Page 2,702«..1020..2,7012,7022,7032,704..2,7102,720..»

Securing Industrial Automation and Control Systems Starts in Software Development – Security Boulevard

Following the IEC 62443 standard for security software development ensures quality, safety and security

The importance of industrial automation and control systems (IACS) to the critical operations we rely on cannot be overstated. From manufacturing of consumer and commercial products to power generation and water supply to HVAC for the offices where we once worked in before COVID-19 (well be back) to smart utility metering for our homes and so much more, these systems are essential to our lives and our economy. It goes without question that keeping these systems secure is a must.

A cybersecurity event targeting ICAS has the potential to have a devastating impact. And, as these devices and systems become smarter, more interconnected and exposed to the Internet, security challenges continue to rise and risk becomes exponentially greater. In fact as highlighted by its Year in Review 2020 report, industrial cybersecurity company, Dragos, saw a threefold increase of cyber threats to ICAS last year.

As stated earlier, these ICAS devices are becoming smarter. This is a result of more complex embedded software enabling remote functionality, automation and analytics. With more complex software, there are now more lines of code which can introduce N-day and 0-day vulnerabilities if not diligently tested throughout the software development life cycle (SDLC).

Thankfully, there are standards for developing secure software, such as IEC 62443, designed to help ensure software code embedded in ICAS devices is free of vulnerabilities. The IEC 62443-4-1 standard (Security for industrial automation and control systemsPart 4-1: Secure product development lifecycle requirements) defines specific requirements for using a secure development lifecycle in the design, implementation, maintenance and testing of products used in industrial automation and control systems.

GrammaTech together with Exida, a leading certification company specializing in ICAS functional safety and cybersecurity, recently issued a joint whitepaper, Using GrammaTech CodeSentry and CodeSonar to Improve Software Security and Comply with IEC 62443.

In this whitepaper, Exida details how GrammaTechs CodeSentry (Binary Software Composition Analysis SCA) and CodeSonar (Static Application Security Testing SAST) tools can be integrated into an ICAS suppliers SDLC and DevSecOps processes to help comply with the IEC 62443 standard.

Exida describes two major contributors to security vulnerabilities found in products today, which are implementation weaknesses in programs created in languages such as C and C++ and the use of Third-Party Software (TPS). The CodeSentry and CodeSonar tools can address both of these issues.

CodeSonar can be seamlessly integrated into the SDLC to continually find and remediate errors and vulnerabilities in code. With CodeSentry, you can perform a binary analysis to identify the open-source and third-party software components of the software to generate a software bill of materials (SBOM) and vulnerability report.

This whitepaper introduces common causes of security vulnerabilities including implementation programming weaknesses in programing languages and TPS. In addition, it describes TPS types, specific TPS security challenges and provides guidance on how to use the GrammaTech CodeSentry and CodeSonar tools in a workflow to select and manage TPS and overall product security.

If developing secure and vulnerability free code is your priority, we encourage you to the download and read our whitepaper.

To see CodeSentry and CodeSonar in action and how our solutions can solve your specific requirements, book an evaluation today.

*** This is a Security Bloggers Network syndicated blog from Blog authored by Christian Simko. Read the original post at: https://blogs.grammatech.com/iec-62443-securing-industrial-automation-and-control-systems-starts-in-software-development

Link:
Securing Industrial Automation and Control Systems Starts in Software Development - Security Boulevard

Read More..

Working from home blamed for rise in cyber hits on organisations – The Straits Times

While working from home has become the norm for many people amid the Covid-19 pandemic, it might have also caused many organisations in Singapore to fall victim to cyber attacks.

About eight in 10 public-and private-sector organisations here attributed such a working arrangement to a rise in cyber attacks across the board, said a report by software company VMware last week.

This is comparable to the global figure across 14 markets.

Nearly seven in 10 here said the attacks were serious enough to report to regulators or to call in an incident response team. Globally, this is higher - at eight in 10.

"Digital transformation programmes advanced rapidly as the cyber-attack surface expanded to include living rooms, kitchens, home networks and personal devices," explained principal cyber-security strategist Rick McElroy of VMware's security business unit.

Mr McElroy added that while remote employees' work laptops are usually well secured, home Wi-Fi networks used to go online can pose serious security risks.

"Updates to home router software are often overlooked, and many home networks do not have a firewall installed. These unsecured and unpatched networks can result in network security gaps," he said, pointing also to issues with the use of other Internet-connected devices on home networks for work.

The remote workforce behaves very differently from the office workforce - its members access the organisation's network at unpredictable hours as they strive to stay productive while caring for their families and following government restrictions.

This means network traffic has "changed beyond recognition", and organisations must adapt monitoring systems or risk leaving an opportunity for hackers to use atypical patterns to mask their infiltration attempts, Mr McElroy said.

What is key is that companies need to understand how people interact with technology, he said. This can include when an employee usually works, the applications he normally uses and the websites he commonly visits.

So for example, when an employee who usually works in California logs in 10 minutes later from Singapore, which is humanly impossible, the company knows something is amiss.

"Knowing this baseline helps better detect a malicious login," said Mr McElroy.

The VMware-commissioned study polled about 250 chief information officers, chief technology officers and chief information security officers here last December.

They came from the financial, healthcare, government, retail, manufacturing and engineering, food and beverage, utilities, professional services, and media and entertainment sectors.

The study found that organisations here reported more cyber attacks in the previous 12 months, with 64 per cent saying so.

About a year ago, the figure was 43 per cent.

More organisations globally saw more cyber attacks than those in Singapore in this year's report, with 76 per cent reporting this.

However, the Republic had more breaches on average per organisation - 3.3 versus 2.35 globally.

The leading cause of breaches reported here was a weakness in processes, with 22 per cent of respondents citing this. One example is companies not deploying patches on a regular basis.

The next top causes of breaches were using out-of-date security (20 per cent) and third-party apps (13 per cent).

Outdated security includes operating systems that are no longer supported by their developers, such as those found in manufacturing systems.

Some cases involved an old critical application that is not updated because doing so might mean taking vital systems offline.

These legacy systems and old apps could remain unpatched for vulnerabilities, and using modern security solutions to protect them is difficult at times.

Third-party apps that can lead to breaches include externally developed ones used for sharing files, which can allow crooks to access sensitive data if hacked.

These top causes of attacks generally boil down to how organisations' information technology and security operations teams interact and work in silos when solving issues, said Mr McElroy.

To address some of these issues, he advised organisations to have security in place "wherever and whenever humans interact with systems", including online programs and applications.

Kenny Chee

Follow this link:
Working from home blamed for rise in cyber hits on organisations - The Straits Times

Read More..

