<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber Security September 2018</title>
	<atom:link href="http://www.epanorama.net/blog/2018/09/01/cyber-security-september-2018/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2018/09/01/cyber-security-september-2018/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Wed, 08 Apr 2026 21:29:52 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/09/01/cyber-security-september-2018/comment-page-10/#comment-1607564</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 08 Oct 2018 17:49:57 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179595#comment-1607564</guid>
		<description><![CDATA[Google’s cyber unit Jigsaw introduces Intra, a new security app dedicated to busting censorship
https://techcrunch.com/2018/10/03/googles-cyber-unit-jigsaw-introduces-intra-a-security-app-dedicated-to-busting-censorship/?sr_share=facebook&amp;utm_source=tcfbpage

Jigsaw, the division owned by Google parent Alphabet, has revealed Intra, a new app aimed at protecting users from state-sponsored censorship.

Intra is a new app that aims to prevent DNS manipulation attacks.

By passing all your browsing queries and app traffic through an encrypted connection to a trusted Domain Name Server, Intra says it ensures you can use your app without meddling or get to the right site without interference.]]></description>
		<content:encoded><![CDATA[<p>Google’s cyber unit Jigsaw introduces Intra, a new security app dedicated to busting censorship<br />
<a href="https://techcrunch.com/2018/10/03/googles-cyber-unit-jigsaw-introduces-intra-a-security-app-dedicated-to-busting-censorship/?sr_share=facebook&#038;utm_source=tcfbpage" rel="nofollow">https://techcrunch.com/2018/10/03/googles-cyber-unit-jigsaw-introduces-intra-a-security-app-dedicated-to-busting-censorship/?sr_share=facebook&#038;utm_source=tcfbpage</a></p>
<p>Jigsaw, the division owned by Google parent Alphabet, has revealed Intra, a new app aimed at protecting users from state-sponsored censorship.</p>
<p>Intra is a new app that aims to prevent DNS manipulation attacks.</p>
<p>By passing all your browsing queries and app traffic through an encrypted connection to a trusted Domain Name Server, Intra says it ensures you can use your app without meddling or get to the right site without interference.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/09/01/cyber-security-september-2018/comment-page-10/#comment-1607519</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 08 Oct 2018 07:17:45 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179595#comment-1607519</guid>
		<description><![CDATA[Ben Fox Rubin / CNET: 	
Amazon says it has fired an employee for sharing users&#039; email addresses with a third-party seller, is working with law enforcement, informing affected customers

Amazon fires employee for allegedly sharing customer email addresses
https://www.cnet.com/news/amazon-fires-employee-for-allegedly-sharing-customer-email-addresses/

The company is working with law enforcement and informing affected]]></description>
		<content:encoded><![CDATA[<p>Ben Fox Rubin / CNET:<br />
Amazon says it has fired an employee for sharing users&#8217; email addresses with a third-party seller, is working with law enforcement, informing affected customers</p>
<p>Amazon fires employee for allegedly sharing customer email addresses<br />
<a href="https://www.cnet.com/news/amazon-fires-employee-for-allegedly-sharing-customer-email-addresses/" rel="nofollow">https://www.cnet.com/news/amazon-fires-employee-for-allegedly-sharing-customer-email-addresses/</a></p>
<p>The company is working with law enforcement and informing affected</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/09/01/cyber-security-september-2018/comment-page-10/#comment-1607517</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 08 Oct 2018 07:15:45 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179595#comment-1607517</guid>
		<description><![CDATA[Adam Janofsky / Wall Street Journal: 	
Advances in AI and years of data gathering related to cyberattacks have made it easier for firms and governments to tie hacks to specific hacking groups  —  AI and sophisticated data gathering are making it easier for firms and governments to attribute hacks in months, not years

Technology Advances Make It Easier to Assign Blame for Cyberattacks
https://www.wsj.com/articles/technology-advances-make-it-easier-to-assign-blame-for-cyberattacks-1538677334

