article thumbnail

2017 in cybersecurity and privacy news

The Parallax

Ransomware, a particularly nasty form of malware that locks your computer until you pay off your attackers and has been around for decades, continued to wreak havoc in 2017. Margaret MacAlpine and Harri Hursti, voting machine researchers, appear with the AVS WinVote System at DefCon 25, July 30, 2017.

article thumbnail

Dragos raises $110M Series C as demand to secure industrial systems soars

TechCrunch

Dragos was founded in 2016 to detect and respond to threats facing industrial control systems (ICS), the devices critical to the continued operations of power plants, water and energy supplies, and other critical infrastructure. But the country has faced extensive criticism for its human rights record by international rights groups.

Industry 305
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How to use your Android as a 2FA key

The Parallax

“It is much safer than one-time code systems, including SMS or authenticator code systems, as this is based on the FIDO 2.0 Google Play is an ‘order of magnitude’ better at blocking malware. So far, separate hardware authentication keys are not known to be affected by malware. READ MORE ON ANDROID SECURITY AND PRIVACY.

How To 174
article thumbnail

How to address Apple’s severe High Sierra ‘root’ flaw

The Parallax

An Apple vulnerability that allowed anybody to access a Mac running the latest version of its operating system became widely known on Tuesday. Someone could do this by using a default method Apple accidentally introduced in the operating system, which it released to the public on September 25. macos 10.13

How To 169
article thumbnail

Cybersecurity Snapshot: Critical Infrastructure Orgs Cautioned About Chinese Drones, While Water Plants Advised To Boost Incident Response

Tenable

In addition, the latest on the Androxgh0st malware. 6 - CISA and FBI issue warning about Androxgh0st malware Is the Androxgh0st malware on your radar screen? Scan servers’ file systems for unrecognized PHP files. Plus, the challenges stressing out CISOs are also opening new doors for them. And much more!

article thumbnail

What’s what with WebAssembly?

Xebia

The use of virtualization allows a WebAssembly program to be portable across operating systems and different processor without modification. This is a big difference from containers, which are created for specific operating systems and processor types. It became Deis Labs after the acquisition by Microsoft in April 2017.

Azure 130
article thumbnail

South Korean and American Agencies Release Joint Advisory on North Korean Ransomware

Tenable

The actors have also used trojan versions of X-Popup, a messenger application used in several smaller hospitals in South Korea and have spread malware using 2 malicious domains, xpopup.pe[.]kr They then exfiltrate the target's data to a remote attacker-controlled system. billion has been stolen or extorted. kr and xpopup[.]com.

Malware 53