Takeaways from the Senate report on January 6 security failures – WTOP

This 95-page report is the first comprehensive offering from the long list of Senate and House committees that are investigating various matters related to the Capitol insurrection. It's by far one of the most thorough fact-finding efforts and was released Tuesday in a bipartisan fashion.

Two Senate committees on Tuesday released the most comprehensive government report on the security failures leading up to the US Capitol insurrection on January 6, revealing new details about unheeded warnings, critical miscommunications and intelligence shortcomings.

Congressional investigators pored through thousands of documents, received written statements from 50 police officers who defended the Capitol and received testimony from a wide array of current and former officials who played a role in the security preparations and response.

READ: Bipartisan Senate report investigating January 6 Capitol attack

Here are six takeaways from the report and its recommendations, which were released on a bipartisan basis by the Senate Rules Committee and the Senate Homeland Security Committee.

The report concluded that the US Capitol Polices main intelligence unit was aware of the potential for violence in the days and weeks ahead of January 6. Period. Full stop. They were warned.

But not everyone was aware. The inquiry determined that USCPs decentralized intelligence operation meant some people saw these warnings while other officials were left in the dark.

RELATED: Injured Capitol Police officer in emotional statement to court: You have stolen moments away from me that I cant get back

The Metropolitan Police Department in Washington, DC, told Capitol Police that hotel bookings roughly doubled in comparison to pro-Trump rallies in November and December, the Senate report said.

It was becoming clear to security officials and ordinary citizens alike that January 6 would be different. A private citizen emailed USCPs general mailbox on December 28 saying there were tweets from people organizing to storm the Capitol on January 6th, according to the report.

Still, USCP maintained its assessment that January 6 would likely resemble the minor pro-Trump rallies in November and December.

The report said, The USCP Chief has no unilateral authority to request assistance from the National Guard. This is a simple statement, but it explains a lot about the failures that day.

Then-Capitol Police Chief Steven Sund wanted to call in the troops for backup but needed to coordinate with other Hill security officials. When the officials tried to deal with the request, they were unfamiliar with the laws and regulations that needed to be followed, the inquiry found.

The red tape hindered the much-needed National Guard response, according to the report. And thats why one of the first recommendations from the Senate report is to empower the Capitol Police chief to have unilateral authority to request military support in emergency situations.

It seems like a no-brainer, but for this to happen, Congress will need to pass a new law.

The Senate inquiry uncovered some embarrassing failures within the civil disturbance unit of the Capitol Police, which is essentially the forces riot police or emergency response squad.

The Capitol Police activated seven of these special units in advance of January 6, but only four of those platoons were outfitted special protective equipment like helmets and shields, the report said. And when one of the platoons tried to get its equipment, it was on a locked bus.

The senators recommended that the special unit receive better training and more funding.

Plenty of Trump supporters posted plenty of violent threats and dangerous assertions on the internet in the run-up to January 6. The report said these were found on message boards, social media, memes, or hashtags. But intelligence officials struggled with how aggressively to police political speech, and how to differentiate the real threats from typical internet nonsense.

FBI and (Department of Homeland Security) officials stressed the difficulty in discerning constitutionally protected free speech versus actionable, credible threats of violence, the report said, noting that officials have said they need to make improvements and do better in the future.

Weve already heard from many of the brave police officers who risked their lives defending the Capitol, including some who were injured and others who engaged in hand-to-hand combat.

But the report fleshed this out, providing new accounts from the frontlines of the battle.

We did what we could against impossible odds and a volatile crowd which many times threatened us with phrases like Were gonna kill you!' one officer told the committees. I felt at this time a tangible fear that maybe I or some of my colleagues might not make it home alive.

Another officer described how they were called a Nazi. Black officers have spoken out about the racial abuse at the hands of the mob, including being called the N-word. In a previously unreported incident, one officer said they saw someone give a Nazi salute to the Capitol.

This 95-page report is the first comprehensive offering from the long list of Senate and House committees that are investigating various matters related to the Capitol insurrection. Its by far one of the most thorough fact-finding efforts and was released Tuesday in a bipartisan fashion.

But as comprehensive as it is, it only examined one piece of the bigger puzzle. It looked at the security, planning and response failures by law enforcement. But what about efforts by extremist groups to plan for violence in DC? What about former President Donald Trump and the Republican officials who fanned the flames? Congress isnt equipped to probe these issues.

Senate aides said investigators intentionally avoided the most politicized topics like Trumps culpability because they wanted to keep the probe bipartisan. Sources told CNN that to keep Republicans in the fold, the report avoided using the word insurrection to describe the attack.

Apparently, the Senate investigation was significantly watered down before it even started.

This is one the many reasons why so many Democrats, Republicans, former US officials, national security experts, and US Capitol Police officers agree that there should be an independent commission to investigate January 6. Not just to look at narrow questions but to examine the big picture extremism, disinformation, radicalization, incitement, and much more.

Senate Republicans blocked a bill to establish a commission, which now appears to be dead.

Read the original here:
Takeaways from the Senate report on January 6 security failures - WTOP

Read More..

[PDF] Internet Security Industry Growth Analysis, Segmentation, Share, Trend, Future Demand and Leading Players Updates The Courier – The Courier

Recent Updates of Internet Security Market 2021

The Internet Security Market throws light on business drivers, restraints, opportunities, challenges, and key statistics factors. The report has been designed and presented in the form of tables and figures and other statistical to generate higher reader perception. The research report study on important details about key players, current trends, future scope, development expansion strategies. The report also covers the future timelines, accurate growth predictions, and forecast estimations, and fast-changing market forces.

Increasing usage of Internet globally is a major factor driving growth of the internet security market. This is due to rapid expansion in wireless communication technology across numerous verticals. For instance, according to report by Coherent Market Insights, the number of internet users across the world were around 3.38 billion and 3.25 billion in 2016 and 2015, respectively. Internet security solutions are widely used in industries such as BFSI (Banking, Financial Services and Insurance), telecommunication, and healthcare to protect large volume of data from increasing cyber-attacks, which fuels growth of the market of internet security. Growing cyber-attacks that causes damage to organizations data and can result in loss of revenue is a primary driver boosting adoption of internet security solutions across aforementioned verticals.

Major Key players In this Industry: IBM Corporation, Hewlett Packard Enterprise, McAfee LLC, Trend Micro, Inc., Symantec Corporation, Cisco Systems, Inc., Palo Alto Networks, Inc., Dell EMC, Fortinet, Inc., Sophos Ltd., Rapid7, Inc., CyberArk Software Ltd., Splunk, Inc., and Imperva, Inc.