AI and sophisticated data gathering are making it easier for firms and governments to attribute hacks in months, not years

Figuring out who exactly is responsible for a cyberattack is an inexact science, but advances in machine learning and years of data-gathering on hacks are making it easier than ever for law-enforcement officials and cybersecurity specialists to name the likely culprits.]]></description>
		<content:encoded><![CDATA[<p>Adam Janofsky / Wall Street Journal:<br />
Advances in AI and years of data gathering related to cyberattacks have made it easier for firms and governments to tie hacks to specific hacking groups  —  AI and sophisticated data gathering are making it easier for firms and governments to attribute hacks in months, not years</p>
<p>Technology Advances Make It Easier to Assign Blame for Cyberattacks<br />
<a href="https://www.wsj.com/articles/technology-advances-make-it-easier-to-assign-blame-for-cyberattacks-1538677334" rel="nofollow">https://www.wsj.com/articles/technology-advances-make-it-easier-to-assign-blame-for-cyberattacks-1538677334</a></p>
<p>AI and sophisticated data gathering are making it easier for firms and governments to attribute hacks in months, not years</p>
<p>Figuring out who exactly is responsible for a cyberattack is an inexact science, but advances in machine learning and years of data-gathering on hacks are making it easier than ever for law-enforcement officials and cybersecurity specialists to name the likely culprits.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/09/01/cyber-security-september-2018/comment-page-10/#comment-1607516</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 08 Oct 2018 07:14:50 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179595#comment-1607516</guid>
		<description><![CDATA[Web hosting providers take three days, on average, to respond to abuse reports
https://www.zdnet.com/article/web-hosting-providers-take-three-days-on-average-to-respond-to-abuse-reports/

Some hosting providers take over two weeks to respond, with the worst taking over 19 days.

Web hosting providers take 3 days, 2 hours, and 33 minutes on average to respond to abuse complaints and remove malware hosted on their servers, according to a report published today.

Abuse reports are commonly filed by security researchers, manually or using automated tools, and sent to web hosting providers at an email address specified on their sites.

Researchers scour the internet and keep an eye out for malicious links in email spam or other places, collect the URLs, determine the web host, and send out an email to the hosting provider, asking it to take down the link before users get a chance to click on it. There are thousands if not tens of thousands of such abuse reports being sent each day.

Previous studies have shown that the first few hours after a malware distribution are the most critical, as that&#039;s when spam filters and antivirus engines are most likely to be caught with their pants down and when the vast majority of users get infected.

 This is why web hosting providers need to cooperate and respond to abuse complaints with urgency, to keep users safe and stop malware campaigns.]]></description>
		<content:encoded><![CDATA[<p>Web hosting providers take three days, on average, to respond to abuse reports<br />
<a href="https://www.zdnet.com/article/web-hosting-providers-take-three-days-on-average-to-respond-to-abuse-reports/" rel="nofollow">https://www.zdnet.com/article/web-hosting-providers-take-three-days-on-average-to-respond-to-abuse-reports/</a></p>
<p>Some hosting providers take over two weeks to respond, with the worst taking over 19 days.</p>
<p>Web hosting providers take 3 days, 2 hours, and 33 minutes on average to respond to abuse complaints and remove malware hosted on their servers, according to a report published today.</p>
<p>Abuse reports are commonly filed by security researchers, manually or using automated tools, and sent to web hosting providers at an email address specified on their sites.</p>
<p>Researchers scour the internet and keep an eye out for malicious links in email spam or other places, collect the URLs, determine the web host, and send out an email to the hosting provider, asking it to take down the link before users get a chance to click on it. There are thousands if not tens of thousands of such abuse reports being sent each day.</p>
<p>Previous studies have shown that the first few hours after a malware distribution are the most critical, as that&#8217;s when spam filters and antivirus engines are most likely to be caught with their pants down and when the vast majority of users get infected.</p>
<p> This is why web hosting providers need to cooperate and respond to abuse complaints with urgency, to keep users safe and stop malware campaigns.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/09/01/cyber-security-september-2018/comment-page-10/#comment-1607330</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 05 Oct 2018 15:04:17 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179595#comment-1607330</guid>
		<description><![CDATA[Uber Agrees to $148M Settlement With States Over Data Breach
https://www.securityweek.com/uber-agrees-148m-settlement-states-over-data-breach

