New cyber security label for smart home devices launched; plans to have standards adopted overseas

New cyber security label for smart home devices launched; plans to have standards adopted overseas

Posted by , 09-10-2020

SINGAPORE - A new labelling scheme to indicate the cyber security levels of home appliances has been launched in Singapore, with plans to have the standards adopted at an international level. The Cyb...

Black Hat 2020: Using Botnets to Manipulate Energy Markets for Big Profits

Black Hat 2020: Using Botnets to Manipulate Energy Markets for Big Profits

Posted by AngelaWong, 16-08-2020

Black Hat 2020 session discusses how high-wattage connected devices like dishwashers and heating systems can be recruited into botnets and used to manipulate energy markets. Researchers are war...

NSA, FBI Warn of Linux Malware Used in Espionage Attacks

NSA, FBI Warn of Linux Malware Used in Espionage Attacks

Posted by AngelaWong, 16-08-2020

A never before seen malware has been used for espionage purposes via Linux systems, warn the NSA and FBI in a joint advisory. UPDATE The U.S. government is warning of new malware, dubbed Drovo...

Is Your Mac Really Safe? Let’s Take a Look Into It

Is Your Mac Really Safe? Let’s Take a Look Into It

Posted by AngelaWong, 15-08-2020

Is Your Mac Really Safe? Let’s Take a Look Into It Mac computers have enjoyed decades of a reputation of being safer than their Windows counterparts. However, that reputation is now dwind...

IcedID Shows Obfuscation Sophistication in New Campaign

IcedID Shows Obfuscation Sophistication in New Campaign

Posted by AngelaWong, 15-08-2020

The malware's developers have turned to dynamic link libraries (DLLs) to hide their work.   IcedID is malware that, like many others, is constantly evolving to avoid detection. Recently, resear...

How To Preemptively Track Phishing Campaigns

How To Preemptively Track Phishing Campaigns

Posted by AngelaWong, 10-08-2020

  Understanding vulnerabilities and the threat matrix to your enterprise was always an effective way to ensure cogent cyber defense of your organization. Reacting to phishing attacks in real-tim...