The report offers a detailed assessment of Internet Security industry research profiles that understand trending data and covers production, consumption, status & forecast, and market growth. The study analyzes the leading companies and several other prominent companies operating in the market. The report features detailed information including market size, growth rate, market value, price, share by (regions, type, application), production and market share by major countries, market consumption, and market share by (regions, type, application), export and import data.

Get the Sample Report PDF with Detail TOC & List of Figures @

https://www.coherentmarketinsights.com/insight/request-pdf/1930

Key Features of Internet Security Report Are:-

Get Discount Before Buying

https://www.coherentmarketinsights.com/insight/buy-now/1930

Market Scenario:-

The report covers historical and forecasts market data, demand, application details, price trends, and company shares of the leading by geography. It supplies detailed information on the established market with a clear perceptive of global Internet Security market players and emerging market associations. The report content includes technology, industry drivers, geographic trends, market statistics, market forecasts, producers, and equipment suppliers.

Go Through Our Trusted Clients List:-

https://www.coherentmarketinsights.com/trusted-by

About Coherent Market Insights:-

Coherent Market Insights is a prominent market research and consulting firm offering action-ready syndicated research reports, custom market analysis, consulting services, and competitive analysis through various recommendations related to emerging market trends, technologies, and potential absolute dollar opportunities.

Contact Us:-

If you need more customization, reach us. You can get a point by point of the whole research here. If you have any special requirements, dont mind, let us know and we will offer you the report as you need.

Contact Here: sales@coherentmarketinsights.com || +1-206-701-6702 (US-UK Toll Free).

Excerpt from:
[PDF] Internet Security Industry Growth Analysis, Segmentation, Share, Trend, Future Demand and Leading Players Updates The Courier - The Courier

Read More..

Oakland University ‘s IGVC fuels the inspiration behind autonomous robotics teams – The Oakland Press

Its competitions like the Intelligent Ground Vehicle Competitionat Oakland University that drive college and university autonomous robotics teams to excel.

We have seven different competitions, said Andrew Strazdsa, a senior from Embry-Riddle Aeronautical University in Daytona, Florida, during Mondays finals taking place in a parking lot at the south end of the campus.

This is the only one that wasnt cancelled because of COVID-19. he added, after doing a demonstration with the robot he and his team had built.

Dark clouds had moved in and the rain sent most of the other teams scrambling for cover. Being from Florida, where rain is common Strazdsas team went the extra mile to ensure that their robot could withstand the wind and rain.

In fact, they named their robot, Rain for that reason.

This addition alone earned them points in the competition.They are one of the few schools that did a good job of weatherproofing, said Bernie Theisen, who was among the judges at the annual event that challenges engineering students to design autonomous vehicles and compete in a variety of unmanned mobility competitions including Auto-Nav, in which vehicles complete an outdoor course in full autonomous mode while negotiating obstacles.

It demonstrates what weve learned, said Strazdsa said. Its really nice to see everything working, or not.

Im tweaking ours for a better performance, said Lloyd Brombach, a computer science student at Wayne State University who was joined by his teams mentor, Abhilash Pandya. Vernoica, as the robot was named needed to go faster, so Brombach had to make adjustments to the computer program.

Jerry Lane who was instrumental in creating the event for students said the teams work all year on the vehicles before attending the competitions.

They design it. They develop it, build it, test it, fix it, and then compete, he said.

Since its start more than 15-years-ago, IGVC has been highly praised by participating faculty advisors as an excellent multidisciplinary design experience for student teams. Not only do they get to see their vehicles in action, but also get the opportunity to meet other students with similar interests. Some schools also extend senior design course credits for student participation.

Among the guests in attendance for the competition was Michael Cadieux, director of the U.S. Army Combat Capabilities Development Command (DEVCOM) Ground Vehicle Systems Center (formerly U.S. Army TARDEC) at the Detroit Arsenal in Warren. Cadieux brought his children out to see robotics in action. Robotics is a lot cooler when you see it in person, said Cadieuxs 12-year-old son.

To view the list of winners or find out more about the competition visit igvc.org/teams.htm

View original post here:

Oakland University 's IGVC fuels the inspiration behind autonomous robotics teams - The Oakland Press

Read More..

Microsoft buys ReFirm Labs to boost IoT security with firmware analysis – VentureBeat

Elevate your enterprise data technology and strategy at Transform 2021.

Microsoft has acquired firmware security startup ReFirm Labs to boost its security capabilities for protecting internet of things and intelligent edge devices.

The intelligent edge made up of cloud-connected devices capable of specialized tasks have opened up a new attack surface, David Weston, Microsofts director of enterprise and operating system security, told VentureBeat. Attacks targeting sensitive information such as credentials and encryption keys stored in memory are on the rise, and Microsoft has spent the past few years securing the operating system below the operating system, he said.

Microsoft believes that firmware is not a future threat, but an imperative to secure now as more devices flood the market and expand the available attack surface. We are committed to helping customers protect from these sophisticated threats now and in the future, which is why were announcing that we have acquired ReFirm Labs, Weston wrote in a blog post on Tuesday. Microsoft declined to disclose the terms of the acquisition.

Microsoft has been focused on IoT security on multiple fronts, including Azure Defender for IoT, Azure Sentinel, and devices such as Edge Secured-core and Azure Sphere. The company has pledged to invest $5 billion in IoT by 2022. The acquisition of ReFirm Labs, with its expertise in firmware security and the Centrifuge firmware platform to analyze and detect security issues, is a culmination of that [IoT] strategy, Weston said, and will enhance the companys chip-to-cloud protection capabilities.

ReFirm allows us to assess all the code running on the device and provide a security rating before you connect the device, Weston said. The tool is a a key piece of the missing puzzle to make it easier for organizations to feel comfortable about deploying IoT. Today, you plug [the device] into the Internet and you say YOLO, I hope everythings cool.'

ReFirm Labs develops the open source Binwalk firmware security analysis tool, which has been used by more than 50,000 organizations around the world to analyze thousands of IoT and embedded devices to identify firmware security issues. System builders and device owners use the tool to assess device risk by looking for known vulnerabilities that have not yet been patched, uncovering exposed secrets (security keys, tokens, and passwords), flagging default passwords, and detecting other security problems.

ReFirms tool gives the end users an easy way to determine the basic security posture of the device. The analyzer Weston called it essentially a drag and drop tool unpacks the device firmware and performs nested scans looking for security issues. The tool is capable of scanning all kinds of IoT and edge devices, regardless of who built it, such as smart light bulbs, cars, printers, smart refrigerators, or servers running edge applications. The tool returns an assessment report as well as a software bill of materials explaining what components were used.

