NPPD cyber and infrastructure security personnel are side by side

MARK ROCKWELL | April 26, 2016

article image
The Department of Homeland Security's cybersecurity center has a new joint threat watch for cyber and infrastructure, said a top DHS cyber official.Phyllis Schneck, deputy undersecretary for cybersecurity and communications at the Department of Homeland Security's National Protection and Program Directorate, said that as of Dec. 15, there is a "joint watch" of physical security and cyber security personnel at the agency's National Cybersecurity & Communications Integration Center, or NCCIC.Schneck said in remarks at a CS&C Dec. 16 Industry Day that the NCCIC now has "infrastructure protection watch personnel sitting with our cyber watch personnel," to provide wider situational awareness of physical and cyber threat information.

Spotlight

Networking4all

Networking4all is a professional and service-oriented supplier of SSL certificates, security scans and other internet security products. Since our foundation in 2000, we have been greatly appreciated by our clients for our personal service, expertise and fast issuance. We provide products and services to more than 100.000 big and small clients from the retail sector, corporate service, ICT, industrial sector, health care, education and government.

OTHER ARTICLES

Malicious coronavirus map hides AZORult info-stealing malware

Article | March 11, 2020

Cyberattackers continue to seize on the dire need for information surrounding the novel coronavirus. In one of the latest examples, adversaries have created a weaponized coronavirus map app that infects victims with a variant of the information-stealing AZORult malware. The malicious online map, found at www.Corona-Virus-Map[.]com, appears very polished and convincing, showing an image of the world that depicts viral outbreaks with red dots of various sizes, depending on the number of infections. The map appears to offer a tally of confirmed cases, total deaths and total recoveries, by country, and cites Johns Hopkins University’s Center for Systems Science and Engineering as its supposed data source. Malwarebytes issued a warning about the map last week, and Reason Cybersecurity this week has followed up with its own blog post, reporting additional details on the scam, gathered by Reason Labs researcher Shai Alfasi.

Read More

New ‘Haken’ Malware Found On Eight Apps In Google Play Store

Article | February 21, 2020

Researchers have identified eight malicious Android apps in the official Google Play marketplace distributing a new malware family. The “Haken” malware exfiltrates sensitive data from victims and covertly signs them up for expensive premium subscription services. The eight apps in question, which have since been removed, had collectively been downloaded 50,000 times. The apps were mostly camera utilities and children’s games, including “Kids Coloring,” “Compass,” “qrcode,” “Fruits coloring book,” “soccer coloring book,” “fruit jump tower,” “ball number shooter” and “Inongdan.” The apps legitimately function as advertised, but in the background covertly perform an array of malicious functions. “Haken has shown clicking capabilities while staying under the radar of Google Play,” said researchers with Check Point Research, in an analysis on Friday. “Even with a relatively low download count of 50,000+, this campaign has shown the ability that malicious actors have to generate revenue from fraudulent advertising campaigns.

Read More

How the IIoT can subdue cyber security challenges met by software adoption

Article | February 25, 2020

Matt Newton, senior portfolio marketing manager at AVEVA, discusses how IIoT can best cyber security challenges met through software adoption. According to Gartner’s 2019 Industrial IoT Platforms Magic Quadrant report, by 2023 30% of industrial enterprises will have full, on-premises deployments of IIoT platforms. IIoT platforms and software adoption is rapidly increasing – up 15% in 2019 – and this will undoubtedly continue to grow as we progress through the new decade. From enhancing operational performance to improved business processes, adopting new technology and software capabilities is vital for business success in today’s industrial sector. However, when it comes to adopting software and technology, integrating new systems with existing legacy systems in the industry can be a challenge.

Read More

Security by Sector: Medical IoT Gets Much Needed Dose of Cybersecurity

Article | February 20, 2020

The subject of how information security impacts different industry sectors is an intriguing one. For example, how does the finance industry fare in terms of information security compared to the health sector, or the entertainment business? Are there some sectors that face greater cyber-threats and risks than others? Do some do a better job of keeping data secure, and if so, how and why? Information security risks and challenges in the healthcare industry are well documented and much maligned. There are several reasons why the healthcare sector is particularly vulnerable, but one of the chief causations is the high amount of connected yet insecure devices commonly used within hospitals, clinics and medical centers. For example, a report from researchers at healthcare cybersecurity company CyberMDX discovered that connected medical devices are twice as likely to be vulnerable to the BlueKeep exploit compared to other devices on hospital networks.

Read More

Spotlight

Networking4all

Networking4all is a professional and service-oriented supplier of SSL certificates, security scans and other internet security products. Since our foundation in 2000, we have been greatly appreciated by our clients for our personal service, expertise and fast issuance. We provide products and services to more than 100.000 big and small clients from the retail sector, corporate service, ICT, industrial sector, health care, education and government.

Events