Voce Communications

426 Flips | 5 Magazines | 20 Followers | @vocenation | Voce Communications is a public relations, web development and content marketing agency. Based in Silicon Valley but with staff around the country, Voce is results-oriented and solution-driven. Visit us at VoceCommunications.com.

New Free Tool Stops Petya Ransomware & Rootkits

Meanwhile, Locky puts ransomware on the Check Point Top Three Global Malware List for the first time ever.

'Root' The New Age Of IoT-Based DDoS Attacks

Last Friday's massive DDoS that exploited online cameras and DVRs was simple to pull off -- and a new chapter in online attacks.<p>The distributed …

LinkedIn Hacker Tied to Major Bitcoin Heist

<b>The Russian national accused by U.S. authorities of hacking LinkedIn, Dropbox and Formspring made at least 1,500 bitcoins in 2013, including 620</b> …

US transport agency guidance on vehicle cybersecurity irks lawmakers

Guidance from the National Highway Traffic Safety Administration for improving motor vehicle cybersecurity has attracted criticism from lawmakers who …

DomainTools suggests password changes after a vulnerable script leaks data

On Monday, DomainTools, an intelligence platform used by researchers around the globe, warned customers to change their passwords after a weekend …

iCloud Phishing Campaign Zycode Back From the Dead

A phishing campaign aimed at Apple users in China that relies heavily on typosquatting has resurfaced.

"Dirty COW" Linux Kernel Exploit Seen in the Wild

<b>A new Linux kernel vulnerability disclosed on Wednesday allows an unprivileged local attacker to escalate their privileges on a targeted system. Red</b> …

Keen Lab Takes Down iPhone 6S, Nexus 6P, at Mobile Pwn2Own

Hackers identified a series of vulnerabilities in Android and iOS to take down a Google Nexus 6P and an Apple iPhone 6S this week at Mobile …

Cybersecurity staffing issues may be putting you at risk

A study from Spiceworks found that even though 80 percent of organizations experienced a "security incident" in 2015, only 29 percent of companies …

Resource Planning

Rise of the IoT machines

Friday’s distributed denial-of-service attack on domain name service provider Dyn may have seemed like the end of the world for millions of Netflix, …

7 Scary Ransomware Families

Here are seven ransomware variants that can creep up on you.<p>1 of 8<p><i>Image Source: Trend Micro</i><p>As the season of evil witches, ghosts, goblins, and ghouls …

Trend Micro

Dyn DDoS Work of Script Kiddies, Not Politically Motivated Hackers

New research on the source of Friday’s DDoS attack against DNS provider Dyn indicates that script kiddies are likely responsible, rather than a …

Cybersecurity

No need to shoot down drones! Many of them can now be hijacked

A security researcher has devised a method of hijacking a wide variety of radio- controlled airplanes, helicopters, cars, boats and other devices …

Healthcare Suffers Security Awareness Woes

Weak security practices are putting patient data at risk, new SecurityScorecard report shows.<p>Healthcare organizations have suffered 22 major data …

Millennials changing the face of cybersecurity

It's official — there are now more millennials than baby boomers and their influence on information security is starting to have its impact, …

US Charges Several In India Call Center Scam

10/28/2016<br>10:50 AM<p>50%<p>50%<p>Authorities file charges against 61 in a phone fraud that cheated 15,000 out of $250 million via identity theft and …

5 Signs Your Smartphone Has Been Hacked

Mobile devices are increasingly popular vectors for cybercriminals targeting the enterprise. How to tell when a smartphone may be under attack.<p>1 of …

Cybersecurity holes in connected cars leave doors unlocked for hackers

The pho­to was jar­ring. A Jeep Chero­kee stalled in a ditch after hack­ers remote­ly dis­abled its brakes.<p>No one was hurt.<p>The exper­i­ment in St. …

Google's Duo enters video calling market, offers end-to-end encryption

Google launched a video-calling app, Duo, to go up against Apple's FaceTime, Facebook's Messenger, Skype and other apps for video conversations.

Very perceptive: Talos researchers spot three vulnerabilities in Lexmark Perceptive Document Filters

Cisco's Talos division today publicly disclosed three new vulnerabilities in Lexmark's Perceptive Document Filters product that if exploited with …

Why doesn’t my cybersecurity insurance cover that?

Still some risk to customer<p>Cybersecurity insurance is designed to alleviate losses from various cyber incidents, including data breaches, damage to …

SWIFT Ignored Lax Security In Smaller Member Banks, Say Officials

8/18/2016<br>09:45 AM<p>50%<p>50%<p>Former and current SWIFT managers admit security of customer terminals was not addressed, says Reuters report.<p>A special report …

SMS scam targets friends and family of 'Sarah'

Malwarebytes researchers spotted a SMS scam in the UK targeting parents and adults who know someone by the name Sarah.

OIG Report Finds Vulnerabilities in Medicaid Services Agency

Vulnerabilities exist in systems that belong to the Centers for Medicare & Medicaid Services, a federal agency that’s part of the United States’ …

Massive Email Bombs Target .Gov Addresses

Over the weekend, unknown assailants launched a massive cyber attack aimed at flooding targeted dot-gov (.gov) email inboxes with subscription …

Attacker Uses Virtual Machine to Hide Malicious Activity

<b>Cybercriminals have discovered a new method of hiding their nefarious activity on compromised machines, by using virtual machines (VMs), SecureWorks</b> …

Imperva: Application layer DDoS attacks are on the rise

Application layer DDoS attacks are becoming more common, perhaps because they cost less for malicious actors to execute and can more effectively …

Unsecured DNSSEC Easily Weaponized, Researchers Warn

DNSSEC is not invincible.<p>Researchers this week described how a DNSSEC-based flood attack could easily knock a website offline and allow for the …

Information Security

Marcher steps up game: Malware poses as security update, imitates popular apps

Looking to capitalize on mobile device owners' growing security fears, a new variant of the Android malware Marcher is infecting victims by …

The Cybersecurity Stakes Of Election 2016

We have less than 90 days to go until Election Day 2016. Citizens across the United States will go to the polls to choose between Hillary Clinton and Donald Trump—or possibly one of the alternative candidates, Gary Johnson, Jill Stein, or Evan McMullin. There is a lot at stake in any general …