Remove 2018 Remove Authentication Remove Military
article thumbnail

North Korea-linked APT37 exploited IE zero-day in a recent attack

Security Affairs

“This attack requires an authenticated client to click a link in order for an unauthenticated attacker to initiate remote code execution.” Cyber attacks conducted by the APT37 group mainly targeted government, defense, military, and media organizations in South Korea.

Military 129
article thumbnail

Episode 103: On the Voice-Controlled Internet, How Will We Authenticate?

The Security Ledger

If we are destined to interact with the smart systems around us using our voice, how exactly will we manage to authenticate to those devices? If we are destined to interact with the smart systems around us using our voice, how exactly will we manage to authenticate to those devices? Authenticate me! Read the whole entry. »

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The German BSI agency recommends replacing Kaspersky antivirus software

Security Affairs

BSI remarks that the trust in the reliability and self-protection of a manufacturer as well as his authentic ability to act is crucial for the safe use of any defense software. The alert pointed out that antivirus software operates with high privileges on machines and if compromised could allow an attacker to take over them.

article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

Hello and welcome to the final IT Governance podcast of 2018. Equifax issued its financial report for the first quarter of 2018, revealing that its huge 2017 data breach had so far cost it $242.7 It had discovered and fixed the flaw in March 2018 as part of an audit, but opted not to disclose it at the time.

article thumbnail

How to Ensure Your Digital Security During the Rugby World Cup

Thales Cloud Protection & Licensing

At the 2018 Winter Olympic Games held in PyeongChang, for instance, cyber criminals leveraged a previously unknown family of malware called Olympic Destroyer to attack the Games’ servers just before the opening ceremony. Unfortunately, digital criminals are also closely following the buzz surrounding this tournament.

Security 105
article thumbnail

North Korea-linked ScarCruft APT adds Bluetooth Harvester to its arsenal

Security Affairs

ScarCruft has been active since at least 2012, it made the headlines in early February 2018 when researchers revealed that the APT group leveraged a zero-day vulnerability in Adobe Flash Player to deliver malware to South Korean users. Kaspersky first documented the operations of the group in 2016.

IT 78
article thumbnail

NEW TECH: Silverfort extends ‘adaptive multi-factor authentication’ via key partnerships

The Last Watchdog

Tel Aviv, Israel-based Silverfort continues to make inroads into proving the efficacy of its innovative approach to multi-factor authentication, or MFA, in corporate settings. Silverfort is the brainchild of a band of colleagues who toiled together in the encryption branch of Unit 8200 , the elite cybersecurity arm of the Israeli military.