Sony DDoS “@DerpTrolling” Attacker Pleads Guilty

In response to the guilty plea received and accepted by the US DoJ by a Utah man (Twitter handle @DerpTrolling) who flooded the servers of gaming companies with DDoS attacks and whose victims included Sony Online Entertainment and whose sentencing will be set on March 1, 2019, a Corero expert offers perspective. Sean Newman, Director Product Management […]

DerpTroll Hacker Pleads Guilty To DDoS Attacks

Following the news that the attacker behind DDoS attacks against Sony, EA and Steam has entered into a guilty plea in federal court, Sean Newman, Director Product Management at Corero Networks commented below. Sean Newman, Director Product Management at Corero Networks: “It’s rather eye-opening to see that a cybercriminal allegedly behind attacks on Sony, EA, […]

VirtualBox Zeroday

Following the news that a security researcher has announced a zeroday in Oracle’s VirtualBox virtualization software, Craig Young, security researcher at Tripwire commented below. Craig Young, Security Researcher at Tripwire: “The vulnerability is in the implementation of a virtual Intel E1000 compatible network adapter. The write-up demonstrates how an attacker with permissions to load Linux kernel modules […]

Children’s Commissioner Report Outlines Children Are ‘Datified’ From Birth

Children Believe Everything they Read Online

The ‘Who Knows What about Me?’ report from the children’s commissioner for England has outlined that today’s children are the first to be “datafied” from birth and internet giants and toy-makers need to be more transparent about the data they are collecting on children. It is not just up to the businesses that facilitate the digital-first […]

US NIST & IBM Watson, Use AI To Rank Threat Severity Of Cyber Vulns

Here are thoughts from two cybersecurity experts in response to recent news that the National Institute of Standards and Technology (NIST), an agency of the US Department of Commerce, has partnered with IBM to use AI to rate the severity of publicly reported cyber vulnerabilities. Gabriel Gumbs, VP of Product Strategy at STEALTHbits Technologies: “Applying AI, and in particular Watson to […]

The Vulnerabilities Of Hardware-Based Disk Encryption

Spy on Encrypted Internet Traffic

Bernard Parsons, CEO and Co-Founder of Becrypt:  The security and vulnerability of hardware-based disk encryption of solid-state drives (SSDs) has been forensically probed recently, as the relevance of data breaches continues to increase. Established thinking has pointed to the security offered by hardware-based encryption as being similar to, or superior than, software-based encryption methods. The current […]

Secret Service Warning Regarding USPS’s Mail Scanning Service

Web Vulnerability Scanner

The Secret Service has issued a security warning regarding a new service being offered by the U.S Postal service that allows residents to view all scanned images of their mail before it is delivered. While Informed Delivery sounds like a great service, the Secret Service says identity thieves are already using it to steal credit […]

US Cyber Command Starts Uploading Foreign APT Malware To Virus Total

It’s been reported that The Cyber National Mission Force in the US is now uploading malware samples it finds to VirusTotal.  IT security experts commented below. Chris Doman, Threat Engineer at AlienVault: “The US Cyber Command has uploaded two malware samples relating to APT28, the Russian group behind the US election hacking. So far, the […]