News

  • Data-wiping malware hitting Ukrainian computers displays fake ransom demand

    Someone is targeting Windows computers in Ukraine with malware, and for some reason they want it to look like ransomware. Read More

    Read More

  • At Request of U.S., Russia Rounds Up 14 REvil Ransomware Affiliates

    The Russian government said today it arrested 14 people accused of working for “REvil,” a particularly aggressive ransomware group that has extorted hundreds of millions of dollars from victim organizations. The Russian Federal Security Service (FSB) said the actions were taken in response to a request from U.S. officials, but many experts believe the crackdown…

    Read More

  • Friday Squid Blogging: The Evolution of Squid Eyes

    New research: The researchers from the FAS Center for Systems Biology discovered a network of genes important in squid eye development that are known to also play a crucial role in limb development across animals, including vertebrates and insects. The scientists say these genes have been repurposed in squid to make camera-lens-type eyes. As usual,…

    Read More

  • Upcoming Speaking Engagements

    This is a current list of where and when I am scheduled to speak: I’m giving an online-only talk on “Securing a World of Physically Capable Computers” as part of Teleport’s Security Visionaries 2022 series, on January 18, 2022. I’m speaking at IT-S Now 2022 in Vienna on June 2, 2022. I’m speaking at the…

    Read More

  • Today’s Trends: Consumers Prioritize Protection Over Convenience

    People have made it clear. They’re feeling more exposed to online threats and want stronger protection. Our 2022 Trends Study puts figures to these feelings, saying that they believe the risks to their online privacy have increased over the past year. Moreover, 42% believe the risks to their personal and financial information have increased as…

    Read More

  • Talking cyber on the ManageEngine Insights podcast

    I was delighted to appear on the “ManageEngine Insights” podcast this week, hosted by enterprise analyst John Donegan. Give it a listen. Read More

    Read More

  • Thousands of enterprise servers are running vulnerable BMCs, researchers find

    Having the ability to remotely manage and monitor servers even when their main operating system becomes unresponsive is vital to enterprise IT administrators. All server manufacturers provide this functionality in firmware through a set of chips that run independent of the rest of the server and OS. These are known as baseboard management controllers (BMCs)…

    Read More

  • Using EM Waves to Detect Malware

    I don’t even know what I think about this. Researchers have developed a malware detection system that uses EM waves: “Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification.” Abstract: The Internet of Things (IoT) is constituted of devices that are exponentially growing in number and in complexity. They use numerous customized firmware and hardware,…

    Read More

  • CIS Controls v8 Introductory Course Available on Salesforce’s Trailhead

    Version 8 of the CIS Critical Security Controls (CIS Controls) helps organizations keep up with modern systems and software, and can ultimately help improve your cybersecurity posture. The CIS Controls team recently worked with Trailhead – Salesforce’s online training platform – to create an introductory course on CIS Controls v8 Implementation Group 1 (IG1), also…

    Read More

  • Using Foreign Nationals to Bypass US Surveillance Restrictions

    Remember when the US and Australian police surreptitiously owned and operated the encrypted cell phone app ANOM? They arrested 800 people in 2021 based on that operation. New documents received by Motherboard show that over 100 of those phones were shipped to users in the US, far more than previously believed. What’s most interesting to…

    Read More