<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Security trends 2017</title>
	<atom:link href="http://www.epanorama.net/blog/2016/12/26/security-trends-2017/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2016/12/26/security-trends-2017/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Fri, 17 Apr 2026 22:58:49 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Robbin Bustard</title>
		<link>https://www.epanorama.net/blog/2016/12/26/security-trends-2017/comment-page-64/#comment-1652760</link>
		<dc:creator><![CDATA[Robbin Bustard]]></dc:creator>
		<pubDate>Wed, 25 Sep 2019 13:04:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=47933#comment-1652760</guid>
		<description><![CDATA[Definitely, what a great website and educative posts,
I will bookmark your site.All the Best!]]></description>
		<content:encoded><![CDATA[<p>Definitely, what a great website and educative posts,<br />
I will bookmark your site.All the Best!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Engine Sensors</title>
		<link>https://www.epanorama.net/blog/2016/12/26/security-trends-2017/comment-page-63/#comment-1596642</link>
		<dc:creator><![CDATA[Engine Sensors]]></dc:creator>
		<pubDate>Sun, 08 Jul 2018 15:56:32 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=47933#comment-1596642</guid>
		<description><![CDATA[Thanks for the good writeup. It in truth was a entertainment account it.
Look complex to far brought agreeable from you! However, how could we be in contact?]]></description>
		<content:encoded><![CDATA[<p>Thanks for the good writeup. It in truth was a entertainment account it.<br />
Look complex to far brought agreeable from you! However, how could we be in contact?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/12/26/security-trends-2017/comment-page-63/#comment-1581220</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 08 Feb 2018 15:05:07 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=47933#comment-1581220</guid>
		<description><![CDATA[Google Paid $2.9 Million in Vulnerability Rewards in 2017
http://www.securityweek.com/google-paid-29-million-vulnerability-rewards-2017

Google paid nearly $3 million to security researchers in 2017 who reported valid vulnerabilities in its products.

The internet giant said that it paid out $1.1 million in rewards for vulnerabilities discovered in Google products, and roughly the same amount to the researchers who reported security bugs in Android. With the bug bounties awarded for Chrome flaws added to the mix, a total of $2.9 million was paid throughout the year.

In the seven years since Google’s Vulnerability Reward Program was launched, the search giant has paid almost $12 million in rewards.

Last year, 274 researchers received rewards for their vulnerability reports, and a total of 1,230 individual rewards were paid, Google says.]]></description>
		<content:encoded><![CDATA[<p>Google Paid $2.9 Million in Vulnerability Rewards in 2017<br />
<a href="http://www.securityweek.com/google-paid-29-million-vulnerability-rewards-2017" rel="nofollow">http://www.securityweek.com/google-paid-29-million-vulnerability-rewards-2017</a></p>
<p>Google paid nearly $3 million to security researchers in 2017 who reported valid vulnerabilities in its products.</p>
<p>The internet giant said that it paid out $1.1 million in rewards for vulnerabilities discovered in Google products, and roughly the same amount to the researchers who reported security bugs in Android. With the bug bounties awarded for Chrome flaws added to the mix, a total of $2.9 million was paid throughout the year.</p>
<p>In the seven years since Google’s Vulnerability Reward Program was launched, the search giant has paid almost $12 million in rewards.</p>
<p>Last year, 274 researchers received rewards for their vulnerability reports, and a total of 1,230 individual rewards were paid, Google says.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/12/26/security-trends-2017/comment-page-63/#comment-1578560</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 18 Jan 2018 14:54:14 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=47933#comment-1578560</guid>
		<description><![CDATA[North Korea linked to new cryptocurrency attacks
http://money.cnn.com/2018/01/17/technology/north-korea-cryptocurrency-attacks/

North Korea-linked hackers targeted cryptocurrency investors and exchanges just as bitcoin started to soar to record highs, according to a new report.

Cybersecurity firm Recorded Future said malware used in the attacks was similar to that used in the Sony Pictures hack, the global WannaCry ransomware attack and the major cyberheist that hit Bangladesh&#039;s central bank. 

North Korea Targeted South Korean Cryptocurrency Users and Exchange in Late 2017 Campaign
https://www.recordedfuture.com/north-korea-cryptocurrency-campaign/]]></description>
		<content:encoded><![CDATA[<p>North Korea linked to new cryptocurrency attacks<br />
<a href="http://money.cnn.com/2018/01/17/technology/north-korea-cryptocurrency-attacks/" rel="nofollow">http://money.cnn.com/2018/01/17/technology/north-korea-cryptocurrency-attacks/</a></p>
<p>North Korea-linked hackers targeted cryptocurrency investors and exchanges just as bitcoin started to soar to record highs, according to a new report.</p>
<p>Cybersecurity firm Recorded Future said malware used in the attacks was similar to that used in the Sony Pictures hack, the global WannaCry ransomware attack and the major cyberheist that hit Bangladesh&#8217;s central bank. </p>
<p>North Korea Targeted South Korean Cryptocurrency Users and Exchange in Late 2017 Campaign<br />
<a href="https://www.recordedfuture.com/north-korea-cryptocurrency-campaign/" rel="nofollow">https://www.recordedfuture.com/north-korea-cryptocurrency-campaign/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/12/26/security-trends-2017/comment-page-63/#comment-1578118</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 15 Jan 2018 13:04:01 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=47933#comment-1578118</guid>
		<description><![CDATA[CRUNCH NETWORK
The state of Israel’s cybersecurity market
https://techcrunch.com/2018/01/14/the-state-of-israels-cybersecurity-market/?ncid=rss&amp;utm_source=tcfbpage&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29&amp;utm_content=FaceBook&amp;sr_share=facebook

