Posts Tagged ‘industry’

postheadericon Number of women in infosec industry ‘remains stagnant’

The number of women working within the infosec industry is “continues to remain low”, and could be exacerbating the skills gap within the industry.

The post Number of women in infosec industry ‘remains stagnant’ appeared first on WeLiveSecurity


WeLiveSecurity

postheadericon Information security: A career at the forefront of an exciting industry

Demand for information security specialists is growing, and there are many routes to qualification. Do you have the skills to transform cybersecurity?

The post Information security: A career at the forefront of an exciting industry appeared first on WeLiveSecurity.


English – WeLiveSecurity

postheadericon Auto industry publishes first ever cybersecurity best practices

The auto industry has published its first set of cybersecurity best practices, as it attempts to combat rising and future threats facing the connected car.

The post Auto industry publishes first ever cybersecurity best practices appeared first on We Live Security.


English – We Live Security

postheadericon New wave of cyberattacks against Ukrainian power industry

ESET has discovered a new wave of cyberattacks attacks against Ukraine’s electric power industry. Interesting, the malware that was used is not BlackEnergy.

The post New wave of cyberattacks against Ukrainian power industry appeared first on We Live Security.


We Live Security » Languages » English

postheadericon BlackEnergy trojan strikes again: Attacks Ukrainian electric power industry

The recent attacks on the electrical power industry in Ukraine are connected to attacks on the media and to targeted cyber-espionage attacks against Ukrainian governmental agencies.

The post BlackEnergy trojan strikes again: Attacks Ukrainian electric power industry appeared first on We Live Security.


We Live Security » Languages » English

postheadericon BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry

The cybercriminal group behind BlackEnergy, the malware family that has been around since 2007 and has made a comeback in 2014, was also active in the year 2015.

The post BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry appeared first on We Live Security.


We Live Security » Languages » English

postheadericon Oil and gas industry investment in digital technologies shows resilience in oil price downturn, Accenture and Microsoft survey reports

HOUSTON; Apr. 22, 2015 – Despite current lower crude oil prices, most companies in the oil and gas industry plan to invest the same amount or more in digital technologies, according to a new survey by Accenture (NYSE: ACN) and Microsoft Corp. released today at the Microsoft Global Energy Forum 2015. Survey respondents included international oil companies (IOCs), national oil companies (NOCs), independents and oilfield services firms.

In the near term during the current low crude price cycle, approximately three out of five respondents said they plan to invest the same amount (32 percent) or more or significantly more (25 percent) in digital technologies.

Over the next three to five years, approximately 80 percent of the oil and gas industry professionals surveyed said they plan to invest the same amount (18 percent), more (44 percent) or significantly more (18 percent) in digital. Respondents from IOCs and NOCs were the most bullish in the same time period.

Mobility, infrastructure and collaboration technologies currently represent the biggest investment areas across the oil and gas industry. Over the next three to five years, investments are expected to increase in big data and the Industrial Internet of Things (IIoT) and automation.

The key for continued digital investment in the upstream sector is improving operational efficiency, rather than simply reducing cost, as faster, more informed decision making and a more efficient workforce were seen as the key areas where digital technologies are adding value and creating business efficiencies. However, to get the most value from digital technologies, oil and gas industry leaders say they need to overcome several barriers, with workflows and processes that create bottlenecks and physical and cybersecurity issues topping the list.

Approximately 89 percent noted that leveraging more analytics capabilities would add more business value, 90 percent felt more mobile technologies in the field would increase value, and 86 percent said that leveraging more IIoT and automation would boost value. Collaboration technologies were highlighted as an area that could be increasingly used in upstream to create a more efficient workforce and to make faster decisions.

“Oil and gas industry leaders continue to look to digital technologies as a way to address some of the key challenges the industry faces today in this lower crude oil price cycle,” said Rich Holsman, global head of digital in Accenture’s energy industry group. “Making the most of big data, IIoT and automation are indeed the next big opportunities for energy and oilfield services companies, and many are already starting work in these areas. They are increasing investments in enabling people and assets, with a growing emphasis on developing data supply chains to support analytics projects that can improve efficiencies, manage cost and provide a competitive edge. Our survey tells us that companies who do not continue to invest in digital technologies risk being left behind.”

