Wednesday, June 28, 2017

New global ransomware threat strikes enterprises, but attacks can be mitigated

Security Digest
Information security news and advice from TechTarget's network | June 28, 2017
TechTarget
FEATURED STORY
Petya-like global ransomware attack can be mitigated
by Michael Heller, Senior Reporter

A new global ransomware attack has been spreading quickly using the same exploits as WannaCry, but researchers have already found ways to protect users from the damage. (SearchSecurity.com)

Advertisement
NEWS
 
Windows Defender bug could allow full system takeover

A newly disclosed Windows Defender bug, which could allow an attacker to fully take over a target system and create admin accounts, marks yet another major antivirus vulnerability. (SearchSecurity.com)

 
Malware in encrypted traffic uncovered with machine learning

Cisco claims it can accurately detect malware activity in encrypted traffic using machine learning, but some experts worry about privacy implications. (SearchSecurity.com)

 
Privileged user management trips up NSA
News roundup: DOD inspector general found NSA failed to implement secure privileged user management post-Snowden. Plus, Honda hit by WannaCry, Trump met with tech CEOs and more. (SearchSecurity.com)
 
 
 

Security code reviews by Russian agencies cause concern

Demands for security code reviews by Russia have been on the rise, and not all experts or U.S. companies want to comply with the requests. (SearchSecurity.com)

 
Machine learning in cybersecurity is coming to IAM systems
Machine learning in cybersecurity applications for identity management systems are becoming more common today. But will algorithms be the best option for authenticating and authorizing users? (SearchSecurity.com)
 
Risk & Repeat: Symantec, Mozilla spar over certificate issuance
In this week's Risk & Repeat podcast, SearchSecurity editors discuss Mozilla's suggested deadline for Symantec to turn over its certificate issuance operations. (SearchSecurity.com)
 
 
 
EXPERT ADVICE
 
How the use of invalid certificates undermines cybersecurity

Symantec and other trusted CAs were found using bad certificates, which can create huge risk for internet users. Expert Michael Cobb explains how these incidents can be prevented. (SearchSecurity.com)

 
How to use an interface identifier to check for IPv6 network updates
To find out if your IPv6 network has been updated to RFC 7217, you can perform a test using the interface identifier. Expert Fernando Gont explains how to do this. (SearchSecurity.com)
 
 
 
 

What a CPU cache exploit means for multi-tenant cloud security

Researchers recently proved that it's possible to steal cloud data from a CPU cache. Expert Rob Shapland discusses how this works and what it means for multi-tenant cloud security. (SearchCloudSecurity.com)

 
Fruitfly Mac malware: How does its decades-old code work?

The Fruitfly Mac malware has decades-old code, but has been conducting surveillance attacks for over two years without detection. Expert Nick Lewis explains how it works. (SearchSecurity.com)

 
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Security Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2017 TechTarget. All rights reserved.
TechTarget

No comments: