Top Cybersecurity News For 25th April 2016

  1. How an email sparked a squabble over Chinese-owned Lenovo’s role at Pentagon. From Washington Post. Ever since Chinese computer maker Lenovo spent billions of dollars to acquire IBM’s personal-computer and server businesses, some lawmakers have called on federal agencies to stop using the company’s equipment out of concerns over Chinese spying. But an email circulated within the Air Force appeared to indicate Lenovo being kicked out.
  2. A Brief History Of Ransomware. From DarkReading. The rise in ransomware extortion as a reliable weapon for cybercriminals to make the most of victims’ system vulnerabilities has now spanned the better part of a decade. But the last year has seen hockey stick growth as attackers perfected their methods and targeted victims. At this point ransomware has established itself as $60 million a year criminal enterprise, with that number sure to rise as the income is funneled into improving the next ransomware generation.

  3. FireEye Threat Intelligence Review. From SC Magazine (2015). This is an extremely powerful system for gathering, analyzing and acting on cyberthreat intelligence. The wealth of available data is impressive and FireEye is an experienced player with a heavy recorded history of data going back 10 years or more. We do wish, however, that this wealth of analytical power was readily available as a standalone service for threat analysts who are not necessarily part of a network defense team.
  4. Interview: Security and scalability of the IoT in business. From ITProPortal.
    We spoke to Klaus Gheri, VP and GM of Network Security at Barracuda Networks about the challenge of securing IoT devices in industry and the tools being developed to overcome IoT barriers to adoption.
  5. Transportation Official: Cybersecurity Rules May Be Needed for Cars.  From MorningConsult. The head of the National Highway Traffic Safety Administration told a House panel Thursday that his agency may need to craft rules to enhance cybersecurity as more vehicles are connected to the internet. “You need some best practices, and potentially rules, to establish certain kinds of hard protections in things,” NHTSA Administrator Michael Rosekind said.



Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s