The statement added that Joffe's contract meant he had lawful access to analyze DNS data in order to identify and analyze security breaches or threats.

Read more:
Donald Trump Would Have Been Executed Over Server Access Claims, Son Says - Newsweek

Read More..

What Is Zero Trust? A Guide to the Cybersecurity Approach – Government Technology

The term zero trust is rapidly gaining attention as agencies move away from the more traditional castle and moat models of cybersecurity.

Zero trust refers to a cybersecurity strategy or set of principles based in the understanding that just because an account or device is associated with the organization or has seemed trustworthy in the past doesnt mean they should be assumed to be trustworthy in the future. The mindset assumes an attacker could be in the network already and emphasizes limiting a bad actors ability to access data and other resources.

Organizations adopting zero-trust principles require users and devices to continually prove they are who they claim to be, whenever they want to access data or services. This stands in contrast to older thinking in which users may have only had to authenticate themselves once to enter the organizations network, such as by logging in, and then were granted access to a wide swathe of internal resources.

Core zero-trust principles also involve restricting users access privileges to the minimum amount they need to do their jobs, something known as the principle of least privilege (POLP).

But many of todays organizations rely on workforces that are no longer on premise and on assets stored in the cloud meaning theres no longer a castle to wrap the moat around. Remote employees connect to the network from a variety of locations, through personal Internet networks and, sometimes, on personal devices outside of an organizations control. Cloud-based data also remains outside of the defense of the organizations perimeter firewalls.

Malicious actors can attempt to pass themselves off as employees using new devices or may seize control of employees accounts or devices that are already familiar to the organization, then move within the network.

Organizations need to avoid locking out legitimate employees, but enabling the wrong device or allowing the wrong level of access privileges creates significant cyber risks.

To thread the needle, organizations that adopt the zero-trust approach require devices and users to verify themselves repeatedly and monitor continually. Reducing each accounts privileges to only what is essential also minimizes the damage that a bad actor or malicious insider would be able to achieve.

The federal government has thrown its support behind the idea, with Bidens executive order asking federal agencies to transition to zero trust.

The National Institute of Standards and Technology (NIST) outlines seven tenets in a 2021 draft white paper and 2020 publication:

1. Network identity governance: Organizations need policies and tools to ensure that only authorized users who have gone through a sufficient level of authentication are granted access to enterprise data and services, and that they are only able to perform authorized actions.

2. Secure end devices: Zero-trust plans need to address end devices such as mobile devices, remote sensors and compute resources.

3. Monitor, defend and defend against owned and associated assets: Organizations should attend closely to their data and services defenses including understanding how they are configured and maintained as well as continually monitor for signs of compromise and respond quickly to events like new patches or indicators of vulnerabilities. They may also need to block connections or restrict access to those devices over which they have less control.

4. Secure all communication: Organizations must safeguard the integrity and privacy of all data in transit even for communications within the network. Otherwise, an attacker hiding on the network could view or tamper with the communications.

5. Users should only be given access to individual enterprise resources on a per-session basis: Organizations should try to tightly control access to data, services and devices. To the extent possible, organizations should require users to clear authentication and authorization checks each time they seek to perform unique operation[s]. Users also should only be given the minimum access privileges required to complete their objectives. Adopting logging, backups and versioning tools can also help recovery if unauthorized activity does occur.

6. Thoroughly and dynamically vet access requests: Limit access to enterprise resources only to members of an allow-list who also both prove their identities and their genuine need to access the particular asset in question. Identities should be verified in robust ways. Organizations may continually monitor accounts and devices for suspicious behaviors and characteristics as well as require MFA to access some systems or data and require reauthentication at various points.

7. Gather information to understand and improve security posture: Organizations should collect and analyze as much data as they can about the status of their assets, network infrastructure and communications to help them identify ways to improve policies.

More here:
What Is Zero Trust? A Guide to the Cybersecurity Approach - Government Technology

Read More..