Cloud Security News: Week in Review February 17th, 2017 Edition Cloud Security News: Week in Review is our blog series, grabbing the more interesting cloud security scoops from the web. Sit back,…

Cloud Security News: Week in Review February 17th, 2017 Edition

Alex O'Connor

As Marketing Specialist, Alex works on all things digital and creative, striving to successfully drive CloudLock’s marketing campaigns.

Share

Cloud Security News: Week in Review is our blog series, grabbing the more interesting cloud security scoops from the web. Sit back, relax, and catch up on all you should know about this week.

Watch out everyone, there’s a brand new type of malware in town that is, wait for it… File-less. No, this is not a joke. Were you among the thousands of people that attended the RSA security conference this week? If you didn’t get to attend, check out the article below summarizing the top seven security threats discussed during one of the sessions. Another topic covered at RSA: the DMARC protocol. Watch the video below to learn more about its importance when it comes to protecting your inbox. 

Hack Read: The Rise of Fileless Malware: Over 100 Telecoms, Banks, Gov’t Orgs Under Attack

By Ali Raza

New research indicates that hackers are now attacking via file-less malware, establishing a new type of cyberthreat that is growing increasingly popular as of late. What is file-less malware and how does it infect your system, you may ask? Essentially this malware “does not depend on the files on the hard drive of a device for its survival,” so it is able to remain undetected while hiding inside the victim’s computer system. This article goes into more detail and summarizes a step-by-step process hackers follow when initiating file-less malware attacks.

CIO: What happens if your thermostat is hacked? Researchers name the top 7 security threats

By Mark Hachman (@markhachman)

During the RSA security conference in San Francisco this week, SANS Institute ran a session discussing what they identified as seven of the most dangerous attack vectors in today’s security landscape. To no one’s surprise, the top contender on the list was ransomware, which of course has been around for over 20 years now, but nonetheless takes the cake. Coming in second was the Internet of Things (IoT), which opens a whole new world of potential threats, as consumers continue to use an increasing number of smart devices that are easy targets for cyberattacks.

ZDNet: Protecting your inbox: The cybersecurity industry needs to lead by example

85% of consumer inboxes are protected by DMARC, a protocol that prevents the spoofing of email. Sounds good, right? In theory, yes. However, only about 15% of corporate senders surveyed at RSA use the protocol. The risks are there; if you don’t use it properly, you can prevent emails from being delivered, which is why careful implementation is needed. Watch this video as Philip Reitinger, president and CEO of the Global Cyber Alliance, shares findings from the GCA survey on the use of the DMARC protocol.

Share
Browser Not Supported

Your browser version is outdated.

We would recommend you upgrade to a recent version to ensure that you have a good experience on the CloudLock site. Outdated browsers also increase your security risk. So please update your browser and come back later!

Click on the icon below to download the latest version of your browser

Close