Enterprises can use the assessment to understand whether the devices meet security and compliance requirements before deploying them in the environment. Once the devices are connected, IT teams can monitor them with Azure Defender for IoT. And Azure Device Update, IoTs version of Windows Update introduced six months ago, lets users apply patches.

Now the customers have pretty much everything they need: They can assess the device, they can monitor it, and they can update it on Patch Tuesday, just as if it was a Windows device, Weston said.

In the Windows world, IT teams rely on Qualys Cloud Platform or Tenables Nessus vulnerability scanner to assess the security of the network before applying all the Patch Tuesday updates. Now you can do the same thing with IoT devices, Weston said.

System builders people building devices to sell will be able to use the analyzer to show their devices are secure, which would boost buyer confidence in these devices.

Microsoft has a vision of getting 50 billion intelligent edge devices connected to Azure, empowering digital transformation and running AI applications on the edge. The security issues are just getting worse. A recent Microsoft survey of 1,000 security decision makers found that 83% had experienced some level of firmware security incident. The Department of Homeland Securitys Cybersecurity and Infrastructure Agency (CISA) called out an increase in the number of attacks against difficult-to-patch firmware at the RSA Conference just last month.

Integrating ReFirms technology into Azure Defender for IoT is just the first step, Weston said. It was important to give customers all the various capabilities but to keep complexity low. He envisioned a future where firmware scanning was available across the Microsoft portfolio. Were going to stitch it through everywhere it makes sense. Were going to integrate it into all the products that we can where we think we can help the user, Weston said.

Originally posted here:
Microsoft buys ReFirm Labs to boost IoT security with firmware analysis - VentureBeat

Read More..

Adventures in Contacting the Russian FSB Krebs on Security – Krebs on Security

KrebsOnSecurity recently had occasion to contact the Russian Federal Security Service (FSB), the Russian equivalent of the U.S. Federal Bureau of Investigation (FBI). In the process of doing so, I encountered a small snag: The FSBs website said in order to communicate with them securely, I needed to download and install an encryption and virtual private networking (VPN) appliance that is flagged by at least 20 antivirus products as malware.

The FSB headquarters at Lubyanka Square, Moscow. Image: Wikipedia.

The reason I contacted the FSB one of the successor agencies to the Russian KGB ironically enough had to do with security concerns raised by an infamous Russian hacker about the FSBs own preferred method of being contacted.

KrebsOnSecurity was seeking comment from the FSB about a blog post published by Vladislav BadB Horohorin, a former international stolen credit card trafficker who served seven years in U.S. federal prison for his role in the theft of $9 million from RBS WorldPay in 2009. Horohorin, a citizen of Russia, Israel and Ukraine, is now back where he grew up in Ukraine, running a cybersecurity consulting business.

Horohorins BadB carding store, badb[.]biz, circa 2007. Image: Archive.org.

Visit the FSBs website and you might notice its web address starts with http:// instead of https://, meaning the site is not using an encryption certificate. In practical terms, any information shared between the visitor and the website is sent in plain text and will be visible to anyone who has access to that traffic.

This appears to be the case regardless of which Russian government site you visit. According to Russian search giant Yandex, the laws of the Russian Federation demand that encrypted connections be installed according to the Russian GOST cryptographic algorithm.

That means those who have a reason to send encrypted communications to a Russian government organization including ordinary things like making a payment for a government license or fine, or filing legal documents need to first install CryptoPro, a Windows-only application that loads the GOST encryption libraries on a users computer.

But if you want to talk directly to the FSB over an encrypted connection, you can just install their own client, which bundles the CryptoPro code. Visit the FSBs site and select the option to transfer meaningful information to operational units, and youll see a prompt to install a random number generation application that is needed before a specific contact form on the FSBs website will load properly.

Mind you, Im not suggesting anyone go do that: Horohorin pointed out that this random number generator was flagged by 20 different antivirus and security products as malicious.

Think well before contacting the FSB for any questions or dealing with them, and if you nevertheless decide to do this, it is better to use a virtual machine, Horohorin wrote. And a spacesuit. And, preferably, while in another country.

Antivirus product detections on the FSBs VPN software. Image: VirusTotal.

Its probably worth mentioning that the FSB is the same agency thats been sanctioned for malicious cyber activity by the U.S. government on multiple occasions over the past five years. According to the most recent sanctions by the U.S. Treasury Department, the FSB is known for recruiting criminal hackers from underground forums and offering them legal cover for their actions.

To bolster its malicious cyber operations, the FSB cultivates and co-opts criminal hackers, including the previously designated Evil Corp., enabling them to engage in disruptive ransomware attacks and phishing campaigns, reads a Treasury assessment from April 2021.

While Horohorin seems convinced the FSB is disseminating malware, it is not unusual for a large number of security tools used by VirusTotal or other similar malware sandbox services to incorrectly flag safe files as bad or suspicious an all-too-common condition known as a false positive.

Late last year I warned my followers on Twitter to put off installing updates for their Dell products until the company could explain why a bunch of its software drivers were being detected as malware by two dozen antivirus tools. Those all turned out to be false positives.

To really figure out what this FSB software was doing, I turned to Lance James, the founder of Unit221B, a New York City based cybersecurity firm. James said each download request generates a new executable program. That is because the uniqueness of the file itself is part of what makes the one-to-one encrypted connection possible.

Essentially it is like a temporary, one-time-use VPN, using a separate key for each download James said. The executable is the handshake with you to exchange keys, as it stores the key for that session in the exe. Its a terrible approach. But its what it is.

James said the FSBs program does not appear to be malware, at least in terms of the actions it takes on a users computer.

Theres no sign of actual trojan activity here except the fact it self deletes, James said. It uses GOST encryption, and [the antivirus products] may be thinking that those properties look like ransomware.

James says he suspects the antivirus false-positives were triggered by certain behaviors which could be construed as malware-like. The screenshot below from VirusTotal says some of the files contents align with detection rules made to find instances of ransomware.

Some of the malware detection rules triggered by the FSBs software. Source: VirusTotal.

Other detection rules tripped by this file include program routines that erase event logs from the users system a behavior often seen in malware that is trying to hide its tracks.

On a hunch that just including the GOST encryption routine in a test program might be enough to trigger false positives in VirusTotal, James wrote and compiled a short program in C++ that invoked the GOST cipher but otherwise had no networking components. He then uploaded the file for scanning at VirusTotal.

