Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 206

Feb 16, 2016

EU managers need to up cyber security collaboration, study finds

Posted by in categories: business, cybercrime/malcode, security

The lack of collaboration on cyber security between the senior levels of business is leaving UK firms exposed to fines and reputational damage, a study has revealed.

One in 10 C-level respondents to a survey by Palo Alto Networks said they “kind of” understand what defines an online security risk, but admitted they “still have to use Google to help explain it”.

This finding suggests that the lack of consensus on where the responsibility for cyber security lies could stem from some lack of cyber security understanding at the leadership level.

Read more

Feb 16, 2016

Extremely severe bug leaves dizzying number of software and devices vulnerable

Posted by in category: cybercrime/malcode

Another possible breach risk uncovered.


Since 2008, vulnerability has left apps and hardware open to remote hijacking.

Read more

Feb 16, 2016

Online security? Just let me Google that, say puzzled bosses

Posted by in categories: business, cybercrime/malcode, economics, robotics/AI, security

Although this article highlights the lack of awareness by some CEOs and board members on all things around Cyber Security; I do see a larger gap and risk. I do believe if a fully funded and dedicated joint task force effort among Silicon Valley, US Government, and Wall Street are not in place tackling this jointly to help the country and economy to diffuse this situation within the next 14 to 18 months that AI could fail in its delivery due to public’s concerns around trust and security.

Therefore, tech spent millions if not billions on new AI technology that businesses and consumers see no value in due to risks.


Some board executives still need help from a search engine to explain cyber security issues, warns report.

Read more

Feb 16, 2016

Car cyber hijacking on the rise

Posted by in categories: cybercrime/malcode, security, sustainability, transportation

Cyber Carjacking the new way to steal someone’s auto.


Cyber security was one of the topics on the agenda at the recent CyberTech conference held in Tel Aviv.

Last year, hackers in the US managed to remotely access a Jeep Cherokee SUV through its on-board computer, taking control of its steering, transmission and brakes.

Continue reading “Car cyber hijacking on the rise” »

Feb 15, 2016

Time to Buy Cyber Security ETFs on Decent Q4 Results?

Posted by in categories: cybercrime/malcode, robotics/AI, security

This is very true; everyone knows in order for AI to truly be embraced by both consumers and industry; that Cyber Security on multiple fronts will need to be invested in to ensure better adoption of all the great technology on the horizon.


Though the cyber security industry has lost its momentum in the past several months, partially due to the weakness in the broad technology sector, it is poised for exponential growth in the coming years in the face of increasing cybercrime and the need to protect against these threats. According to Gartner, global security spending will increase 4.7% year over year to $75.4 billion in 2015 with some analysts projecting the global market to grow from $77 billion in 2015 to $170 billion by 2020.

The Q4 earnings reports of several industry players reflect this trend as most of them have beaten our earnings and revenue estimates with an encouraging outlook. Yet, they failed to drive the space and its ETFs higher that might suggest attractive entry point at the current level (read: 16 Bold ETF Predictions for 2016 ).

Continue reading “Time to Buy Cyber Security ETFs on Decent Q4 Results?” »

Feb 15, 2016

Governance challenges at the intersection of space and cyber security

Posted by in categories: cybercrime/malcode, economics, governance, military, security, space

See even Space gets it — the importance of great Cyber Security is needed now.


The disruption of capabilities that space assets provide would have immediate, far-reaching and devastating economic, political, and geostrategic consequences. Over the past two decades, space vulnerabilities have grown dramatically in a manner commensurate with terrestrial dependency on space-based capabilities and enablers. This is true for both civilian and military activities. Purposeful interference with space systems could rather easily trigger a retaliatory spiral of actions that could compromise a safe and secure operating environment in space. Accordingly, having available a range of measures to prevent or preempt an incident, or even full-up conflict, is of rapidly growing importance to an increasing number of countries.

The interruption of space services through a cyber attack could involve large, and possibly very complex, knock-on effects. As the space and cyberspace domains are linked operationally—space cannot exist without cyber and cyber, in some cases, without space—and they permeate all other warfighting domains (i.e. land, air, and sea), cyber-related vulnerabilities of space assets are a major concern. Global effects would be virtually instantaneous.

Continue reading “Governance challenges at the intersection of space and cyber security” »

Feb 15, 2016

$100 Billion Later, Feds Fumble on Cybersecurity

Posted by in categories: cybercrime/malcode, robotics/AI, security

Are you feeling confident about those robots and other AI machines and apps connected to the cloud environments self managing themselves?


The latest round of embarrassing federal data breaches struck the very agencies charged with protecting Americans, evidence one leading member of Congress believes is proof that throwing money at a problem doesn’t solve much unless there’s accountability to go with it.

Last week, the personal data of some 20,000 FBI employees and more than 9,000 Department of Homeland Security workers was released.

Continue reading “$100 Billion Later, Feds Fumble on Cybersecurity” »

Feb 15, 2016

Where Artificial Intelligence Is Now and What’s Just Around the Corner

Posted by in categories: bioengineering, biological, cybercrime/malcode, internet, robotics/AI, security, virtual reality

I believe that AI holds a lot of promise and many great things; however, we have to correct some very critical issues 1st before compound a huge issue that we have today. And, that is Cyber Security and re-establish trust with our consumers and customers. Without these 2 being fully addressed; you will compound these two challenges with AI plus run the risk of having an IoT that most people will not wish to use due to hackers, bad data, etc. Not to mention lawsuits for Wi-Fi connected robotics that were hacked and injured or worse some innocent person.

I believe need to ensure priorities are in order before we make things worse.


Unexpected convergent consequences…this is what happens when eight different exponential technologies all explode onto the scene at once.

Continue reading “Where Artificial Intelligence Is Now and What’s Just Around the Corner” »

Feb 14, 2016

Attackers try to compromise Magento with a fake patch

Posted by in category: cybercrime/malcode

Watch out for new patch from Magento — hackers are at it again.


Attackers are still trying to find Magento installations that haven’t patched a particularly bad vulnerability, this time trying to trick people into downloading a fake patch.

The bogus patch purports to fix a flaw known as the Shoplift Bug, or SUPEE-5344, wrote Denis Sinegubko, a senior malware researcher with Sucuri.

Continue reading “Attackers try to compromise Magento with a fake patch” »

Feb 14, 2016

Bringing Innovation into Cyberdefense Technologies

Posted by in categories: cybercrime/malcode, internet, security

Nice article; something that I agree very much with is the perspective that both Cyber Security is intertwined with technology innovation and adoption. Tech and other companies creating products or even services that leverages the net, can easily see their revenue potentials impacted due to poor Cyber Security. Example, Hello (Wi-Fi) Barbie by Mattel; when it was announced that the doll was indeed hackable; many buying consumers buying for their children left her on the shelf.


Hackers use innovative thinking when breaching systems, why can’t government?

by Larry Karisny

Continue reading “Bringing Innovation into Cyberdefense Technologies” »