Wednesday , 24 May 2017
Home >> T >> Threats and Risks

Threats and Risks

NAND peep conflict can hurtful SSD data

Researchers have unclosed a means of guileful a information on SSDs in an conflict suggestive of a Rowhammer effect that targets RAM. The conflict overcomes trustworthiness measures used to safeguard a firmness of information when it is created to a SSD, they warn. “When a peep dungeon is programmed, a high voltage is practical to a cell. Due to parasitic ... Read More »

Security experts strike out during Google over refusal to patch Android confidence smirch exploited by ransomware

Google has been criticised by confidence experts for unwell to take movement on a confidence smirch behind three-quarters of a ransomware on a Android platform. The confidence flaw, highlighted by Check Point Software in a news final week, was introduced with Android Marshmallow, introduced in Oct 2015. The permissioning smirch enables enemy to arrangement an app over a user’s device, ... Read More »

How does a GDPR impact storage?

“[The] GDPR could be described as anything between a logical evolution and a privacy earthquake“, according to a new white paper from IBM, that examines how a new law is expected to affect storage systems and information government software. Two collection of a GDPR directly impact storage: Encryption of processed personal data; and Copy information management, or tranquil information chain and earthy duplicate tracking. ... Read More »

What is a ‘WCry’ or ‘WanaCrypt0r’ ransomware?

When first reports began to emerge on Friday 12 May that IT systems during a East and North Hertfordshire NHS had left down in a suspected ransomware attack, it didn’t come as too many of a surprise: a NHS is a unchanging aim for ransomware, it seems, not slightest because of a series of Windows XP PCs that are still ... Read More »

Microsoft May Patch Tuesday faces down 3 zero-day exploits, though is it too little, too late?

Microsoft’s May Patch Tuesday recover is seeking to block 3 zero-day vulnerabilities in Office apartment and Windows itself, dual of that are already famous to be exploited by hazard actors APT28 and Turl, as good as another different rapist group. Two of a exploits – namely CVE-2017-0261 and CVE-2017-0262 – are remote formula execution (RCE) bugs that a effective in ... Read More »

New proposals for encryption ‘back doors’ designed by UK supervision in prolongation to internet surveillance

The British supervision is heading a tip conference over skeleton to effectively outlaw end-to-end encryption and extend web surveillance. The conference was begun in Jan with usually a handful of a biggest internet use providers and telecoms companies and exhibit how a supervision intends to enforce them to yield it with real-time entrance to a communications of adult to 10,000 ... Read More »

Seven truths about network security

Big Data IoT Excellence Awards Computing’s Big Data IoT Excellence Awards, code new for 2017, applaud a achievements of a IT industry’s best large information and IoT companies, solutions, products and personalities. Date: 17 May 2017 London Read More »

‘Beautiful’ NSA hacking apparatus DoublePulsar infects roughly 200,000 Windows PCs

Tools presumably grown by a US National Security Agency (NSA) leaked early this month by a Shadow Brokers hacking organisation are being used in attacks on Windows PCs. The tools, expelled to a open-source developer website Github, have been gratefully scooped adult by malware writers of varying levels of competency and pimped around phishing emails opposite a internet.  And researchers ... Read More »

Chrome, Firefox and Opera all exposed to phishing flaw

Big Data IoT Excellence Awards Computing’s Big Data IoT Excellence Awards, code new for 2017, applaud a achievements of a IT industry’s best large information and IoT companies, solutions, products and personalities. Date: 17 May 2017 London Read More »

Why encryption has turn a boardroom issue

Big Data IoT Excellence Awards Computing’s Big Data IoT Excellence Awards, code new for 2017, applaud a achievements of a IT industry’s best large information and IoT companies, solutions, products and personalities. Date: 17 May 2017 London Read More »