Uber will pay $148 million and tighten data security after the ride-hailing company failed for a year to notify drivers that hackers had stolen their personal information, according to a settlement announced Wednesday.

Uber Technologies Inc. reached the agreement with all 50 states and the District of Columbia after a massive data breach in 2016. Instead of reporting it, Uber hid evidence of the theft and paid ransom to ensure the data wouldn&#039;t be misused.

&quot;This is one of the most egregious cases we&#039;ve ever seen in terms of notification; a yearlong delay is just inexcusable,&quot; Illinois Attorney General Lisa Madigan told The Associated Press. &quot;And we&#039;re not going to put up with companies, Uber or any other company, completely ignoring our laws that require notification of data breaches.&quot;]]></description>
		<content:encoded><![CDATA[<p>Uber Agrees to $148M Settlement With States Over Data Breach<br />
<a href="https://www.securityweek.com/uber-agrees-148m-settlement-states-over-data-breach" rel="nofollow">https://www.securityweek.com/uber-agrees-148m-settlement-states-over-data-breach</a></p>
<p>Uber will pay $148 million and tighten data security after the ride-hailing company failed for a year to notify drivers that hackers had stolen their personal information, according to a settlement announced Wednesday.</p>
<p>Uber Technologies Inc. reached the agreement with all 50 states and the District of Columbia after a massive data breach in 2016. Instead of reporting it, Uber hid evidence of the theft and paid ransom to ensure the data wouldn&#8217;t be misused.</p>
<p>&#8220;This is one of the most egregious cases we&#8217;ve ever seen in terms of notification; a yearlong delay is just inexcusable,&#8221; Illinois Attorney General Lisa Madigan told The Associated Press. &#8220;And we&#8217;re not going to put up with companies, Uber or any other company, completely ignoring our laws that require notification of data breaches.&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/09/01/cyber-security-september-2018/comment-page-10/#comment-1607327</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 05 Oct 2018 15:02:24 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179595#comment-1607327</guid>
		<description><![CDATA[Linux Kernel Vulnerability Affects Red Hat, CentOS, Debian
https://www.securityweek.com/linux-kernel-vulnerability-affects-red-hat-centos-debian

Qualys has disclosed the details of an integer overflow vulnerability in the Linux kernel that can be exploited by a local attacker for privilege escalation. The flaw, dubbed “Mutagen Astronomy,” affects certain versions of the Red Hat, CentOS and Debian distributions.

Tracked as CVE-2018-14634, the flaw exists in the kernel’s create_elf_tables() function. The security hole can be exploited using a SUID binary to escalate privileges to root, but it only works on 64-bit systems.

The vulnerability affects versions of the kernel released between July 19, 2007, and July 7, 2017. While many Linux distributions have backported the commit that addresses the bug, the fix hasn’t been implemented in Red Hat Enterprise Linux, CentOS (which is based on Red Hat), and Debian 8 Jessie.

