Security

11 Things the Health Care Sector Must Do to Improve Cybersecurity

https://hbr.org/2017/06/11-things-the-health-care-sector-must-do-to-improve-cybersecurity No industry or sector is immune to hacking. That reality was made painfully clear in mid-May, when a cyberattacker using WannaCry ransomware crippled health care institutions and many other kinds of organizations around the world. In 2015 over 113 million Americans health records were exposed, and in 2016 the number was over 16 million. Experian predicted that the

Industrial IoT seminar – Nohau Solutions

I visited today NOHAU seminar on industrial IoT and security related to it. The seminar content was in mixed Finnish and English language: Seminaari: Varaudu kyberhyökkäyksiin – Miten liität sulautetun laitteen turvallisesti internettiin? http://nohau.fi/events/hyodynna-ja-hallitse-teollinen-internet/ Ohjelma: 8.30   Aamupala ja rekisteröinti (breakfast and registration) 8:45   Tervetuloa – Nohau (wellcome) 9:00   Teollisen internetin businessmahdollisuudet, Jukka Nurmi, Director, IoT

TOR Anonymity: Things Not To Do While Using TOR

https://fossbytes.com/tor-anonymity-things-not-using-tor/ Being Anonymous online is the need of the hour, and TOR browser does that job quite efficiently and honestly. But there are some things that you need to keep in mind so that you don’t blow your anonymity cover while using the TOR network.

How to Write a Secure Code in C/C++ Programming Languages

https://pentestmag.com/write-secure-code-cc-programming-languages/ Secure coding in C/C++ programming languages is a big deal. The two languages, which are commonly used in a multitude of applications and operating systems, are popular, flexible, and versatile – and often vulnerable to exploitation. Sometimes the solution is to code using a safer language like Java. However, this is not always the

EU security think tank ENISA looks for IoT security, can’t find any • The Register

http://www.theregister.co.uk/2017/05/23/enisa_proposes_internet_of_things_security_standards/ European network and infosec agency ENISA has taken a look at Internet of Things security, and doesn’t much like what it sees. So it’s mulling a vendor’s nightmare that the US and UK dared not approach: security regulation – at least the minimal regulation of testing and certification. IoT security needs bottom-to-top baseline requirements,

The Future of Ransomware – Schneier on Security

https://www.schneier.com/blog/archives/2017/05/the_future_of_r.html Ransomware isn’t new, but it’s increasingly popular and profitable. The lessons for users are obvious: Keep your system patches up to date and regularly backup your data. This isn’t just good advice to defend against ransomware, but good advice in general.  But it’s becoming obsolete. Needed solutions aren’t easy and they’re not pretty. The

It’s not just Windows anymore: Samba has a major SMB bug | ZDNet

http://www.zdnet.com/article/its-not-just-windows-anymore-samba-has-a-major-smb-bug/ The other week, Microsoft got its security teeth kicked in when an old SMB security hole was exploited by the WannaCry ransomware attack. This week, it’s the turn of Samba, the popular open-source SMB server. Like the WannaCry security hole, the good news is the Samba file-sharing bug has already been fixed. The bad news is you

Fight ransomware: Run Windows in Linux as a virtual machine

http://www.pcworld.com/article/3197628/linux/fight-ransomware-by-running-windows-in-linux-as-a-virtual-machine.html Running Windows as a virtual machine in Linux may seems like unnecessary work until something like the Wannacry ransomware scare comes along.  Despite its headaches, desktop Linux rarely is the target of malware. (When it is, it can generally present a smaller attack surface.)  And if you need to run applications in Windows, run

Arrow IoT Summit to 18.5.2017

http://iotsummit.fi/ Arrow Electronics today organized a IoT Summit event focusing on the Internet in Helsinki. According to Andrew Bickley, who is responsible for marketing the company’s IoT solutions in Europe, IoT is moving from management speeches to implementation. And usually, customers need ready-made solutions. – companies that develop IoT-based services that do not understand the