Chocolate production at Cadbury's factory in Hobart has been stopped by the latest global cyber attack.
This isn't ransomware - it's merry chaos
Analysis It is now increasingly clear that the global outbreak of a file-scrambling software nasty targeting Microsoft Windows PCs was designed not to line the pockets of criminals, but spread merry mayhem.
Fingerprint sensors have become a mainstay among smartphone users to secure their devices and to pay for things. Between Apple and Samsung, fingerprint sensors have become one of the most commonly used features by consumers daily.
Rapidly Spreading Malware Has an Appetite For DestructionIs Petya worse than WannaCry? The second global outbreak of file-encrypting malware in as many months sees cyberattackers having designed potent, rapidly spreading malicious code far faster than organizations have been shoring up their defenses.
This is what you need to know -- right now.
16 hours ago IGMP: Leaving a Host GroupIT Toolbox Blogs View Synopsis+1
As the final step of initialization, hginit calls hgjoin to place the host in the all-hosts group. Once a host has joined the all-hosts group, it will receive IGMP queries.
12 hours ago Akamai Launches New DNS Security ProductSecurityWeek View Synopsis+1
Content delivery network and cloud services provider Akamai announced on Tuesday the launch of a new product designed to protect enterprises against malware, phishing and data exfiltration attempts through the analysis of DNS requests.
The attack highlights the growing danger of compromised third-party software being used to spread malware throughout firms.
Is there a fuzzer in the house?
Legacy Windows XP systems used by public authorities in the UK remains a concern. The WannaCry outbreak last month followed by the current 'NotPetya' outbreak -- both using a vulnerability patched in newer versions of Windows, but initially unpatched in XP -- highlights the problem.
Microsoft is ramping up Windows 10 security features, using cloud intelligence to better detect and respond to attacks. Here's how it could help your enterprise.
The Shadow Brokers has sent out its first round of exploits and data as part of a recently announced monthly subscription service, and the group claims it has a significant number of subscribers.
7 hours ago 123-reg resolves secure database access snafuThe Register View Synopsis+1
Catches up with https everywhere memo
UK-based hosting and domains provider firm 123-reg has fixed an issue that meant access to some customers' databases ran over an unsecured link, creating a privacy risk in the process.
TNT Express systems blown up by, er, yeah, you get the idea
FedEx has suspended trading of its shares on the New York stock exchange after admitting that its subsidiary TNT Express has been hit by "an information system virus."
A panel of experts at the Global Cybersecurity Summit in Kiev, Ukraine discuss where to allocate the billions of dollars spent towards cybersecurity.
43 minutes ago Watchdog Agency: Many VA Security Weaknesses PersistInfoRiskToday View Synopsis+1
Among the Concerns: Making Sure All Devices 'Authorized'A watchdog agency's annual security review of the Department of Veterans Affairs, the nation's largest healthcare provider, makes 33 recommendations for how the VA can address a variety of continuing vulnerabilities, but only three of them are new. What are the latest concerns?
For the past few years the International Supercomputing Conference (ISC) has held a vendor showdown. Last week, Dell EMC's Ed Turkel gave the winning presentation for the second of two tracks. This is significant praise from a very technical audience that expects both innovation and execution.
1 hour ago Time For Transportation & Logistics To Up Its Cybersecurity As Hackers Put It On Target ListForbes View Synopsis+1
Transportation and logistics companies are on hackers' radar, based on the recent ransomware attacks that disrupted shipping and ports. The industry, a prime target because of its global, pan-industry nature and increased digitization, needs to make cybersecurity more of a priority moving forward.
2 hours ago Report: Facebook's Content Rules 'Favor Elites And Government' Over Activists, People Of ColorForbes View Synopsis+1
A ProPublica investigation found that the site's methods for managing hate speech come down harder on minority groups than white posters of privilege.
2 hours ago 'Elsa' Tool Allows CIA to Locate Users via Wi-FiSecurityWeek View Synopsis+1
WikiLeaks has published a document detailing "Elsa," a tool allegedly used by the U.S. Central Intelligence Agency (CIA) to track people's locations via their laptop's Wi-Fi.
2 hours ago Most IoT devices are an attack waiting to happen, unless manufacturers update their kernelsTechRepublic View Synopsis+1
The security of IoT devices rests squarely on the shoulders of manufacturers. Jack Wallen explains and offers up the one solution that could go a long way to securing IoT.
Malicious Code Moves Laterally, Can Infect Fully Patched Windows PCsMalware known as NotPetya, SortaPetya or GoldenEye continues to spread globally, infecting endpoints via leaked Equation Group exploits as well as built-in Windows tools. Here's a roundup of what we know about the supposed ransomware and its spread so far.
Core Security's advisory reveals a number of dangerous vulnerabilities in the antivirus server solution.
A day on from from the initial reports of the ransomware attack, there are a number of different estimates of how many organisations have been infected.
5 hours ago When two worlds collideIT Toolbox Blogs View Synopsis+1
If any changes you make could potentially result in raw sewage being spilled into the water supply, you tend to be very, very cautious about making changes.
5 hours ago SAP tools for forecastingIT Toolbox Blogs View Synopsis+1
When the wheels fall off the forecast process it is usually because some process elements are not very mature or broken.
Unpatched Windows machines are getting hammered again by a new ransomware attacker.