Privacy & Security
A hacker group released a new malware strain into the wild able to override IoT devices for use in DDoS attacks. Linux/IRC Telnet or the 'new Aidra' was discovered by researchers who posted an analysis on an anti-malware site.
The research firm detailed the use and planned use of several security technologies and found that anti-malware, firewall and patch management are the most implemented end-point cybersecurity technologies today.
Seventy percent of security industry professionals believe threat intelligence is too complex or voluminous to provide actionable insights, according to Ponemon Institute's Threat Intelligence report released today.
Research conducted by CHIME and AEHIS uncovers the need for new cybersecurity tools, help from federal agencies and incentives for information sharing.
SPONSORED
Top security concerns for the modern network.
Approach cybersecurity like war. Then take a defender’s standpoint, share information whenever possible, understand what you really need to accomplish and study history.
Internet-of-Things devices lack some of the most basic cybersecurity protocols. As a result, these devices can be weaponized en masse – and in as little as three minutes.
Big opportunities for efficiencies and cost savings mean cloud should become 'the archetype for small organizations' (and some big ones too).
SPONSORED
When the network backdoor is wide open, the potential for unrestricted access to valuable patient data is practically unlimited.