The Equifax breach, WannaCry, NotPetya, the NSA leak, and many more cyber incidents – 2017 was certainly a busy year for hackers, illustrating yet again just how vital innovative cybersecurity solutions are in the fight against cyber threats.

Second only to the U.S., in terms of cybersecurity investment 2017 was another excellent year for Israeli cybersecurity startups]]></description>
		<content:encoded><![CDATA[<p>CRUNCH NETWORK<br />
The state of Israel’s cybersecurity market<br />
<a href="https://techcrunch.com/2018/01/14/the-state-of-israels-cybersecurity-market/?ncid=rss&#038;utm_source=tcfbpage&#038;utm_medium=feed&#038;utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29&#038;utm_content=FaceBook&#038;sr_share=facebook" rel="nofollow">https://techcrunch.com/2018/01/14/the-state-of-israels-cybersecurity-market/?ncid=rss&#038;utm_source=tcfbpage&#038;utm_medium=feed&#038;utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29&#038;utm_content=FaceBook&#038;sr_share=facebook</a></p>
<p>The Equifax breach, WannaCry, NotPetya, the NSA leak, and many more cyber incidents – 2017 was certainly a busy year for hackers, illustrating yet again just how vital innovative cybersecurity solutions are in the fight against cyber threats.</p>
<p>Second only to the U.S., in terms of cybersecurity investment 2017 was another excellent year for Israeli cybersecurity startups</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/12/26/security-trends-2017/comment-page-63/#comment-1578101</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 15 Jan 2018 11:48:13 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=47933#comment-1578101</guid>
		<description><![CDATA[Facebook Paid $880,000 in Bug Bounties in 2017
http://www.securityweek.com/facebook-paid-880000-bug-bounties-2017

Facebook received over 12,000 vulnerability submissions in 2017 and ended up paying $880,000 in bug bounties to security researchers.

Of the large number of received submissions, however, just over 400 reports were found valid during the bug bounty program’s sixth year. Last year, Facebook also paid larger bounties to the submitting researchers, as the average reward per submission increased to almost $1,900, up from $1,675 in 2016.]]></description>
		<content:encoded><![CDATA[<p>Facebook Paid $880,000 in Bug Bounties in 2017<br />
<a href="http://www.securityweek.com/facebook-paid-880000-bug-bounties-2017" rel="nofollow">http://www.securityweek.com/facebook-paid-880000-bug-bounties-2017</a></p>
<p>Facebook received over 12,000 vulnerability submissions in 2017 and ended up paying $880,000 in bug bounties to security researchers.</p>
<p>Of the large number of received submissions, however, just over 400 reports were found valid during the bug bounty program’s sixth year. Last year, Facebook also paid larger bounties to the submitting researchers, as the average reward per submission increased to almost $1,900, up from $1,675 in 2016.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/12/26/security-trends-2017/comment-page-63/#comment-1577394</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 10 Jan 2018 14:53:40 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=47933#comment-1577394</guid>
		<description><![CDATA[It is so weird – bitcoin price jumped sky-high since May….June 2017 when information about Intel Management Engine and Speculative Fetch/Execution/cache modifiers started to surface – at the same time with first coordinated ransomware cyber-attacks.]]></description>
		<content:encoded><![CDATA[<p>It is so weird – bitcoin price jumped sky-high since May….June 2017 when information about Intel Management Engine and Speculative Fetch/Execution/cache modifiers started to surface – at the same time with first coordinated ransomware cyber-attacks.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/12/26/security-trends-2017/comment-page-63/#comment-1576812</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 07 Jan 2018 10:46:24 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=47933#comment-1576812</guid>
		<description><![CDATA[For a thing like meltdown the real foundation was laid with the work on cache side channels sometime back around 2005. THere are many papers from this time

