article thumbnail

Log4J: What You Need to Know

Adam Levin

The entire technology industry received a sizable lump of coal in their collective stocking earlier this week in the form of two major security vulnerabilities in a widely-used software tool. Here’s a quick breakdown of what it means for internet users. What can the average internet user do? What is Log4J?

Internet 208
article thumbnail

RSAC insights: Software tampering escalates as bad actors take advantage of ‘dependency confusion’

The Last Watchdog

Findings released this week by ReversingLabs show 87 percent of security and technology professionals view software tampering as a new breach vector of concern, yet only 37 percent say they have a way to detect it across their software supply chain. Its function is to record events in a log for a system administrator to review and act upon.

Software 255
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

What’s more, it will likely take a blend of legacy security technologies – in advanced iterations – combined with a new class of smart security tools to cut through the complexities of defending contemporary business networks. Its rather mundane function is to record events in a log for a system administrator to review and act upon, later.

Firewall 223
article thumbnail

Adconion Execs Plead Guilty in Federal Anti-Spam Case

Krebs on Security

At the outset of their federal criminal trial for hijacking vast swaths of Internet addresses for use in large-scale email spam campaigns, three current or former executives at online advertising firm Adconion Direct (now Amobee ) have pleaded guilty to lesser misdemeanor charges of fraud and misrepresentation via email.

article thumbnail

Technology’s contributions toward safety in healthcare

CyberSecurity Insiders

Technology in healthcare has the potential to make all the difference in terms of safety outcomes. But technology isn’t always safe. However, technology ultimately is doing more good than bad in healthcare. This widespread utilization of telehealth would have been impossible without advancing technology.

article thumbnail

Top IT Areas You Need to Check to Strengthen Your Cybersecurity

CyberSecurity Insiders

Today, technological advances have seen a rise in cyber security threats globally. Besides, cybercriminals are becoming craftier with sophisticated technology. One of the most vulnerable areas that hackers use to infiltrate a company’s system is the network. Company systems require various software programs to function.

article thumbnail

Florence, Ala. Hit By Ransomware 12 Days After Being Alerted by KrebsOnSecurity

Krebs on Security

that their information technology systems had been infiltrated by hackers who specialize in deploying ransomware. City officials now say they plan to pay the ransom demand, in hopes of keeping the personal data of their citizens off of the Internet. In late May, KrebsOnSecurity alerted numerous officials in Florence, Ala.