Other News

Top Factors Driving Endpoint Security Strategy

Antivirus Software is dying. What will replace it?

In this industry perspective, Dan Larson of the firm CrowdStrike argues that antivirus software is becoming less effective at stopping damaging cyber attacks, but that companies need to look before they leap when replacing it. 

Plumbing the KRACK Vulnerability and Fast Flux Botnets: the AirBnB of the Cybercrime World

Plumbing the KRACK Vulnerability and Fast Flux Botnets: the AirBnB of the Cybercrime World

In this 67th episode of The Security Ledger Podcast, we talk with Bob Rudis of the firm Rapid7 about KRACK, a security hole that affects most wi-fi hotspots. Also: Or Katz of Akamai talks about that company’s work analyzing fast-flux botnets, which have become like AirBnB for cyber criminals looking for a place to host malicious networks. Finally: Tim Jarrett of Veracode tells us how a single security hole in an open source library found its way into millions of applications. 

A flaw in firmware by Infineon could have widespread and long-lasting implications for security on the Internet of Things, security experts warn.

ROCA Crypto Flaw could have big Impact on Internet of Things

With no simple way to patch affected systems, the security vulnerability in Trusted Platform Module (TPM) chipsets made by the firm Infineon may be with us for years to come, security experts warn.

A flaw in the WPA-2 wireless protocol leaves millions of device vulnerable to hacking and other malicious acts.

Update: Flaw in widely used Wi-Fi Standard could allow snooping

Hundreds of millions of wireless devices may be affected by a flaw in WPA-2, a widely used standard for securing wireless Internet connections.  (Updated to add commentary by Bob Rudis of Rapid 7.)

Research Finds Home Routers fill ranks of Fast Flux Botnets

Research Finds Home Routers fill ranks of Fast Flux Botnets

Research from the firm Akamai finds cyber criminals are marrying vulnerable home routers to sophisticated “fast flux” command and control tools to create long-lived, cyber criminal infrastructure.