David Strom
Latest from David Strom
Google adds new AI-powered security controls to its Workspace
Google LLC today announced a set of new features using artificial intelligence to provide more cyber defense controls, most of which will be added to its Workspace cloud platform later this year. The features cover aspects of implementing zero-trust security, data loss prevention or DLP, and data privacy controls. Many involve a series of automated ...
New business VPN from Proton offers advanced security
Proton AG, the Swiss-based security services provider that has been known for its encrypted email product, today announced an update to its virtual private network product line, called Proton VPN for Business. The news includes new features and new pricing packages that will make it more attractive, particularly for smaller businesses. The company claims to have ...
ANALYSIS
Doing business in Europe? Time to focus on its new Digital Services Act – now
The European Commission enacted its Digital Services Act last November as another step in its efforts to regulate online services and platforms. Most of these regulations take effect next February, but some will require many European businesses — and others that have customers on the continent — to meet the first deadlines next week. Once again, ...
ANALYSIS
How to prevent multifactor authentication fatigue attacks
There is a new wave of infections spreading throughout the world that has nothing to do with COVID or, for that matter, any other physical disease. Called multifactor authentication fatigue, it’s highly contagious and spreads through the deception of determined hackers who want to steal users’ account details. But here is the irony: The more ...
New widespread IoT compromise could affect millions of logic controller chips
Microsoft security researcher Vladimir Tokarev demonstrated an interesting attack on the industrial internet of things automation software called Codesys. Tokarev, who showed the exploit last week at the annual BlackHat security conference in Las Vegas, used a miniature elevator model to demonstrate how the attack could crash its cab. The software – and more importantly, its ...
New reports show phishing is on the rise – and getting more sophisticated
Two new reports on phishing trends show a rise in attacks, and they’re taking more complex paths through the internet to connect victims with malware-laced websites. The trends are highlighted in Cloudflare Inc.’s annual phishing trends report released today, as well as the latest compendium of phishing trends by the Interisle Consulting Group. What distinguishes both ...
Mitigating the latest processor attacks will be a chore on many levels
The names Downfall, Inception, Meltdown and Spectre might evoke the names of Bond villains, but they describe something almost as insidious: They are all central processing unit-based security vulnerabilities that have been uncovered in the past several years. Each of them — the first two most recently and the last two harking back to 2018 ...
This week in global cybercrime: twin takedowns by Interpol and FBI
The evidence that cybercrime has gone global was doubly reinforced this week with news of two independent takedowns of criminals behind the 16shop and Lolek Hosting operations, both used as sources of automated tools for various malware attacks. With increasing levels of criminality, takedowns have become more popular, such as the one that removed the ...
F5 announces new mobile app security product line
F5 Inc. announced its Mobile App Security Suite for iOS and Android devices Tuesday, combining bot takeover protection with other application shields to prevent malware from invading and damaging smartphones. These shields prevent malicious code from being installed on phones, such as keyboards that can capture data such as account credentials, code injections to insert various ...