SecurityWeek – Study Aims to Show Links Between U.S. Voting Infrastructure and Nations With a Proven Aptitude and Desire to Target Elections. The supply chain is an increasing concern for both business and government. It comprises the chain of suppliers providing components to product vendors — and globalization has made it worldwide, deep and complex. “Some of the software and hardware components are developed in eastern Europe. We need to look at supply chain integrity, end to end,” said Matt Rahman, COO.
Article Categories: ARTICLE
6 IoT Security Predictions for 2020
IoT World Today – As we transition to a new decade, there is growing maturity in the field of IoT security, but also a wave of new risks. Cesar Cerrudo, chief technology officer at IOActive, warned, “Anytime we have more interconnected things, we have more security problems.”
French Hospital Crippled by Ransomware
Infosecurity Magazine – Patient care at a large hospital in northern France has suffered considerably after a major ransomware attack at the weekend, according to local reports. “Sadly, the targeting of hospitals with ransomware is a growing trend; earlier this year seven hospitals in Australia were also impacted by ransomware,” argued Cesar Cerrudo, CTO at IOActive.
Bon sang! French hospital contracts 6,000 PC-locking ransomware infection
The Register – “Sadly, the targeting of hospitals with ransomware is a growing trend; earlier this year seven hospitals in Australia were also impacted by ransomware. Hospitals are becoming a major target as despite new technology adoption being high, there is often a lack of cyber security knowledge, even though health data can be a very lucrative area for cybercriminals. This makes busy hospital staff the perfect targets.”
French Hospital Hit By Ransomware Attack
Information Security Buzz – The Rouen University Hospital has been paralyzed by ransomware, with an attack similar to WannaCry in 2017, putting lives at risk. Sadly, the targeting of hospitals with ransomware is a growing trend; earlier this year seven hospitals in Australia were also impacted by ransomware. “It is vital that there is greater education and that organisations do more to test their defences against hackers,” commented Cesar Cerrudo, CTO.
2020 Predictions: Interest In Secure Design Practices Is Increasing Leading To Two Predictions
VMblog – There exists a trend towards heightened awareness in secure design practices, particularly, the attack and defense analysis technique, threat modeling. This trend implies two predictions for 2020 and beyond. First, security practitioners will need to understand DevOps software development practices to ensure that security can be designed into software from the start within a DevOps process. DevOps offers developers enormous productivity and operational gains.
How To Secure Your iPhone: 12 Experts Reveal 26 Essential Security Tips
Forbes – Just because you’ve invested in a smartphone that isn’t exposed to quite the same degree of malware and exploit issues as an Android device, that doesn’t mean you can safely ignore good practice when it comes to iPhone security. This is why I’ve asked 12 security experts to share their knowledge as far as keeping your iPhone secure is concerned. Here are their 26 tips to help you do just that.
We shall not pay the ransom, Johannesburg tells hackers
Coingeek – We shall not pay the ransom. This is the message that the city of Johannesburg in South Africa has for hackers who breached their systems. The hackers demanded 4 BTC, worth about $30,000, threatening to leak sensitive information if their demands were not met. They even gave the city a deadline. However, Joburg isn’t about to surrender to the crooks, despite admitting that some of its most crucial systems had been hit.
City of Johannesburg, on Second Hit, Refuses to Pay Ransom
ThreatPost – The city of Johannesburg, South Africa, is refusing to pay a ransom of four Bitcoins to a hacker group who accessed the city’s network and stole sensitive data, threatening to release it if the ransom wasn’t paid.
It’s the second time in several months that the city has been hit with a cyberattack demanding ransom. In July, a ransomware attack on Johannesburg’s City Power, which is owned by the city itself, left some residents without electricity for days.
Scientists reveal the 13 dark technology scenarios that keep them up at night
Business Insider – Deepfakes are sophisticated video forgeries in which AI tools can replace people’s faces in a video. For the most part, deepfakes are malicious, often used to fabricate videos like revenge porn. The technology — which is already free and easy to use — is only getting better. Matt Rahman, COO of the computer security company IOActive, said he is especially interested in the dangers of deepfakes. “In a few years, you won’t be able to tell what’s fake,” he said, because such video will be indistinguishable from reality.