David Strom


Latest from David Strom

Google adds new AI-powered security controls to its Workspace

Google LLC today announced a set of new features using artificial intelligence to provide more cyber defense controls, most of which will be added to its Workspace cloud platform later this year. The features cover aspects of implementing zero-trust security, data loss prevention or DLP, and data privacy controls. Many involve a series of automated ...

New business VPN from Proton offers advanced security

Proton AG, the Swiss-based security services provider that has been known for its encrypted email product, today announced an update to its virtual private network product line, called Proton VPN for Business. The news includes new features and new pricing packages that will make it more attractive, particularly for smaller businesses. The company claims to have ...
COMMENTARY

Book review: Tom Kemp’s ‘Containing Big Tech’ provides a guide for consumers and businesses alike

Tom Kemp’s new book about the dangers of the five Big Tech companies is several books in one volume. Normally, this would not be a great recommendation. But stick with me here and see if you agree that he has written a very useful, effective and interesting book. Think of it more as a new ...
ANALYSIS

Doing business in Europe? Time to focus on its new Digital Services Act – now

The European Commission enacted its Digital Services Act last November as another step in its efforts to regulate online services and platforms. Most of these regulations take effect next February, but some will require many European businesses — and others that have customers on the continent — to meet the first deadlines next week. Once again, ...
ANALYSIS

How to prevent multifactor authentication fatigue attacks

There is a new wave of infections spreading throughout the world that has nothing to do with COVID or, for that matter, any other physical disease. Called multifactor authentication fatigue, it’s highly contagious and spreads through the deception of determined hackers who want to steal users’ account details. But here is the irony: The more ...

New widespread IoT compromise could affect millions of logic controller chips

Microsoft security researcher Vladimir Tokarev demonstrated an interesting attack on the industrial internet of things automation software called Codesys. Tokarev, who showed the exploit last week at the annual BlackHat security conference in Las Vegas, used a miniature elevator model to demonstrate how the attack could crash its cab. The software – and more importantly, its ...

New reports show phishing is on the rise – and getting more sophisticated

Two new reports on phishing trends show a rise in attacks, and they’re taking more complex paths through the internet to connect victims with malware-laced websites. The trends are highlighted in Cloudflare Inc.’s annual phishing trends report released today, as well as the latest compendium of phishing trends by the Interisle Consulting Group. What distinguishes both ...

Mitigating the latest processor attacks will be a chore on many levels

The names Downfall, Inception, Meltdown and Spectre might evoke the names of Bond villains, but they describe something almost as insidious: They are all central processing unit-based security vulnerabilities that have been uncovered in the past several years. Each of them — the first two most recently and the last two harking back to 2018 ...

This week in global cybercrime: twin takedowns by Interpol and FBI

The evidence that cybercrime has gone global was doubly reinforced this week with news of two independent takedowns of criminals behind the 16shop and Lolek Hosting operations, both used as sources of automated tools for various malware attacks. With increasing levels of criminality, takedowns have become more popular, such as the one that removed the ...

F5 announces new mobile app security product line

F5 Inc. announced its Mobile App Security Suite for iOS and Android devices Tuesday, combining bot takeover protection with other application shields to prevent malware from invading and damaging smartphones. These shields prevent malicious code from being installed on phones, such as keyboards that can capture data such as account credentials, code injections to insert various ...