Featured Post

News Scan for Jun 29, 2020 | CIDRAP - CIDRAP

Image
News Scan for Jun 29, 2020 | CIDRAP - CIDRAPNews Scan for Jun 29, 2020 | CIDRAP - CIDRAPViruses: Breaking new grounds in research | Results Pack | CORDIS | European Commission - Cordis NewsHelping Others Make Healthy Choices - Texas A&M Today - Texas A&M University Today"How Contagion Works" author Paolo Giordano on the environmental, social and political factors impacting coronavirus and future threats - Sydney Morning HeraldPandemic Outbreaks in the Past Decade: A Research Overview - ResearchAndMarkets.com - Business WireNews Scan for Jun 29, 2020 | CIDRAP - CIDRAPPosted: 29 Jun 2020 12:00 AM PDT Ebola infects 4 more in DRC's Equateur province outbreakOfficials have reported 4 more confirmed cases in the Democratic Republic of the Congo (DRC) Equateur province Ebola outbreak, raising the total to 28, the World Health Organization (WHO) African regional office said today on Twitter.So far, no details on the latest cases in the DRC's 11th Ebola outbreak are no…

Antivirus giants form new coalition to put an end to stalkerware - The Next Web

Antivirus giants form new coalition to put an end to stalkerware - The Next Web


Antivirus giants form new coalition to put an end to stalkerware - The Next Web

Posted: 20 Nov 2019 03:54 AM PST

A bunch of antivirus software vendors and non-profits including Avira, Kaspersky, and the Electronic Frontier Foundation (EFF) have banded together to take on secretly-installed snooping apps plaguing your devices.

Dubbed the Coalition Against Stalkerware (CAS), the collaborative effort aims to fight domestic violence, stalking, and harassment by addressing the use of stalkerware and raising public awareness about the issue.

To that effect, the CAS intends to define best practices and improve the security industry's response to stalkerware by sharing known samples among participating cybersecurity firms.

In all, 10 organizations are part of the coalition: Avira, the EFF, G Data, Kaspersky, Malwarebytes, the National Network to End Domestic Violence, NortonLifeLock, Operation Safe Escape, Weisser Ring, and the Work with Perpetrators of Domestic Violence.

Stalkerware apps — software used to spy on users' messages, call information, and GPS locations — have become a class of "nuisanceware" often used by people to keep tabs on their close ones, thereby facilitating surveillance, harassment, abuse, stalking, and violence against intimate partners.

This is usually done by stealthily downloading the tracking apps onto victims' phones without their knowledge in order to siphon off location data, phone calls, text messages, photos, and other sensitive information.

"In order to counter this issue, it is important for cybersecurity vendors and advocacy organisations to work together," said Vyacheslav Zakorzhevsky, head of anti-malware research at Kaspersky.

"The IT security industry gives its input by improving detection of stalkerware and better notifying users of this threat to their privacy. Meanwhile service and advocacy organisations directly work with victims of domestic violence, know their pain points and requests, and can guide our work," Zakorzhevsky added.

Credit: Kaspersky
The prominence of stalkerware apps globally in 2019

Earlier this year, EFF cybersecurity chief Eva Galperin called on the antivirus industry to take the threat of stalkerware seriously, even going to the extent of indicting executives of stalkerware-selling companies on hacking charges.

In response, Kaspersky's antivirus software began flagged Android stalkerware apps as a "privacy alert," in addition to offering users options to delete or quarantine them to cut off their access to sensitive information.

What's more, last month the company noted that there were more than 518,223 instances of stalkerware on users' devices or detected an attempt to install it during the first eight months of 2019 – a 373 percent increase in the same period in 2018 — with Russia, India, Brazil, and the US emerging as the prominent regions for Android stalkerware globally.

The newly announced coalition is an effort to combat this growing threat in the cybersecurity landscape.

Google, for its part, recently partnered with ESET, Lookout, and Zimperium to identify shady third-party apps on Android before they end up on users' devices. However, it's not clear if the initiative would cover such invasive tracking apps.

"The good news for users is that functionality and effective solutions are being put in place so they can protect themselves," Kaspersky said. "IT security companies and advocacy organizations working with domestic abuse victims should join forces to ensure that cybersecurity companies respond better to stalkerware."

Read next: This 'elitist' dating app matches you up for 2-minute livestream dates

Corona coverage

Read our daily coverage on how the tech industry is responding to the coronavirus and subscribe to our weekly newsletter Coronavirus in Context.

For tips and tricks on working remotely, check out our Growth Quarters articles here or follow us on Twitter.

Cyberbit launches remote cybersecurity training for organizations impacted by lock down - ETCIO.com

Posted: 31 Mar 2020 11:42 PM PDT

Cyberbit launches remote cybersecurity training for organizations impacted by lock downCyberbit today announced that the company will provide $100,000 worth of free, remote cybersecurity training on their Cyber Range to help organizations challenged with maintaining training continuity for their information security teams as a result of recent travel restrictions, quarantines and social distancing.

According to the SANS SOC Survey of 2019, lack of skilled staff is the most frequently cited SOC barrier to excellence. Frequent hands-on training is key for SOC teams to maintain their skill level, enabling them to successfully respond to security incidents which depend on their detection, investigation and response skills.

Unfortunately, since the outbreak of COVID-19, training for SOC staff worldwide has been put on hold. Travel to training courses is no longer an option and remote team members' skill levels have been gradually deteriorating.

The remote training exercises consist of live cyberattack simulations in a virtual SOC hosted in Cyberbit's cloud-based Cyber Range. Trainees connect to Cyberbit Range from any other remote location and practice responding to the simulated attacks using real-world, commercial security tools, as they'd use at work.

Comments

Popular Posts

System detected an overrun of a stack-based buffer in this application [FIX] - Windows Report

Valorant anti-cheat lead answers many questions on Reddit - Millenium US