Even though James test program did nothing untoward or malicious, it was flagged by six antivirus engines as potentially hostile. Symantecs machine learning engine seemed particularly certain that James file might be bad, awarding it the threat name ML.Attribute.HighConfidence the same designation it assigned to the FSBs program.

KrebsOnSecurity installed the FSBs software on a test computer using a separate VPN, and straight away it connected to an Internet address currently assigned to the FSB (213.24.76.xxx).

The program prompted me to click on various parts of the screen to generate randomness for an encryption key, and when that was done it left a small window which explained in Russian that the connection was established and that I should visit a specific link on the FSBs site.

The FSBs random number generator in action.

Doing so opened up a page where I could leave a message for the FSB. I asked them if they had any response to their program being broadly flagged as malware.

The contact form that ultimately appeared after installing the FSBs software and clicking a specific link at fsb[.]ru.

After all the effort, Im disappointed to report that I have not yet received a reply. Nor did I hear back from S-Terra CSP, the company that makes the VPN software offered by the FSB.

James said that given their position, he could see why many antivirus products might think its malware.

Since they wont use our crypto and we wont use theirs, James said. Its a great explanation on political weirdness with crypto.

Still, James said, a number of things just dont make sense about the way the FSB has chosen to deploy its one-time VPN software.

The way they have set this up to suddenly trust a dynamically changing exe is still very concerning. Also, why would you send me a 256 random number generator seed in an exe when the computer has a perfectly valid and tested random number generator built in? Youre sending an exe to me with a key you decide over a non-secure environment. Why the fuck if youre a top intelligence agency would you do that?

Why indeed. I wonder how many people would share information about federal crimes with the FBI if the agency required everyone to install an executable file first to say nothing of one that looks a lot like ransomware to antivirus firms?

After doing this research, I learned the FSB recently launched a website that is only reachable via Tor, software that protects users anonymity by bouncing their traffic between different servers and encrypting the traffic at every step of the way. Unlike the FSBs clear web site, the agencys Tor site does not ask visitors to download some dodgy software before contacting them.

The application is running for a limited time to ensure your safety, the instructions for the FSBs random number generator assure, with just a gentle nudge of urgency. Do not forget to close the application when finished.

Yes, dont forget that. Also, do not forget to incinerate your computer when finished.

Excerpt from:
Adventures in Contacting the Russian FSB Krebs on Security - Krebs on Security

Read More..

Saluting the 2021 Vals & Sals – River Journal Staff

[Ed. Note:We invited Valedictorians and Salutatorians at theeightpublichigh schools inthecommunities we coverto tell us a little about themselvesona questionnaire we provided.These are edited excerpts from the information provided by each student.]

Aman Choudhri Valedictorian

EXTRACURRICULAR:Played piano for 11 years and violin for 6 years.TutoredBriarcliff students in math andcoachedstudents at Yonkers Partners in Education for the SAT.Currentlyconducting research at IBM using a statistical technique called causal inference to determine better mechanical ventilation treatment strategies for patients with acute respiratory distress syndrome.Spending this summer working as a software development intern with Columbia University Information Technology.

EXCEPTIONAL TEACHERS:In my experience, exceptional teachers have high expectations but believe firmly that each student can meet them. Theyre demanding yet supportive, and they care deeply about their students. Ive had the pleasure of being taught by many such teachers, but among the best areDr. Robert SaarandMs. Jamie Mandel.

PLANS:Columbia Universityto study Computer Science and Math. More broadly, I hope to focus my career on the use of data science in service of humanity.

WORDS OF WISDOM:Focus on balance. Make sure to work hard and take advantage of opportunities that come your way, but dont forget to relax!

Marlena KuhnSalutatorian

EXTRACURRICULAR: Member of the Academic Challenge trivia club, the New York State Math Honor Society, Rho Kappa National Social Studies Honor Society, and the National Honor Society. Founder of the Inter-Generational Alliance, a volunteering club dedicated to strengthening our community by connecting high school students to residents of the local nursing home. Third-degree black belt in traditional Shotokan karate.

EXCEPTIONAL TEACHERS: An exceptional teacher is someone who prioritizes the students understanding. Ms. Lee was an exceptional AP Biology teacher. She made sure that I was comfortable taking the class as a sophomore (Marlena is graduating after her junior year), and she always was very approachable.

PLANS: NYU to major in biology, and I plan to become a doctor.

WORDS OF WISDOM: I do not feel qualified to give advice to my peers, but I hope that they take the mistakes they made in high school as lessons for the future. To underclassmen, remember that life continues after high school. Working hard now can set you up to have more fun in the future.

Nancy LiSalutatorian

EXTRACURRICULAR: Varsity Girls Tennis Varsity Girls Squash. Treasurer of schools Asian Club, secretary of Chemistry Club, and managing editor of Briars and Ivy, the schools literary magazine. I play the piano and am involved in planning events for the local library.

EXCEPTIONAL TEACHERS: An exceptional teacher is one who truly understands his or her students and is willing to be flexible with his or her lessons. He or she listens to feedback well and varies class activities to keep students intrigued. Special shoutout to Dr. Saar, Ms. Dyer, Mrs. OBrien, and Ms. Fishman who always taught material in interesting ways and supported me through my academic journey.

PLANS: UCLA as a neuroscience major. Plans to go to graduate school and pursue a PhD.

WORDS OF WISDOM: I think the most important takeaway I have learned from high school is to not be afraid to step out of your comfort zone. Reach out to that new person, join that club you were thinking about, use the short time we have to grow independently.

Jolie Wasserman Salutatorian

EXTRACURRICULAR: Staff writer of our schools newspaper, the Briarcliff Bulletin, for all four years of high school. Editor-and-chief as a senior. Varsity tennis and track and field, co-creator of a volunteer tutoring service for students in our school district.

EXCEPTIONAL TEACHERS: There are many teachers who qualify for that exceptional standing, but Id like to recognize Samantha Fishman who was my ninth-grade English teacher. To this day, we are still quite close, and she is always there to listen to and talk about anything, from the trivial to deep conversations.

PLANS: Carnegie Mellon University to study either electrical and computer engineering or mechanical engineering.

WORDS OF WISDOM: Continue to keep an open mind in high school. High school presents more academic, artistic, athletic, and social freedom, so I would suggest exploring each in a responsible manner.

Maya Gardos Valedictorian

ExtracurricularCreator of Pucks Players, a program that engages middle schoolers with Shakespeare;Student Faculty Congress President;Politicalinternships withoffice of Assemblywoman SandyGalefand David Buchwald for Congresscampaign;Book Club President;Croton Academic Challenge Team Captain.

