<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber Security March 2018</title>
	<atom:link href="http://www.epanorama.net/blog/2018/03/01/cyber-security-march-2018/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2018/03/01/cyber-security-march-2018/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Mon, 20 Apr 2026 04:43:41 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/03/01/cyber-security-march-2018/comment-page-5/#comment-1587101</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 04 Apr 2018 17:35:08 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=176295#comment-1587101</guid>
		<description><![CDATA[It’s begun: ‘First’ IPv6 denial-of-service attack puts IT bods on notice
Internet engineers warn this is only the beginning
https://www.theregister.co.uk/2018/03/03/ipv6_ddos/

Analysis What’s claimed to be the first IPv6-based distributed denial-of-service attack has been spotted by internet engineers who warn it is only the beginning of what could become the next wave of online disruption.

Network guru Wesley George noticed the strange traffic earlier this week as part of a larger attack on a DNS server in an effort to overwhelm it. He was taking packet captures of the malicious traffic as part of his job at Neustar’s SiteProtect DDoS protection service when he realized there were “packets coming from IPv6 addresses to an IPv6 host.”

Computers behind 1,900 IPv6 addresses were attacking the DNS server as part of a larger army of commandeered systems, mostly using IPv4 addresses on the public internet. Anyone running an IPv6 network needs to, therefore, ensure they have the same level of network security and mitigation tools in place as their IPv4 networks – and fast.]]></description>
		<content:encoded><![CDATA[<p>It’s begun: ‘First’ IPv6 denial-of-service attack puts IT bods on notice<br />
Internet engineers warn this is only the beginning<br />
<a href="https://www.theregister.co.uk/2018/03/03/ipv6_ddos/" rel="nofollow">https://www.theregister.co.uk/2018/03/03/ipv6_ddos/</a></p>
<p>Analysis What’s claimed to be the first IPv6-based distributed denial-of-service attack has been spotted by internet engineers who warn it is only the beginning of what could become the next wave of online disruption.</p>
<p>Network guru Wesley George noticed the strange traffic earlier this week as part of a larger attack on a DNS server in an effort to overwhelm it. He was taking packet captures of the malicious traffic as part of his job at Neustar’s SiteProtect DDoS protection service when he realized there were “packets coming from IPv6 addresses to an IPv6 host.”</p>
<p>Computers behind 1,900 IPv6 addresses were attacking the DNS server as part of a larger army of commandeered systems, mostly using IPv4 addresses on the public internet. Anyone running an IPv6 network needs to, therefore, ensure they have the same level of network security and mitigation tools in place as their IPv4 networks – and fast.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/03/01/cyber-security-march-2018/comment-page-5/#comment-1586890</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 03 Apr 2018 09:18:58 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=176295#comment-1586890</guid>
		<description><![CDATA[Facebook Details Election Security Improvements
https://www.securityweek.com/facebook-details-election-security-improvements]]></description>
		<content:encoded><![CDATA[<p>Facebook Details Election Security Improvements<br />
<a href="https://www.securityweek.com/facebook-details-election-security-improvements" rel="nofollow">https://www.securityweek.com/facebook-details-election-security-improvements</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/03/01/cyber-security-march-2018/comment-page-5/#comment-1586887</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 03 Apr 2018 09:13:31 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=176295#comment-1586887</guid>
		<description><![CDATA[Microsoft Fixes Windows Flaw Introduced by Meltdown Patches
https://www.securityweek.com/microsoft-fixes-windows-flaw-introduced-meltdown-patch

Microsoft has released out-of-band updates for Windows 7 and Windows Server 2008 R2 to address a serious privilege escalation vulnerability introduced earlier this year by the Meltdown mitigations.

Microsoft informed customers on Thursday that a new patch has been released for Windows 7 x64 Service Pack 1 and Windows Server 2008 R2 x64 Service Pack 1 to fully resolve the problem. “Customers who apply the updates, or have automatic updates enabled, are protected.” a Microsoft spokesperson said.