Border Agents’ Searches of Travelers’ Phones Skyrocketed, Agency Says
Customs and Border Protection also unveils new policy for searching and seizing electronic devices
https://www.wsj.com/articles/border-agents-searches-of-travelers-phones-skyrocketed-agency-says-1515179058]]></description>
		<content:encoded><![CDATA[<p>For a thing like meltdown the real foundation was laid with the work on cache side channels sometime back around 2005. THere are many papers from this time</p>
<p>Border Agents’ Searches of Travelers’ Phones Skyrocketed, Agency Says<br />
Customs and Border Protection also unveils new policy for searching and seizing electronic devices<br />
<a href="https://www.wsj.com/articles/border-agents-searches-of-travelers-phones-skyrocketed-agency-says-1515179058" rel="nofollow">https://www.wsj.com/articles/border-agents-searches-of-travelers-phones-skyrocketed-agency-says-1515179058</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/12/26/security-trends-2017/comment-page-63/#comment-1576207</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 03 Jan 2018 10:11:13 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=47933#comment-1576207</guid>
		<description><![CDATA[Necurs Botnet Fuels Massive Year-End Ransomware Attacks
http://www.securityweek.com/necurs-botnet-fuels-massive-year-end-ransomware-attacks

The Necurs botnet started 2017 with a four-month vacation, but ended the year sending tens of millions of spam emails daily as part of massive ransomware distribution campaigns.]]></description>
		<content:encoded><![CDATA[<p>Necurs Botnet Fuels Massive Year-End Ransomware Attacks<br />
<a href="http://www.securityweek.com/necurs-botnet-fuels-massive-year-end-ransomware-attacks" rel="nofollow">http://www.securityweek.com/necurs-botnet-fuels-massive-year-end-ransomware-attacks</a></p>
<p>The Necurs botnet started 2017 with a four-month vacation, but ended the year sending tens of millions of spam emails daily as part of massive ransomware distribution campaigns.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/12/26/security-trends-2017/comment-page-63/#comment-1576161</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 02 Jan 2018 12:41:28 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=47933#comment-1576161</guid>
		<description><![CDATA[Los Angeles man arrested in ‘swatting’ call that preceded fatal police shooting in Kansas
https://www.nbcnews.com/news/us-news/police-arrest-man-suspected-swatting-preceded-deadly-police-shooting-n833576



Los Angeles police arrested a 25-year-old man in a suspected &quot;swatting&quot; hoax 911 call in Kansas that ended in the fatal police shooting of an unarmed man.

The LAPD took Tyler Barriss of Los Angeles into custody in that city on Friday afternoon, on a fugitive warrant stemming from the Thursday evening incident in Kansas, a spokesman for the Los Angeles Police Department said.

Police in Wichita fatally shot a man identified by family members as Andrew Finch, 28, after officers responded to a hoax 911 call, police in Kansas said. 

Barriss allegedly made the false report after getting into some kind of dispute with another person in connection with online gaming

But instead the address was for the home of Finch, who was not involved in the dispute, the sources said. 

The caller claimed his father had been shot in the head, and that he was holding his mother and a sibling at gunpoint

&quot;What gives the cops the right to open fire?&quot; she asked. &quot;That cop murdered my son over a false report in the first place.&quot; 

Dexerto, an online news service focused on gaming, reported that the series of events began with an online argument over a $1 or $2 wager in a &quot;Call of Duty&quot; game on UMG Gaming,

The FBI estimates that roughly 400 cases of swatting occur annually, with some using caller ID spoofing to disguise their number.]]></description>
		<content:encoded><![CDATA[<p>Los Angeles man arrested in ‘swatting’ call that preceded fatal police shooting in Kansas<br />
<a href="https://www.nbcnews.com/news/us-news/police-arrest-man-suspected-swatting-preceded-deadly-police-shooting-n833576" rel="nofollow">https://www.nbcnews.com/news/us-news/police-arrest-man-suspected-swatting-preceded-deadly-police-shooting-n833576</a></p>
<p>Los Angeles police arrested a 25-year-old man in a suspected &#8220;swatting&#8221; hoax 911 call in Kansas that ended in the fatal police shooting of an unarmed man.</p>
<p>The LAPD took Tyler Barriss of Los Angeles into custody in that city on Friday afternoon, on a fugitive warrant stemming from the Thursday evening incident in Kansas, a spokesman for the Los Angeles Police Department said.</p>
<p>Police in Wichita fatally shot a man identified by family members as Andrew Finch, 28, after officers responded to a hoax 911 call, police in Kansas said. </p>
<p>Barriss allegedly made the false report after getting into some kind of dispute with another person in connection with online gaming</p>
<p>But instead the address was for the home of Finch, who was not involved in the dispute, the sources said. </p>
<p>The caller claimed his father had been shot in the head, and that he was holding his mother and a sibling at gunpoint</p>
<p>&#8220;What gives the cops the right to open fire?&#8221; she asked. &#8220;That cop murdered my son over a false report in the first place.&#8221; </p>
<p>Dexerto, an online news service focused on gaming, reported that the series of events began with an online argument over a $1 or $2 wager in a &#8220;Call of Duty&#8221; game on UMG Gaming,</p>
<p>The FBI estimates that roughly 400 cases of swatting occur annually, with some using caller ID spoofing to disguise their number.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
