German-based ThyssenKrupp, one of the world’s largest steel producers, has announced that it has been the target of a cyber attack. The company said that the attack was a professional endeavour and has been traced back to the Southeast Asian region. The goal of the incursion was to steal technological know-how and research from some areas of the company’s Business Area Industrial Solutions. The attackers also breached the systems of Business Area Steel Europe, but … More
Source: helpnetsecurity

Overreliance on smartphones, both in out personal and professional lives, is a reality for many of us. These devices hold a lot of sensitive information – information that could be worth a lot to some people, especially if you are a high-positioned executive in a thriving business. Researchers from mobile security outfit Skycure have recently analyzed a malicious app they found on an Android 6.0.1 device owned by a VP at a global technology company. … More
Source: helpnetsecurity

It has been said that an ounce of prevention is worth a pound of cure. In the case of disaster recovery, however, businesses tend focus on prevention without anticipating the need for a cure. It may be painful to admit, but disaster in some form is nearly unavoidable, whether due to severe weather, an accident or a data breach. Every good prevention strategy should include a continuity plan for rapid recovery when the inevitable hits. … More
Source: helpnetsecurity

A new type of infrastructure needs to be built that is not just going to reshape business, but also the way people live, according to Gartner. CIOs are the builders of this infrastructure, which Gartner calls the “civilization infrastructure”. Gartner forecasts worldwide IT spending to total $3.4 trillion in 2016, a 0.3 percent decline from last year. In 2017, global IT spending is projected to grow 2.9 percent and reach $3.5 trillion. Analysts said this … More
Source: helpnetsecurity

Microsoft researchers Itay Grady and Tal Be’ery have released Net Cease, a PowerShell script that prevents attackers who have already compromised an endpoint from getting information about other targets within the same corporate network. The idea behind the script is to make attackers’ lateral movement on the network more difficult. Non-admin user gets access denied calling NetSess remotely after Net Cease was deployed on the target machine This type of reconnaissance can be performed by … More
Source: helpnetsecurity

With Windows 10, Microsoft is slowly moving towards removing passwords as the main authentication method for users to log in to their (locked) computers. Windows Hello, the password-free authentication feature that comes with the OS, works by recognizing the users’ face, iris, or fingerprint, but could initially be used only by those that had a supported infrared-illuminated camera (for face and iris recognition), a supported fingerprint reader, or companion devices such as Microsoft Band and … More
Source: helpnetsecurity