The vulnerability, tracked as CVE-2018-1038 and rated “important,” has been patched with the KB4100480 update. Users are advised to install the update as soon as possible, particularly since some Microsoft employees believe it will likely be exploited in the wild soon.]]></description>
		<content:encoded><![CDATA[<p>Microsoft Fixes Windows Flaw Introduced by Meltdown Patches<br />
<a href="https://www.securityweek.com/microsoft-fixes-windows-flaw-introduced-meltdown-patch" rel="nofollow">https://www.securityweek.com/microsoft-fixes-windows-flaw-introduced-meltdown-patch</a></p>
<p>Microsoft has released out-of-band updates for Windows 7 and Windows Server 2008 R2 to address a serious privilege escalation vulnerability introduced earlier this year by the Meltdown mitigations.</p>
<p>Microsoft informed customers on Thursday that a new patch has been released for Windows 7 x64 Service Pack 1 and Windows Server 2008 R2 x64 Service Pack 1 to fully resolve the problem. “Customers who apply the updates, or have automatic updates enabled, are protected.” a Microsoft spokesperson said.</p>
<p>The vulnerability, tracked as CVE-2018-1038 and rated “important,” has been patched with the KB4100480 update. Users are advised to install the update as soon as possible, particularly since some Microsoft employees believe it will likely be exploited in the wild soon.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/03/01/cyber-security-march-2018/comment-page-5/#comment-1586886</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 03 Apr 2018 09:12:25 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=176295#comment-1586886</guid>
		<description><![CDATA[Critical Flaw Exposes Many Cisco Devices to Remote Attacks
https://www.securityweek.com/critical-flaw-exposes-many-cisco-devices-remote-attacks

Cisco has patched more than 30 vulnerabilities in its IOS software, including a critical remote code execution flaw that exposes hundreds of thousands – possibly millions – of devices to remote attacks launched over the Internet.

A total of three vulnerabilities have been rated critical. One of them is CVE-2018-0171, an issue discovered by researchers at Embedi in the Smart Install feature in IOS and IOS XE software.

An unauthenticated attacker can send specially crafted Smart Install messages to an affected device on TCP port 4786 and cause it to enter a denial-of-service (DoS) condition or execute arbitrary code.]]></description>
		<content:encoded><![CDATA[<p>Critical Flaw Exposes Many Cisco Devices to Remote Attacks<br />
<a href="https://www.securityweek.com/critical-flaw-exposes-many-cisco-devices-remote-attacks" rel="nofollow">https://www.securityweek.com/critical-flaw-exposes-many-cisco-devices-remote-attacks</a></p>
<p>Cisco has patched more than 30 vulnerabilities in its IOS software, including a critical remote code execution flaw that exposes hundreds of thousands – possibly millions – of devices to remote attacks launched over the Internet.</p>
<p>A total of three vulnerabilities have been rated critical. One of them is CVE-2018-0171, an issue discovered by researchers at Embedi in the Smart Install feature in IOS and IOS XE software.</p>
<p>An unauthenticated attacker can send specially crafted Smart Install messages to an affected device on TCP port 4786 and cause it to enter a denial-of-service (DoS) condition or execute arbitrary code.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/03/01/cyber-security-march-2018/comment-page-5/#comment-1586885</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 03 Apr 2018 09:12:06 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=176295#comment-1586885</guid>
		<description><![CDATA[20 Arrested in Italy and Romania for Spear Phishing Scam
https://www.securityweek.com/20-arrested-italy-and-romania-spear-phishing-scam

Authorities this week arrested 20 individuals in Italy and Romania for their role in a banking phishing scam that defrauded bank customers of €1 million ($1.23 million).

The arrests were the result of a two-year long cybercrime investigation conducted by the Romanian National Police and the Italian National Police, with support from Europol, the Joint Cybercrime Action Taskforce (J-CAT), and Eurojust.