Exceptional EducatorsAn exceptional educator is passionate about what they teach and works to help students understand the importance and meaning behind their subject. John Bohuniek, U.S. History teacher, for always working to make history relevant;Donna Light-Donovan, Science Research and Biology teacher,for guiding me through my research project on the impacts of partisan media and showing me the possibilities of science;Joseph Merriam, for helping me to grow my love of Shakespeare and literature.

Post-GraduationYale University.Undecided about career path.

Words of WisdomTo underclassmen> Pursue what you are passionate about, not what you think looks good on a resume.To fellow graduates>Our learning journey has just begun!

Camilla Giorcelli Salutatorian

Extracurricular

Treasurer and Representative for Croton Harmon High Schools Student Faculty Congress;

Varsity Volleyball Captain;Intern for Village of Crotons Sustainability Committee;

Croton Academic Challenge Team;Varsity Ski Team.

Exceptional EducatorsSomeone who goes above and beyond to make a connection with their students.AP Spanish teacher Seora Ballina enhanced my Spanish learning experience and supported me beyond academics. Ms. Cardellichio, AP Environmental Science teacher, taught me how important it is to care for the environment and made her class especially engaging. She inspired me to pursue Environmental Studies.

Post-GraduationStudying environmental studies and computer science at Washington University in St. Louis.

Words of WisdomTo underclassmen > Dont be afraid to ask for help and use the resources you are offered for support,academically or with mental health.

Madison Kivel Valedictorian

ExtracurricularGuiding Eyes for the Blind;Recycled Paws;Varsity Ski Team;HOSA (Health Occupation Students of America Future Health Professionals);Hispanic, Math, and National Honor Society.

Exceptional Educators

They are willing to give extensions, extra help, and guidance on an assignment or activity. Mr. Witkowich (AP U.S. History) and Dr. Hall (Biomed) as exceptional educators, dedicating their time and energy to the success of their students.

Post-Graduation

Cornell Universitys College of Agriculture and Life Sciences, majoringin animal science on a pre-veterinary track, andhope to attend Cornell Universitys veterinary school.

Words of Wisdom

To my fellow graduates and to underclassmen > Hard work and dedication throughout not only high school but for the rest of your life will pay off. You can accomplish anything that you set your mind to.

Indrani Malhotra Salutatorian

Extracurricular

Co-Editor-in-Chief of school newspaperThe Anchor;helped create schoolsnew website;theater program;Hen Hud Leos,SEED club;othercommunity service organizations.

Exceptional EducatorsThey capture the excitement of learning, making it dynamic and interesting. Inspire a love for the subject in their students and foster a sense of community in their classroom. I have had amazing teachers like this every year.

Post-Graduation

Boston University to double major in International Relations and Environmental Analysis and Policy,inKilachand Honors College.Interested inenvironmental advocacy oradiplomacy-related field.

Words of WisdomTo my fellow graduates and underclassmen>Make the best of every moment, take advantage of every opportunity, and do the things that make you happy, in high school, college and beyond, because you never know what life might throw at you next.

Henry Demarest Valedictorian

EXTRACURRICULAR: Founding member, head programmer and team captain, Irvington Robotics Team, called the BulldogBytes,; Volunteer Fuller Center for Housing; President of IHSs chapter of National Honor Society, consul of the Latin Club, member of Science Olympiad and Academic Challenge teams.

EXCEPTIONAL TEACHERS: They know their subjects well, they create fun lesson plans, and they provide help outside the classroom. Most importantly, exceptional teachers truly care about their students. They are not afraid to put in extra time and effort to ensure that their students have the opportunity to succeed. I would like to noteMr. Barry, my AP US History teacher. I absolutely loved Mr. Barrys class he was extremely engaging and I knew that he cared about all of us every step of the way.

PLANS: Yale University to study mechanical engineering. I plan to either go to graduate school for engineering or go into industry, possibly in the aerospace field.

WORDS OF WISDOM: Find what you enjoy. Whether on my robotics team or in my volunteer work, I have always found myself to be most successful when Im really enjoying what I am doing. I would encourage younger high schoolers to explore different subjects, fields, and activities and figure out what you truly enjoy. It is in these areas that you will feel motivated to do your best work, and it is also these areas where you will have the most fun.

Esha Shenoy Valedictorian

EXTRACURRICULAR:Regeneron Pharmaceuticals Mentorship finalist & science research member; President & captain of the Academic Challenge team; President of the Science Olympiad Team; IEF Innovation Fund Grant Winner; Digital animator; Teaching assistant in biology, chemistry, and history.

EXCEPTIONAL TEACHERS:Someone who feels incredibly passionate about the subject that they teach and is able to impart that love of learning onto their students.Mr.MarkicandMs.Parikkawere my chemistry and biology/science research teachersrespectively, and are probably the reason I chose to pursue a science major. Not only did they go above and beyond when teaching difficult subject matter, but they are also some of the kindest people I have ever known.Mr. Fatawasmy history teacher forthe past three years. Hishumorand thoroughly researched lesson plans made his classes such a joy to attend. Finally,Ms. YeeandMs. Steuerare my Academic Challenge club advisors and have helped theteam immensely over the years.

PLANS:Rice Universityto study Health Sciences.

WORDS OF WISDOM:Find your niche and have the courage to pursue it!

XiaxiaSaavedra Valedictorian

EXTRACURRICULAR: Ossining Science research program studying Diabetes at Weill Cornell Medical College, President of Ossining Engineering Team, Ossining softball and soccer teams, National Honor Society, STEP Tutor

EXCEPTIONAL TEACHERS: Exceptional teachers take the time to push their students to succeed and help them find their passions. My science teachersMr. PiccirilloandMs. Holmesprovided me with constant encouragement throughout my high school career.Mr. Albrecht, Engineering teacher and team mentor, helped me grow as a leader and develop my love for engineering.

PLANS: The University of Chicago, to major in Biochemistry; on pre-med track, hope to study cardiology.

WORDS OF WISDOM:Make sure to have fun while taking advantage of every opportunity available to you and working hard for your future.

Linlee Mangialardi Salutatorian

EXTRACURRICULAR:Ossinings Science Research program studying metabolism in yeast;Captain on the cross country and track team;Head attorney on the mock trial team;student-life editor of the school newspaper; peer tutor;Co-President of the National Honor Society;member of the Rho Kappa National Social Studies Honor Society;Senator Carluccis Student AdvisoryCommittee

EXCEPTIONAL TEACHERS:Supports your passions and wants you to be successful inside and outside the classroom; Science Research teachersMr. PiccirilloandMs. Holmesfor their persistent guidancethroughout my research,Ms. MannarinoandMs. Olinfor their encouragement.

