Category: Editors Desk

Symantec Security Response: Android ransomware requires victim to speak unlock code

Symantec Security Response: Android ransomware requires victim to speak unlock code

Symantec Security Reponse has issued a warning against a new ransomware that is activated verbally, targeting Android phones. The ransomware – a variant of Android.Lockdroid.E – listens to the user and waits for an unlock code to be spoken, instead of the traditional method of typing it in. Once Android.Lockdroid.E infects a device it locks […]

The Pace of Trump’s Policy Agenda: Three Big ‘Ifs’

The Pace of Trump’s Policy Agenda: Three Big ‘Ifs’

By Libby Cantrill, PIMCO’s head of public policy and a regular contributor to the PIMCO Blog. It’s hard to believe that U.S. President Donald Trump has only been in office for a month, given the dizzying activity in Washington. Yet our observations from before the inauguration seem to be holding true, at least so far: Governing […]

Cybersecurity: Recommendations for President Trump, Implications for Israel

Cybersecurity: Recommendations for President Trump, Implications for Israel

By Col. (res.) Shai Shabtai EXECUTIVE SUMMARY: Two reports on cybersecurity – one commissioned by President Obama and the other by CSIS – have been placed on the desk of President Trump. They are different in their approach: one promotes an evolutionary policy based on procedural and “soft” tools, and the other espouses an activist […]

Global Airport Surveillance Radar Industry Analysis & Forecast Report 2016-2021

Global Airport Surveillance Radar Industry Analysis & Forecast Report 2016-2021

The Global Airport Surveillance Radar Industry Analysis & Forecast Report 2016-2021 is a professional and in-depth study on the current state of the Airport Surveillance Radar industry. The report analysis the global market of Airport Surveillance Radar by main manufactures and geographic regions. The report includes Airport Surveillance Radar definitions, product type, applications and industry […]

Not Our Grandmother's SCADA Security

Not Our Grandmother’s SCADA Security

By Andrew Ginter, VP Industrial Security, Waterfall Security Solutions Supervisory control and data acquisition (SCADA) is a control system architecture that interfaces with plant process or machinery to enable monitoring and issue process commands. This article attempts to explain why there are substantial and consequential differences in the various approaches to the cybersecurity of SCADA […]

Hewlett Packard Enterprise Report Reveals Trials and Errors of Security Operations

Hewlett Packard Enterprise Report Reveals Trials and Errors of Security Operations

SOCs forgo security basics, leaving 82 percent of organisations below target maturity levels and vulnerable Hewlett Packard Enterprise (HPE) has published its fourth annual State of Security Operations Report 2017, which provides deep analysis on the effectiveness of organisations’ security operations centres (SOCs), and best practices for mitigating risk in the evolving cybersecurity landscape. With […]

Size & Frequency - DDoS Attacks Set To Continue

Size & Frequency – DDoS Attacks Set To Continue

By Chris Cubbage, Executive Editor According to the latest annual report from Arbor Networks, the security division of Netscout, security concerns of Service Providers in 2017 should continue to be dominated by Distributed Denial of Service (DDoS) attacks. The 2016 Worldwide Infrastructure Security Report (WISR) is based on a 133 free-form and multiple choice question […]

Norton Research: Parents Worry Children are More Likely to be Bullied in the Online World than on a Playground

Norton Research: Parents Worry Children are More Likely to be Bullied in the Online World than on a Playground

Norton Cyber Security Insights Report Reveals Parents’ Concerns About Cyberbullying and the Online World to Coincide with the Back to School Period To coincide with the start of the 2017 school year, Norton by Symantec has released findings from the Norton Cyber Security Insights Report: Family Edition. The report encourages parents to openly discuss cyberbullying with […]

Islamic State Lost Almost a Quarter of Its Territory in 2016, IHS Markit Says

Islamic State Lost Almost a Quarter of Its Territory in 2016, IHS Markit Says

Group likely to lose governance structures in Iraq this year; Mosul to fall by second half of this year Territory controlled by the Islamic State shrunk by almost a quarter in 2016, according to new analysis has released by IHS Markit. In 2016, the Islamic State’s caliphate shrunk by 23 percent from 78,000 km2 in […]

ESET Discovered a Variant of the Destructive KillDisk Malware that Encrypts Linux Machines

ESET Discovered a Variant of the Destructive KillDisk Malware that Encrypts Linux Machines

ESET Discovered a Variant of the Destructive KillDisk Malware that Encrypts Linux Machines The new variant of KillDisk encrypts Linux machines, making them unbootable with data permanently lost. Despite the fact that the malware’s design doesn’t allow for the recovery of encrypted files, as encryption keys are neither stored nor sent anywhere, the criminals behind […]