The arrests were made on March 28, following a series of coordinated raids. 9 of the individuals were arrested in Romania and 11 in Italy. The Romanian Police raided 3 houses, while the Italian authorities conducted 10 home and computer searches.]]></description>
		<content:encoded><![CDATA[<p>20 Arrested in Italy and Romania for Spear Phishing Scam<br />
<a href="https://www.securityweek.com/20-arrested-italy-and-romania-spear-phishing-scam" rel="nofollow">https://www.securityweek.com/20-arrested-italy-and-romania-spear-phishing-scam</a></p>
<p>Authorities this week arrested 20 individuals in Italy and Romania for their role in a banking phishing scam that defrauded bank customers of €1 million ($1.23 million).</p>
<p>The arrests were the result of a two-year long cybercrime investigation conducted by the Romanian National Police and the Italian National Police, with support from Europol, the Joint Cybercrime Action Taskforce (J-CAT), and Eurojust.</p>
<p>The arrests were made on March 28, following a series of coordinated raids. 9 of the individuals were arrested in Romania and 11 in Italy. The Romanian Police raided 3 houses, while the Italian authorities conducted 10 home and computer searches.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/03/01/cyber-security-march-2018/comment-page-5/#comment-1586883</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 03 Apr 2018 09:11:40 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=176295#comment-1586883</guid>
		<description><![CDATA[Apple Patches Dozens of Vulnerabilities Across Product Lines
https://www.securityweek.com/apple-patches-dozens-vulnerabilities-across-product-lines-0]]></description>
		<content:encoded><![CDATA[<p>Apple Patches Dozens of Vulnerabilities Across Product Lines<br />
<a href="https://www.securityweek.com/apple-patches-dozens-vulnerabilities-across-product-lines-0" rel="nofollow">https://www.securityweek.com/apple-patches-dozens-vulnerabilities-across-product-lines-0</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/03/01/cyber-security-march-2018/comment-page-5/#comment-1586818</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Apr 2018 15:05:52 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=176295#comment-1586818</guid>
		<description><![CDATA[Tom Pendergast / Wired: 	
GDPR in the EU and similar laws in other countries, along with Facebook/Cambridge Analytica scandal, may point to global shift in favor of personal data control  —  THE HEADLINES ABOUT the trade wars being touched off by President Trump&#039;s new tariffs may telegraph plenty of bombast and shots fired … 

The Next Cold War Is Here, and It&#039;s All About Data
https://www.wired.com/story/opinion-new-data-cold-war

The headlines about the trade wars being touched off by President Trump’s new tariffs may telegraph plenty of bombast and shots fired, but the most consequential war being waged today is a quieter sort of conflict: It’s the new Cold War over data protection. While the Facebook/Cambridge Analytica crisis currently burns as the latest, hottest flare-up in this simmering conflict, tensions may increase even more on May 25, 2018, when the European Union’s General Data Protection Regulation comes into effect.]]></description>
		<content:encoded><![CDATA[<p>Tom Pendergast / Wired:<br />
GDPR in the EU and similar laws in other countries, along with Facebook/Cambridge Analytica scandal, may point to global shift in favor of personal data control  —  THE HEADLINES ABOUT the trade wars being touched off by President Trump&#8217;s new tariffs may telegraph plenty of bombast and shots fired … </p>
<p>The Next Cold War Is Here, and It&#8217;s All About Data<br />
<a href="https://www.wired.com/story/opinion-new-data-cold-war" rel="nofollow">https://www.wired.com/story/opinion-new-data-cold-war</a></p>
<p>The headlines about the trade wars being touched off by President Trump’s new tariffs may telegraph plenty of bombast and shots fired, but the most consequential war being waged today is a quieter sort of conflict: It’s the new Cold War over data protection. While the Facebook/Cambridge Analytica crisis currently burns as the latest, hottest flare-up in this simmering conflict, tensions may increase even more on May 25, 2018, when the European Union’s General Data Protection Regulation comes into effect.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/03/01/cyber-security-march-2018/comment-page-5/#comment-1586738</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 31 Mar 2018 16:42:53 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=176295#comment-1586738</guid>
		<description><![CDATA[Veriff wants to make it simple to present identification online
https://techcrunch.com/2018/03/30/veriff-wants-to-make-it-simple-to-present-identification-online/?utm_source=tcfbpage&amp;sr_share=facebook

Whenever you are doing something online that requires you to present an official ID like a passport or driver’s license to complete the transaction, it presents risk to both parties. 

