Campaign targeting more than 200 people also spread disinformation, report says.
9 hours ago Separate then Solve: A practical exampleIT Toolbox Blogs View Synopsis+1
Yesterday I wrote Separate then Solve: a model for solving problems to explain how I tackle really knotty problems. People tell me that they like how I manage this kind of challenge - especially in team situations where there are lots of stakeholders. That
While not perfect, either, cloud hosting providers have a better customer data record.
1 day ago Fat-thumbed dev slashes Samba securityThe Register View Synopsis+1
Remote code execution in all versions since 3.5.0, so it's patching time!
Sysadmins tending Samba need to get patching.
Five hospitals in Queensland are suffering from system failure caused by the security patches that were installed to protect the hospital from the global WannaCry ransomware attack.
22 universities in Australia will have to share the AU$5.7 million funding injection from the federal government to develop tech-related defence capabilities.
Leading the latest edition of the ISMG Security Report: Secretary John Kelly's congressional testimony on how DHS led government efforts to mitigate the WannaCry ransomware attacks. Also, reports on ransomware defenses and big data and machine learning combining to secure IT.
Researchers have conducted a detailed analysis of pacemaker systems from four major vendors and discovered many potentially serious vulnerabilities.
2 hours ago "ªWannaCry"¬pt ransomware note likely written by Google Translate-using Chinese speakersThe Register View Synopsis+1
Signs of machine translation spotted by analysts
The "ªWannaCry"¬pt extortion notes was most likely written by a Chinese speaking authors, according to linguistic analysis.
All physical security relies on understanding. There's no physical security discipline where you would try to protect a space that you didn't understand. Yet in cybersecurity many say the data center is too complicated, changes too fast, is too heterogeneous, and we focus on detection instead.
Security has come front and center for every aspect of technology - even the display server. Jack Wallen shines a spotlight on the Linux X.org server, why it's insecure, and what you can do.
31 minutes ago Is that fog in the SAP forecast?IT Toolbox Blogs View Synopsis+1
SAP's big play at SapphireNOW defocused the ERP play and ratcheted up the importance of the IoT platform analytics or Edge Analytics. The key, of course, will be the database, SAP will push hard for it to be HANA.
The same hackers who breached the DNC planted fake data in leaks on a prominent Kremlin critic, security analysts say.
Linguistic Analysis Suggests Native Chinese Speaker Wrote Ransom NoteThe identity of the individual or group behind the global WannaCry ransomware campaign remains unclear. But whoever wrote the ransom notes appears to have been fluent in Chinese and pretty good at written English, according to a linguistic analysis from security firm Flashpoint.
The impact of data breaches can be measured in a company's share price and customer churn.
2 hours ago GDPR Industry Roundup: One Year to GoSecurityWeek View Synopsis+1
GDPR Roundup: New Products, Surveys and Industry Commentary
3 hours ago Qbot Infects Thousands in New CampaignSecurityWeek View Synopsis+1
A recent distribution campaign resulted in thousands of machines being infected with the Qbot malware, Cylance security researchers warn.
3 hours ago CISO Perspective: How Strategic Cyber Threat Intelligence Fits Into Your Security ProgramSecurityWeek View Synopsis+1
Security Professionals Can Use Strategic Threat Intelligence to Help Justify Security Spending Decisions and to Realign Budgets