By Microsoft, the FBI, Europol and industry partners. It’s about Time!
In the past I have written many blogs about how software companies and OS developers need to start taking security more seriously. While Microsoft has been a focus of mine, it seems that they are finally being proactive. While there new Digital Crime Unit is important, they also need to start reworking an entirely new operating system from scratch with no backward compatibility to DOS or older versions of Windows. The Operating System should start from a security stance and then build in functionality. Plus, the rollout can be limited to get other software companies to make changes to their programs, but in five years “Patch Tuesdays” should be a footnote in history books.
The following is an excerpt from a recent Microsoft press release on ZeroAccess. Read More→
With all the cyber attacks reported in the news and with the increase in email SPAM with malware attachments, company CEO’s are asking me about their protection strategies. When I start discussing anti-virus and anti-malware software, I often get the same response, “Aren’t they the same thing”? They are not and that prompted me to write this report on the differences as well as some actionable tips and strategies to consider.
First, let’s get some understanding as to the differences between malware, viruses and some of the other attack terms used in the industry. Some you are undoubtedly very familiar with, while others may be fairly new. What they all have in common however, is that they are designed to do maximum damage by disrupting computers and stealing vital information. Read More→
Recently McAffe published a worldwide hacking report about what they are calling Shady RAT.
The United Nations, Olympic committees, governments, U.S. real estate company, a major media organization based in New York, a satellite communications company and other companies around the world, totaling 72 organizations, have been hacked by a “state actor”.
While there are suspicions as to which country was involved,it has not yet been proven. McAfee’s vice-president of threat research, Dmitri Alperovitch, wrote in a 14-page report that, “Even we were surprised by the enormous diversity of the victim organizations and were taken aback by the audacity of the perpetrators. What is happening to all this data … is still largely an open question. However, if even a fraction of it is used to build better competing products or beat a competitor at a key negotiation (due to having stolen the other team’s playbook), the loss represents a massive economic threat.” Read More→