From incident to resolution: Essential steps to survive a cyberattack

Monitoring all the events in your corporate network is big data “business.” Any observable phenomena – from logins to downloads, scripts, updates, configuration changes, etc. – happening across all the endpoints, servers, routers, switches and other infrastructure in your network can create event logs that rapidly grow to almost unimaginable mountains of data to be … More From incident to resolution: Essential steps to survive a cyberattack

Most second-hand thumb drives contain data from past owners

Our penchant for plugging in random memory sticks isn’t the only trouble with our USB hygiene, a study shows. Many computer users don’t take enough precautions when disposing of their USB sticks, leaving a trove of what is often sensitive information about themselves for the drives’ new owners, a study has shown. Researchers from the … More Most second-hand thumb drives contain data from past owners

Security event in Taiwan ‘rewards’ quiz winners with malware-laden USB drives

It was, literally and otherwise, more stick than carrot for some winners of a recent data-security contest in Taiwan, who must have been stuck for words after their prizes turned out to be malware-riddled USB sticks. The country’s Criminal Investigation Bureau (CIB) handed out 250 USB thumb drives to members of the public who had … More Security event in Taiwan ‘rewards’ quiz winners with malware-laden USB drives

USBee: how to spy on an isolated system with a USB

In recent years we’ve seen increasing numbers of attacks designed to affect systems which are isolated from the network and cannot be attacked using conventional methods. Almost all research into this has been carried out by experts in Israel – that comes as no great surprise since this is a country at the forefront of cybersecurity. … More USBee: how to spy on an isolated system with a USB