Reports

Companies should make life harder for cyber criminals by ceasing the use of valuable, "static" data to authenticate consumers. (Image courtesy of the Library of Congress.)

Opinion: Disrupt Fraud by Devaluing Data

In-brief: companies that want to make life difficult for cyber criminals can start by moving valuable data off the front lines and finding ways to use less valuable information to verify the identity of their customers, writes Keir Breitenfeld, who works for Experian’s Fraud & Identity Solutions group.

A hidden, backdoor account affects a line of VoIP gateways made by DblTek, researchers from TrustWave found. (Image courtesy of DblTek.)

Dbl Trouble: Fix Falls Short for Backdoor in China-Made Devices

In-brief: A hidden, backdoor account affects a line of VoIP gateways made by DblTek, researchers from TrustWave found. The manufacturers fix, however, may not solve the problem. 

AT&T said it saw a spike in scans for vulnerable IoT devices in the months leading up to the Mirai botnet attacks. (Image courtesy of AT&T)

AT&T: Mirai’s Rise Seen in IoT Vulnerability Scans

In brief: In a new report, Internet provider AT&T said that scans for vulnerable IoT devices spiked in the first half of 2016, months before the Mirai botnet, made up largely of IoT devices, launched denial of service attacks on DYN and other targets.

The Necurs botnet has been updated to support denial of service attacks, Anubis Networks reports,

Locked and Loaded: Huge Botnet Updated for DDoS

In-brief: Researchers at Anubis Networks claim that Necurs, one of the world’s largest botnets, has added a feature for launching denial of service attacks. 

A survey of penetration testers by Rapid7 finds most organizations are failing to detect malicious activity on their networks. (Image courtesy of Rapid7)

Survey: Hackers for Hire Find Most Networks Easy Prey

In-brief: A survey of penetration testers by Rapid7 finds most organizations are failing to detect malicious activity on their networks.