Gartner Top Technologies for Security in 2017

Gartner Top Technologies for Security in 2017
How EDR, remote browsers, and cloud security will shape the next year of cybersecurity.
July 5, 2017
Contributor: Kasey Panetta


Even Disconnected Computers May Face Cyberthreats

Even Disconnected Computers May Face Cyberthreats
December 04, 2013

If your computer is infected with a virus or other forms of malware, disconnecting the machine from the Internet is one of the first steps security experts say you should take. But someday, even physically separating your laptop from a network may not be enough to protect it from cyber evildoers.

German computer scientists have come up with a prototype for building “covert channels” between computers using the machines’ speakers and microphones, potentially defeating high-security measures that rely on placing an “air gap” between computers.

The scientists said their network was based on a system originally designed for underwater communication.

“We adapt the communication system to implement covert and stealthy communications by utilizing the near ultrasonic frequency range,” Michael Hanspach and Michael Goetz, of the Fraunhofer Institute for Communication, Information Processing and Ergonomics, wrote in a paper published in the November issue of the Journal of Communications.

As Dan Goodin explains in Ars Technica: “The proof-of-concept software — or malicious trojans that adopt the same high-frequency communication methods …

Acoustical networking


Cryptolocker: The evolution of extortion

Cryptolocker: The evolution of extortion
November 19, 2013

The Cryptolocker Trojan is an evolution of “ransomware,” not a revolutionary change from past criminal attempts to extort money from PC owners, a security expert said today.

Ransomware is a category of malware that, once on a system, encrypts files and then tries to convince users to pay to decrypt them so they can again be opened.
The crimeware has been in active circulation since at least 2005, with traces harking back as far as 1989.

Microsoft malware Protection Center > Ramnit – The renewed bot in town

Microsoft Malware Protection Center > Ramnit – The renewed bot in town
Mar 14, 2013
keep your security products, such as Microsoft Security Essentials, always updated to the latest definitions to avoid infection.

Try It Out: Encrypt Used Space Only
When you encrypt a drive with Windows Vista or Windows 7, BitLocker encrypts every bit of space on the drive, even if it’s not in use.
Windows 8 introduces Used Disk Space Only encryption, which gives you the option to encrypt only space on the drive that is actively being used.

‘New York Times’ The Target Of Chinese Cyber Attack

‘New York Times’ The Target Of Chinese Cyber Attack
January 31, 2013

‘New York Times’ Accuses China Of Being Behind Hacking
January 31, 2013
Chinese computer hackers have been infiltrating the computer systems of The New York Times for the last four months, according to the paper. Renee Montagne talks to Nicole Perlroth, a Times reporter who covers cyber security.

What Version of Java Are You Using?
June 6, 2013: 1.7.0_05

the JavaBeans Bridge for ActiveX! (It’s now part of Java Plug-In.)
Jan 20, 2013

Basic troubleshooting tips for Java issues
Jan 20, 2013

Why The Java Bug Is A Big Deal
Jan 12, 2013

Java: Should it stay or should it go?
Oct. 13, 2010
Without a single update mechanism that works for all software (which will never happen) Windows users will forever be at risk.