Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Facebook removed 652 fake accounts originating from Russia and Iran. Also, Microsoft identified and removed fake internet domains that mimicked U.S political institutions thought to be created by Russian operatives.
In cybersecurity, there’s a rule: It’s more effective to fix a problem in the development phase. Nowhere is this truer than in IoT, where devices may never be secured once they leave the production line.
Microsoft identified and forced the removal of fake internet domains mimicking conservative U.S. political institutions, which led Russian officials to accuse the company of an anti-Russian “witch hunt.”
As digital extortion attacks increase, it’s imperative that IT leaders are aware of these threats and the impacts they can have on overall company reputation and it’s relationships with partners and customers.
In September 2017, Equifax disclosed that a failure to patch one of its Internet servers against a pervasive software flaw — in a Web component known as Apache Struts — led to a breach that exposed personal data on 147 million Americans.
After initially reporting a potential cyberattack, the Democratic National Committee now believes its database of voters was the target of a third-party test of its cybersecurity.
Trend Micro takes a closer look at AI and machine learning and the ways these approaches can support compliance with industry requirements and prevent spam messages.
Vulnerabilities have been discovered in multiple versions of Philips cardiovascular imaging devices.
Trend Micro’s recently introduced Deep Security™, which will help IT security professionals understand more about the attacks on their networks.
Facebook found and removed 652 fake accounts, pages and groups originating from Iran and Russia that were trying to mislead people around the world.
After using phishing scams in an attempt to steal over $6 million from employees of several US colleges and universities, a Nigerian national was convicted on several charges.
To alleviate the skills gap, barriers between software developers and IT operations must be broken down, and cybersecurity training must be applied to DevOps and across an organization.
At DEF CON 2018, security researchers demonstrated how they were able to infiltrate networks by exploiting vulnerabilities in HP OfficeJet All-in-One printers.
Do you think using AI and Machine Learning to boost compliance and prevent spam will be effective? Why or why not? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: @JonLClay.