Red Hat, which assigned the flaw an impact rating of “important” and a CVSS score of 7.8 (high severity), has started releasing updates that should address the issue.]]></description>
		<content:encoded><![CDATA[<p>Linux Kernel Vulnerability Affects Red Hat, CentOS, Debian<br />
<a href="https://www.securityweek.com/linux-kernel-vulnerability-affects-red-hat-centos-debian" rel="nofollow">https://www.securityweek.com/linux-kernel-vulnerability-affects-red-hat-centos-debian</a></p>
<p>Qualys has disclosed the details of an integer overflow vulnerability in the Linux kernel that can be exploited by a local attacker for privilege escalation. The flaw, dubbed “Mutagen Astronomy,” affects certain versions of the Red Hat, CentOS and Debian distributions.</p>
<p>Tracked as CVE-2018-14634, the flaw exists in the kernel’s create_elf_tables() function. The security hole can be exploited using a SUID binary to escalate privileges to root, but it only works on 64-bit systems.</p>
<p>The vulnerability affects versions of the kernel released between July 19, 2007, and July 7, 2017. While many Linux distributions have backported the commit that addresses the bug, the fix hasn’t been implemented in Red Hat Enterprise Linux, CentOS (which is based on Red Hat), and Debian 8 Jessie.</p>
<p>Red Hat, which assigned the flaw an impact rating of “important” and a CVSS score of 7.8 (high severity), has started releasing updates that should address the issue.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/09/01/cyber-security-september-2018/comment-page-10/#comment-1607326</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 05 Oct 2018 15:01:47 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179595#comment-1607326</guid>
		<description><![CDATA[Microsoft Adds New Tools to Azure DDoS Protection
https://www.securityweek.com/microsoft-adds-new-tools-azure-ddos-protection

Microsoft this week announced a new set of distributed denial of service (DDoS) mitigation tools for Azure, which the company says will provide customers with increased visibility and support when their computing resources are under attack.

Building on the capabilities of Azure DDoS Protection, new features such as DDoS Attack Analytics and DDoS Rapid Response can deliver attack insights that can be leveraged for compliance, security audits, and defense optimizations, and also help customers engage DDoS experts during an active attack for specialized support.

There are three new features that Azure DDoS Protection Standard customers can now take advantage of, namely Attack Mitigation Reports, Attack Mitigation Flow Logs and DDoS Rapid Response. Thus, organizations will get detailed visibility into attack traffic and mitigation actions in Azure Monitor, as well as custom mitigations and support for attack investigation, Microsoft notes.

DDoS Protection Attack Analytics and rapid response
https://azure.microsoft.com/en-us/blog/ddos-protection-attack-analytics-rapid-response/]]></description>
		<content:encoded><![CDATA[<p>Microsoft Adds New Tools to Azure DDoS Protection<br />
<a href="https://www.securityweek.com/microsoft-adds-new-tools-azure-ddos-protection" rel="nofollow">https://www.securityweek.com/microsoft-adds-new-tools-azure-ddos-protection</a></p>
<p>Microsoft this week announced a new set of distributed denial of service (DDoS) mitigation tools for Azure, which the company says will provide customers with increased visibility and support when their computing resources are under attack.</p>
<p>Building on the capabilities of Azure DDoS Protection, new features such as DDoS Attack Analytics and DDoS Rapid Response can deliver attack insights that can be leveraged for compliance, security audits, and defense optimizations, and also help customers engage DDoS experts during an active attack for specialized support.</p>
<p>There are three new features that Azure DDoS Protection Standard customers can now take advantage of, namely Attack Mitigation Reports, Attack Mitigation Flow Logs and DDoS Rapid Response. Thus, organizations will get detailed visibility into attack traffic and mitigation actions in Azure Monitor, as well as custom mitigations and support for attack investigation, Microsoft notes.</p>
<p>DDoS Protection Attack Analytics and rapid response<br />
<a href="https://azure.microsoft.com/en-us/blog/ddos-protection-attack-analytics-rapid-response/" rel="nofollow">https://azure.microsoft.com/en-us/blog/ddos-protection-attack-analytics-rapid-response/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/09/01/cyber-security-september-2018/comment-page-10/#comment-1607235</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 04 Oct 2018 13:50:14 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179595#comment-1607235</guid>
		<description><![CDATA[Cities Paying Ransom: What Does It Mean for Taxpayers?
https://blog.radware.com/security/2018/09/cities-paying-ransom/