PLANS:Georgetown University in Washington D.C., to major in biologyand pursue acareer in scientific research.

WORDS OF WISDOM:Always work hard and take advantage of the opportunities that are present it will always pay off eventually.

Luisa Urgiles Valedictorian

ExtracurricularLatino Culture Club;Girls Who Code Club;National Spanish Society;National Science Society;National Math Society;Computer Science Society.

Exceptional Educators

They make learning relevant to real-world activities. Thanks to Ms. Daniels, Ms. Pichardo, Ms. Santos, Ms. Veloz, Mr. Newby, Ms. McCarthy. They built nice relationships with their students, supporting them to succeed and aim for a great future.

Post-Graduation

I hope to attend Binghamton University to study computer science with a focus on cybersecurity, computer engineering or start pre-medical studies.

Words of WisdomTo my fellow students > Be who you are, dont think too much about what others might say or judge because those people will be everywhere, no matter what you do. Find friends who are truthful to you, because those are the people with which you will be making memories and great friendships.

Jilda Pauta Salutatorian

Extra-CurricularVice President of Science Honor Society;Secretary of Social Studies Honor Society;Treasurer of Sociedad Honoraria Hispanica;Math Honor Society;National Honor Society;English Honor Society;Concert Band;Mercy College STEP Program;TodaysStudentsTomorrowsTeachers;Teachers Assistant and Translator in CCD at Church of Assumption

Exceptional EducatorsOne who is patient, passionate, inspiring for students. AP Spanish Language and Culture teacher Mrs. Daysi Suerois veryeffective. Public Policy in Modern America teacher Mrs. Stephanie Ramirez keeps the class engaged. Entrepreneurship teacher Ms. Molly McCarthy pushes students to reach their full potential and taught me how to manage a full-time buisness.

Post-GraduationMarist College in Poughkeepsie, to major in Criminal Justice and minor in Psychology.

Words of WisdomPut in the time and effort to achieve your goals, and maintain a healthy balance between academics and social life.

Vaishali Miriyagalla Valedictorian

Extracurricular

Girls Varsity Soccer; Jazz Band; Club Fit Swim Team; Neighbors Link volunteer; Yorktown Rehabilitation & Nursing Center volunteer.

Exceptional EducatorsSomeone invested in our well-beingandallowingstudentsto achieve their potential. I have had many amazing teachers at Lincoln Titus Elementary School, Lakeland Copper Beech Middle School, and Walter Panas High Schoolwho have impacted us in more ways than they realize.

Post-GraduationBowdoin College to study mathematics and physics,pursuinga liberal arts education,towards a career in Engineering.

Words of WisdomAs Benjamin Franklin said,Tellme and I forget. Teach me and I remember. Involve me and I learn. Get involved, experience things for yourself, and never stop learning.

Emily Attinger Salutatorian

ExtracurricularTheater company;science research at NewYorkBotanicalGarden;Girl Scouts;Venture Scouts;piano.

Exceptional EducatorsThey are supportive and make learning fun and engaging, like my AP U.S. history teacher Dr. Sandground. She was a tremendous help during my college application process and I always looked forward to her classes.

Post-GraduationRoyal Holloway, University of London, to double major in Criminology and Psychology. I hope to earn a doctorate and help the criminal justice system as a forensic psychologist.

Words of WisdomIts important to find a balance between schoolwork and personal time. Our brains need a breather sometimes and having a hobby or extracurricular can help you relax, recharge, and come back ready to work.

At press time, RJ had not received completed questionnaires from these students.

I know I speak for all of the faculty and staff in the district when I say how proud we are of Maya and Zach, saidSuperintendent Chris Borsari. Their hard work and dedication, along with the dedication of all of their incredible teachers, got them where they are today, and I wish them the best of luck in college and beyond.

Valedictorian Maya Weitzen

Salutatorian Zachary Rudder

Read this article:

Saluting the 2021 Vals & Sals - River Journal Staff

Read More..

What is ransomware and how is it dealt with? – Cosmos Magazine

What is ransomware?

Ransomware is a type of malicious software AKA malware that infects and takes control of a device. It blocks access to files or even whole devices, and then sends a message demanding a ransom to grant access to those files.

This is a common form of cybercrime that has recently affected universities, hospitals and meatworks. Because it blocks vital data from being accessed, it can massively disrupt organisations that use the shared networks and/or the internet which is, well, everyone at this point.

Malware is infectious software that will download onto a computer, phone or other device. It can be shared though phishing emails, links in messages or other online locations, or fake download buttons. Sometimes it can be difficult to tell whether a link or button is malicious in the first place.

When the fake link is clicked, the malware automatically downloads and then hunts through the system or network to identify important data. The software can lock the device or files with a new password, or encrypt files with a secret key, preventing access.

This can be exacerbated because malware can be accompanied by social-engineering tools that trick you into granting admin access, or it can exploit security holes to dive into the important files and software on the computer without even needing to get permission.

There are many ways of encrypting files, but the point is to prevent user access with computer algorithms. Without an up-to-date backup, this data is essentially lost.

The user will then often see a ransom note in the form of a message demanding (usually) money to lift the password or encryption.

Of course, paying the ransom doesnt mean the cyber-criminal will actually lift the encryption, and if you have paid up once, there is incentive for the criminal to do it again.

Credit: cyber.gov.au

The real kicker here is that the infectious software can gain access to a whole network of connected devices, even if it has been downloaded on just one computer which means businesses that have shared data can be completely prevented for accessing anything, including saved files, emails and user profiles.

There is no simple explanation of how the programming works it is complex software engineering that can be continuously updated, and there are different examples that can be spread and downloaded in ways the suit the attacker.

Because malware can pop up in almost anywhere, it is often hard to identify.

A lot of ransomware is designed to look like something real, such as a casual email attachment, something shared via social media, or a website that looks almost like a real website you wanted to visit, but has a few different letters in the URL.

in one sneaky approach, the attacker can even pretend to be somebody from law enforcement who is stopping another cybercrime that they accuse you of, and then demand a fine from you but there are easier ways to get access to a device.

The main thing to remember is that a lot of phishing can be prevented by not clicking suspicious links. Just a little life hack on how not to get hacked.

via GIPHY

More seriously, this in an increasingly big business between ransoms paid, loss of data and downtime, costs of recovery, and other security and investigations, ransomware attacks cost the world $5 billion in 2017.

Cybercriminals are often individuals or work in teams or networks, but there are also crimeware-as-a-service groups that essentially operate as a business.

