Advanced Computing in the Age of AI|Wednesday, October 21, 2020
  • Subscribe to EnterpriseAI Weekly Updates:  Subscribe by email

malware

Hackers Target Chip Makers

Another indication of the strategic importance of the foundational semiconductor industry is a recent surge in cyberattacks directed at global chip manufacturers. Security researchers in Taiwan reported earlier this ...Full Article

Russian Malware Targets Linux, US Warns

The Russians are coming, again, this time with new malware targeting Linux systems, according to a U.S. advisory issued this week. The FBI and the U.S. National Security Agency ...Full Article

‘Shadow IoT’ Undermining Network Security

The majority of Internet of Things transactions are unsecured, adding a new enterprise security threat as industrial and retail IoT traffic begins to ramp up. An enterprise IoT survey ...Full Article

Updated: Worm Hits Docker Containers

A crypto-jacking worm, so-called because it spreads in spurts among unsecured images on servers, is said to be the first detected using Docker application containers. Palo Alto Network’s (NYSE: ...Full Article

Malware Goes ‘Polymorphic’

Malware is evolving, appearing in many forms as malicious code infiltrates computing platforms under many guises. Security experts refer to this chameleon-like malware as “polymorphic code,” and one researcher ...Full Article

Hybrid Clouds Remain Unsecured as New Threats Emerge

The added layer of operational complexity associated with hybrid cloud deployments is only making it harder for security teams to ward off attacks—assuming cloud users have created those teams ...Full Article

Spectre, Meltdown Redux: Intel Chips Found Vulnerable to More Malware

A published report states that Intel chips are vulnerable to three new malware attacks with the ability to steal passwords, personal information, financial data and encryption keys. Intel has ...Full Article

WannaCry Lingers, Cyber Analyst Warns

One week after a ransomware attack cut a swathe across Europe and China, a range of after-action analyses have emerged as to how the exploit unfolded and how the ...Full Article

New Malware ‘Bricks’ IoT Devices

Despite repeated assurances that Internet of Things security issues are being addressed, so-called "in-the-wild" attacks on poorly secured devices reveal that securing the IoT still has a long way ...Full Article

IoT Deployments Fuel ‘Chaotic’ Cloud Security

Cloud security remains "complex and chaotic" and the Internet of Things threatens to increase cloud security risks, warns a survey of IT security managers conducted during last month's RSA ...Full Article
Page 1 of 212
Do NOT follow this link or you will be banned from the site!