On September 1, Ontario’s Municipal Offices experienced a cyberattack that left their computers inoperable when Malware entered its systems and rendered its servers useless. The municipality was faced with paying a ransom to the attackers or face the consequences of being locked out of its systems. Per the advice of a consultant, the city paid an undisclosed amount of ransom to its attackers.]]></description>
		<content:encoded><![CDATA[<p>Cities Paying Ransom: What Does It Mean for Taxpayers?<br />
<a href="https://blog.radware.com/security/2018/09/cities-paying-ransom/" rel="nofollow">https://blog.radware.com/security/2018/09/cities-paying-ransom/</a></p>
<p>On September 1, Ontario’s Municipal Offices experienced a cyberattack that left their computers inoperable when Malware entered its systems and rendered its servers useless. The municipality was faced with paying a ransom to the attackers or face the consequences of being locked out of its systems. Per the advice of a consultant, the city paid an undisclosed amount of ransom to its attackers.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/09/01/cyber-security-september-2018/comment-page-10/#comment-1607234</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 04 Oct 2018 13:49:54 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179595#comment-1607234</guid>
		<description><![CDATA[https://www.flashpoint-intel.com/blog/podcasts/collective-intelligence-podcast-bruce-schneier-on-click-here-to-kill-everybody/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.flashpoint-intel.com/blog/podcasts/collective-intelligence-podcast-bruce-schneier-on-click-here-to-kill-everybody/" rel="nofollow">https://www.flashpoint-intel.com/blog/podcasts/collective-intelligence-podcast-bruce-schneier-on-click-here-to-kill-everybody/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/09/01/cyber-security-september-2018/comment-page-10/#comment-1607218</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 04 Oct 2018 13:36:43 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179595#comment-1607218</guid>
		<description><![CDATA[Cybersecurity Canon Candidate Book Review: “Cybersecurity: A Business Solution”
https://researchcenter.paloaltonetworks.com/2018/09/cybersecurity-canon-candidate-book-review-cybersecurity-business-solution/

Managing cyber risk is a challenging undertaking, even for large organizations with significant resources at their disposal. For executives and senior managers in small to medium-sized organizations, however, managing cyber risk can quickly become a daunting and overwhelming task. That is where Rob Arnold’s book Cybersecurity: A Business Solution provides a unique and helpful perspective. Written specifically for small to medium-sized businesses, the book provides executives and senior managers with a business-centered perspective on managing cyber risk in their organizations. The audience for this book also includes IT professionals and network defenders. By mapping out how to manage an organization’s cyber risk strategies, as well as how to implement an effective cybersecurity plan, it gives IT professionals a way to speak to administration and provide them with tools for an overall plan of action.]]></description>
		<content:encoded><![CDATA[<p>Cybersecurity Canon Candidate Book Review: “Cybersecurity: A Business Solution”<br />
<a href="https://researchcenter.paloaltonetworks.com/2018/09/cybersecurity-canon-candidate-book-review-cybersecurity-business-solution/" rel="nofollow">https://researchcenter.paloaltonetworks.com/2018/09/cybersecurity-canon-candidate-book-review-cybersecurity-business-solution/</a></p>
<p>Managing cyber risk is a challenging undertaking, even for large organizations with significant resources at their disposal. For executives and senior managers in small to medium-sized organizations, however, managing cyber risk can quickly become a daunting and overwhelming task. That is where Rob Arnold’s book Cybersecurity: A Business Solution provides a unique and helpful perspective. Written specifically for small to medium-sized businesses, the book provides executives and senior managers with a business-centered perspective on managing cyber risk in their organizations. The audience for this book also includes IT professionals and network defenders. By mapping out how to manage an organization’s cyber risk strategies, as well as how to implement an effective cybersecurity plan, it gives IT professionals a way to speak to administration and provide them with tools for an overall plan of action.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
