This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On December 10, 2018

Monday 12/3

McAfee Labs 2019 Threats Predictions Report

We have witnessed greater collaboration among cybercriminals exploiting the underground market, which has allowed them to develop efficiencies in their products. Cybercriminals have been partnering in this way for years; in 2019 this market economy will only expand. The game of cat and mouse the security industry plays with ransomware developers will escalate, and the industry will need to respond more quickly and effectively than ever before.

Pharmaceutical Companies Most Targeted Industry by Cybercriminals

According to Proofpoint researchers, who analyzed attacks against Fortune 500 companies, pharmaceutical companies were the most targeted by hackers in the last quarter with an average of 71 fraud attacks per business. In fact, there have been 282 attacks on the pharma industry this year.

What’s the best way to make the most of the cloud?

As well as scalability and flexibility, Howe says the cloud provides other benefits. "It allows us to be more dynamic as a team and to think more carefully about where we should focus our attention," he says. "It gives us better transparency in terms of costs, too."

Tuesday 12/4

100 Million Quora Users Affected By ‘Malicious’ Data Breach

The popular question-and-answer website said Monday that a "malicious third party" may have lifted the account information of some 100 million users.

Credit card stealing malware on Canada’s 1-800-FLOWERS website went undetected for four years

The company said it believes the malware was scraping credit cards between August 15, 2014 to September 15, 2018, but that the company’s main website was unaffected.

How Malware Can Easily Defeat Apple’s macOS Security

With the release of macOS Mojave this year, Apple once again introduced new security features in response to the evolving threatscape facing the platform, restricting Apple Events and hardening user data protections.

Re-Energized Cisco Security Strategy Wins Praise From Fast-Growing Partners

Partners say they're experiencing dramatic growth with a significantly revitalized, comprehensive Cisco security portfolio as the San Jose, Calif., company shifts toward a software-, automation- and subscription-focused strategy based on open, programmable systems with security throughout.

Wednesday 12/5

NSA tools are still letting hackers take over unpatched systems

Hackers are now using a pair of exploits developed by the NSA to burrow through the router and attack connected systems. The two exploits, known as EternalBlue and EternalRed, target Windows and Linux-based systems respectively. This new attack is being termed “EternalSilence” by Akamai, which warns that with 45,000 infected devices, more than a million connected computers could also be vulnerable.

415,000 routers worldwide reportedly infected with cryptojacking malware

The number of affected routers has more than doubled since the malware was initially discovered in August. At the time, it was reported that around 200,000 routers were affected.

Microsoft is building its own Chrome browser to replace Edge

While the modern look and feel has paid off for Edge, the underlying browser engine (EdgeHTML) has struggled to keep up with Chromium. Microsoft is finally giving up and moving its default Windows 10 browser to Chromium.

Nutanix and Intel Partner to Enable System Integrators and Value-Added Resellers to deliver Branded Hyperconverged Infrastructure Solutions

As part of this technology partnership, VARs and SIs who are Authorized Nutanix Channel Partners, will now be able to brand and personalize Intel Data Center Blocks, packaging them with Nutanix software for individual customer deployments.

Thursday 12/6

Symantec develops neural network to thwart cyberattack-induced blackouts

The Industrial Control System Protection (ICSP) Neural is a device that scans for malware on USB devices to block attacks on IoT and operational technology environments.

STEALTHbits Technologies Extends Cloud Data Access Governance Capabilities with Latest Release of StealthAUDIT

In addition to extending Sensitive Data Discovery capabilities and platform support for performing Data Classification in this release, STEALTHbits has also included 51 new GDPR-specific pattern definitions, spanning all EU countries and more.