SECURITY EVANGELIST

Fight against online threats and cyber-crime continues.

This week is clearly dominated by the Charlie Hebdo aftermath and its effects seem to spread in the online world. Though most people try to understand the events and support France, we find an increasing tendency in state politics to take advantage and impose laws for a better control over the digital domain.

Our own security blog provided an extensive article on how you can protect your web-based e-mail address from online criminals.

Our goal is to bring you the latest security news from the digital world. And this is what we do.

These are the 10 security articles of the week that you should read in order to improve your online security.

Security articles of the week

 1. Cyber-Attacks Hit 19,000 French Websites Since Charlie Hebdo Shootings

Charlie Hebdo shooting incidents may be over, but cyber-criminals are not done yet. Several groups with extremist views launched a number of attacks on over 19,000 sites in France and this tendency seems to continue.

2. How Hackers Are Using #JeSuisCharlie To Spread Malware

The incidents in France resulted in a large wave of support for the victims and in a clear message for the freedom of speech. But this campaigns for freedom can be used by cyber-criminals too to spread malicious content.

3. Obama Security Proposals ‘Will Create Cyber Police State’

It is obvious for everybody that cyber-criminal threats and malicious software are no longer the issue of one organization or an individual’s headache. To have a strong defense strategy, we need to involve the state agencies and laws.

4. David Cameron pledges anti-terror law for internet after Paris attacks

A similar demand for further access rights has been issued in the UK. To prevent Paris-style attacks in Britain, the law agencies need to increase their surveillance areas and have more access rights at information now restricted.

5. CryptoWall ransomware is back with new version after two months of silence

A new CryptoWall version is available and it has been improved. This ransomware version uses localization and passes the traffic through a anonymity network called I2P (the Invisible Internet Project). It is distributed through drive-by download attacks that exploit vulnerabilities in the browser. Don’t forget to keep it up-to-date.

6. Rise Of The Machines

Entrepreneur Elon Musk and physicist Stephen Hawking expressed their concerns regarding the increasing evolution of the super-intelligent machines. If we don’t control this evolution, we could be very soon replaced.

7. Employees are still the biggest IT threat

Negligent or careless employees who do not follow security policies are the biggest threat for a big organization. This is what this study suggests. We must not forget there were voices that indicated a possible “inside work” in the massive Sony hacking security breach.

8. Cyber attacks demonstrated on autonomous ground vehicles

Better technology results in a better life. Right? Maybe not, if those technological improvements are used as weapons against other people. Should we point out how social media in the West is used to terrorist interests?

9. Fear Hackers? First invest in an IT security culture change

To quote the article :”Creating a risk-conscious and security-aware culture is key to protecting an organization’s information infrastructure and data assets.” We couldn’t have said it better. We need an attitude change and a mentality shift to stay secure in the near future.

10. Traditional defences not stopping breaches, claims real-world FireEye study

Security analysts from FireEye suggest that Sony is not the only firm to have issues with their security. Traditional security layers, compared to the Second World War ‘Maginot Line’, must be replaced with more specialized solutions that can protect the user against advanced data stealing malware .

 

We are sure there are other important security news out there. So please let us know, what security news did we miss and should have been included here?

This post was originally published by Aurelian Neagu in January 2015.

Leave a Reply

Your email address will not be published. Required fields are marked *

GO TO TOP
148 queries in 0.805 seconds