Kaarel Kotkas, CEO and founder of the company, says the goal is to be “the Stripe of identity .” What he means is he wants to provide developers with the ability to embed identity verification into any application or website, as easily as you can use Stripe to add payments.]]></description>
		<content:encoded><![CDATA[<p>Veriff wants to make it simple to present identification online<br />
<a href="https://techcrunch.com/2018/03/30/veriff-wants-to-make-it-simple-to-present-identification-online/?utm_source=tcfbpage&#038;sr_share=facebook" rel="nofollow">https://techcrunch.com/2018/03/30/veriff-wants-to-make-it-simple-to-present-identification-online/?utm_source=tcfbpage&#038;sr_share=facebook</a></p>
<p>Whenever you are doing something online that requires you to present an official ID like a passport or driver’s license to complete the transaction, it presents risk to both parties. </p>
<p>Kaarel Kotkas, CEO and founder of the company, says the goal is to be “the Stripe of identity .” What he means is he wants to provide developers with the ability to embed identity verification into any application or website, as easily as you can use Stripe to add payments.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/03/01/cyber-security-march-2018/comment-page-5/#comment-1586737</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 31 Mar 2018 16:41:30 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=176295#comment-1586737</guid>
		<description><![CDATA[As marketing data proliferates, consumers should have more control
https://techcrunch.com/2018/03/30/as-marketing-data-proliferates-consumers-should-have-more-control/?sr_share=facebook&amp;utm_source=tcfbpage

At the Adobe Summit in Las Vegas this week, privacy was on the minds of many people. It was no wonder with social media data abuse dominating the headlines, GDPR just around the corner, and Adobe announcing the concept of a centralized customer experience record.

With so many high profile breaches in recent years, putting your customer data in a central record-keeping system would seem to be a dangerous proposition, yet Adobe sees so many positives for marketers, it likely believes this to be a worthy trade-off.]]></description>
		<content:encoded><![CDATA[<p>As marketing data proliferates, consumers should have more control<br />
<a href="https://techcrunch.com/2018/03/30/as-marketing-data-proliferates-consumers-should-have-more-control/?sr_share=facebook&#038;utm_source=tcfbpage" rel="nofollow">https://techcrunch.com/2018/03/30/as-marketing-data-proliferates-consumers-should-have-more-control/?sr_share=facebook&#038;utm_source=tcfbpage</a></p>
<p>At the Adobe Summit in Las Vegas this week, privacy was on the minds of many people. It was no wonder with social media data abuse dominating the headlines, GDPR just around the corner, and Adobe announcing the concept of a centralized customer experience record.</p>
<p>With so many high profile breaches in recent years, putting your customer data in a central record-keeping system would seem to be a dangerous proposition, yet Adobe sees so many positives for marketers, it likely believes this to be a worthy trade-off.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/03/01/cyber-security-march-2018/comment-page-5/#comment-1586698</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 31 Mar 2018 06:36:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=176295#comment-1586698</guid>
		<description><![CDATA[Brit cloud slinger iomart goes TITSUP, knackers Virgin Trains, Parentpay
Young, hungry and stranded punters pray for resurrection
https://www.theregister.co.uk/2018/03/29/iomart_down/]]></description>
		<content:encoded><![CDATA[<p>Brit cloud slinger iomart goes TITSUP, knackers Virgin Trains, Parentpay<br />
Young, hungry and stranded punters pray for resurrection<br />
<a href="https://www.theregister.co.uk/2018/03/29/iomart_down/" rel="nofollow">https://www.theregister.co.uk/2018/03/29/iomart_down/</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