Technology develops so quickly that defenders and attackers can get stuck in an arms race, so cybersecurity and trained professionals are absolutely essential to an online world, especially as we begin to incorporate more AI and machine learning into our manufacturing. Once ransomware is in a network, its extremely hard to remove.

First and foremost, keep backups. If all your files get encrypted but you have another offline backup, its simple to restore your data.

Always keep your malware security up to date. Attackers obviously try to get around this security, but it is a whole lot better than having none at all. Many companies test their systems with white hat hackers, who attempt to hack their systems to recognise and fix the security flaws.

Teaching people to recognise phishing emails and be cautious about suspicious sites and links is also necessary, but it can only go so far, because phishing material is constantly being improved to blend in better. Dont click on links or open attachments if you dont know the sender of the email. A lot of these emails suggest you need to make a payment, have breached some sort of contract, or pretend to have blocked access to an account.

Because ransomware secretly searches your device, there can be a delay between when a link is clicked and when files are encrypted. There is a rise in predictive analytics and machine learning to help detect this suspicious behaviour and shut it down early.

And finally, if you do get attacked, dont pay up, because its likely to make you seem like an easy target in the future.

We asked Diep Ngyuen, Senior Lecturer in the Faculty of Engineering and Information Technology at UTS, for a little more depth. This is what they said

Cyber attacks target either to bring down networks/systems (make them malfunction) or to compromise the information access authority or integrity.

Although the former is often closer and easier to understand to most people, the latter is more popular and the major target of most daily life cyber attacks.

For example, DoS (Denial-of-Service) attacks can make a network or service inaccessible for some time, disrupting corporates functioning or business. These types of attacks can be easily detected.

However, cybercrimes often target high-value information and attempt to illegally access it or even alter the information.

The information authority or integrity attacks are more difficult to be detected but their consequences can be very damaging, even much worse than the DoS attacks.

To prevent or reduce risks from cyber attacks, IT core engineers/experts and daily users can take different approaches. However, these approaches all aim to early detect cyber threats, then effectively protect or cure the systems when the attacks really happen.

One of the most common precautions [is] to avoid using services/websites, apps, hardware from non-certified or low-reputation sources/providers. These systems often have back doors or vulnerable loopholes that can be leveraged by cybercrimes.

The second precaution would be to update and follow security recommendations from governments and experts, e.g., using multi-factor authentication methods, not to share or be cautious on sharing personal/private information like Date of Birth, photos, [etc] on open platforms (even social media).

The last, but not least, is to become more aware of cyber threats/risks before deciding to take any action (e.g., do you understand the risk of using Apple pay or using activity trackers?).

Cyber security landscape has been changing dramatically over the last 10 years. This is because of the penetration of IT to every corner of our daily life, from working, entertaining, to sleeping.

This is also because of the ever-growing advances in attacks and their countermeasures. In comparison with 10 years ago, the number of connecting devices today has been increased by multiple times.On average, each person now would have more than a few connecting devices (e.g., phones, activity trackers, laptops, sensors at home).

These devices, [while they] bring us lots of conveniences, are making us more vulnerable to cyber threats when they are attacked or compromised. More importantly, most of these newly added devices (e.g., in Internet of Things) are limited in computing and storage capability or referred to as low-end devices in cyber security. They are more susceptible to cyber threats.

The advances in machine learning and AI also empower cybercrimes, allowing them to launch larger scale and more damaging attacks.

In the past, talking about cyber security/attacks is something of defense. Now, it is the responsibility of every single citizen with implications on our daily life.

View original post here:
What is ransomware and how is it dealt with? - Cosmos Magazine

Read More..

DeVry University Celebrates Its 90th Anniversary With History Steeped in Technology and Innovation – Business Wire

NAPERVILLE, Ill.--(BUSINESS WIRE)--DeVry University celebrates its 90th year as a pacesetter for innovative education and online learning, as it continues its mission of providing students with educational pathways to help prepare them for careers in todays rapidly transforming economy.

Distance learning has come a long way since 1912, when Dr. Herman DeVry invented the Theater in a Suitcase, a Model E portable projector that shifted the education technology paradigm. By 1913, these projectors became standard technology in U.S. schools nationwide. Almost 20 years later, in 1931, Dr. DeVry and Dr. Lee DeForest founded DeForest Training School, now DeVry University, in Chicago to prepare students for technical careers of that time.

Since then, DeVry has offered programs that respond to converging technologies and the changing nature of work. This is reflected in the courses and programs offered (e.g., certificates, undergraduate and graduate degrees, stackable credentials) and in teaching modalities (e.g., traditional classroom instruction, online and hybrid learning). DeVrys goals remain unchanged: to help students prepare for meaningful careers that ultimately help close societys opportunity gaps.

DeVry Through the Decades

DeVrys 90-year history is steeped in technology and innovation, and through the years, shows how it has been an innovator in multidisciplinary programming and distance learning.

As we review our long history of serving students and evolving both what we teach and how we teach, we take pride in the north star that has guided us since 1931 to help students better their lives through an education that prepares them to thrive in workplaces shaped by continuous technological change, said Tom Monahan, president and CEO of DeVry University. As we emerge from the health and economic crisis of the pandemic, DeVrys expertise at meeting the needs of adult and nontraditional learners will be vital to helping students, communities and corporate partners reap the benefits of a markedly more inclusive workplace and a markedly more digital future.

The digital transformation of the workforce and the economy has rapidly accelerated due to the pandemic. According to the United Nations, workers with limited digital skills will find themselves at a disadvantage compared to those who are better equipped for the digital economy. From training students with early 20th century electronics to preparing learners today for digital era disciplines such as data and analytics, security, cloud and platform architecture, and digital health, DeVry leveraged its heritage to provide curriculum and programs that help students develop the interdisciplinary tech skills needed for future-ready careers.

Ever since I started teaching mathematics at DeVry in 1975, the University has been an early adopter of new technology, said Senior Professor Veronica Schreiber, DeVrys longest-standing faculty member. Weve always piloted new technology, and this has allowed me to create new learning opportunities to help my students succeed. DeVry encourages and embraces innovation, embracing that the more tech tools we incorporate, the more ways we can help our students.

About DeVry University

DeVry University strives to close societys opportunity gap by preparing learners to thrive in careers shaped by continuous technological change. Founded in 1931, the university offers undergraduate and graduate programs onsite and online within six areas of study: Accounting, Business, Healthcare, Technology, Liberal Arts, and Media Arts & Technology. The university is accredited by The Higher Learning Commission (HLC, http://www.hlcommission.org/). To learn more, visit devry.edu.

More here:

DeVry University Celebrates Its 90th Anniversary With History Steeped in Technology and Innovation - Business Wire

Read More..