“Mobility and other digital technologies are gaining traction as oil and gas players learn to use these technologies to make faster and better decisions from the field to the front office,” said Craig Hodges, general manager of the Gulf Coast District at Microsoft. “Predictive capabilities to optimize maintenance and maximize production can create value, and digital technologies also support better use of scarce resources and talent, management of more complex work, cost reduction efforts and innovation to remain competitive and continue operating safely.”

The Microsoft and Accenture “Oil and Gas Digital and Technology Trends Survey 2015,” conducted by PennEnergy Research in partnership with the Oil & Gas Journal, surveyed industry professionals worldwide, including engineers, geologists and mid-level and executive management from the upstream, midstream and downstream segments.

About Accenture

Accenture is a global management consulting, technology services and outsourcing company, with more than 323,000 people serving clients in more than 120 countries. Combining unparalleled experience, comprehensive capabilities across all industries and business functions, and extensive research on the world’s most successful companies, Accenture collaborates with clients to help them become high-performance businesses and governments. The company generated net revenues of US$ 30.0 billion for the fiscal year ended Aug. 31, 2014. Its home page is www.accenture.com.

Accenture Digital, comprised of Accenture Analytics, Accenture Interactive and Accenture Mobility, offers a comprehensive portfolio of business and technology services across digital marketing, mobility and analytics. Learn more about Accenture Digital at www.accenture.com/digital.

About Microsoft

Founded in 1975, Microsoft (Nasdaq “MSFT”) is the worldwide leader in software, services, devices and solutions that help people and businesses realize their full potential.

 

News Center

postheadericon Microsoft, the FBI, Europol and industry partners disrupt the notorious ZeroAccess botnet

REDMOND , Wash. Dec. 5 , 2013 — The Microsoft Digital Crimes Unit today announced it has successfully disrupted a rampant botnet in collaboration with Europol’s European Cybercrime Centre (EC3), the Federal Bureau of Investigation (FBI) and leaders in the technology industry, including A10 Networks Inc. The Sirefef botnet, also known as ZeroAccess, is responsible for infecting more than 2 million computers, specifically targeting search results on Google, Bing and Yahoo search engines, and is estimated to cost online advertisers $ 2.7 million each month. Today’s action is expected to significantly disrupt the botnet’s operation, increasing the cost and risk for cybercriminals to continue doing business and preventing victims’ computers from committing fraudulent schemes.

This is Microsoft’s first botnet action since the Nov. 14 unveiling of its new Cybercrime Center — a center of excellence for advancing the global fight against cybercrime — and marks the company’s eighth botnet operation in the past three years. Similar to Microsoft’s Citadel botnet case, the ZeroAccess case is part of an extensive cooperative effort with international law enforcement and industry partners to dismantle cybercriminal networks and ensure that people worldwide can use their computing devices and services with confidence.

“This operation marks an important step in coordinated actions that are initiated by private companies and, at the same time, enable law enforcement agencies around Europe to identify and investigate the criminal organizations and networks behind these dangerous botnets that use malicious software to gain illicit profits,” said Troels Oerting, head of the EC3. “EC3 added its expertise, information communications technology infrastructure and analytic capability, as well as provided the platform for high-level cooperation between cybercrime units in five European countries and Microsoft.”

Due to its botnet architecture, ZeroAccess is one of the most robust and durable botnets in operation today and was built to be resilient to disruption efforts, relying on a peer-to-peer infrastructure that allows cybercriminals to remotely control the botnet from tens of thousands of different computers. ZeroAccess is used to commit a slew of crimes, including search hijacking, which “hijacks” people’s search results and redirects people to sites they had not intended or requested to go to in order to steal the money generated by their ad clicks. ZeroAccess also commits click fraud, which occurs when advertisers pay for clicks that are not the result of legitimate, interested human users’ clicks, but are the result of automated Web traffic and other criminal activity. Research by the University of California, San Diego shows that as of October 2013, 1.9 million computers were infected with ZeroAccess, and Microsoft determined there were more than 800,000 ZeroAccess-infected computers active on the Internet on any given day.

“The coordinated action taken by our partners was instrumental in the disruption of ZeroAccess; these efforts will stop victims’ computers from being used for fraud and help us identify the computers that need to be cleaned of the infection,” said David Finn, executive director and associate general counsel of the Microsoft Digital Crimes Unit. “Microsoft is committed to working collaboratively — with our customers, partners, academic experts and law enforcement — to combat cybercrime. And we’ll do everything we can to protect computer users from the sinister activities and criminal networks that victimize innocent people and businesses around the world.”

Last week, Microsoft filed a civil suit against the cybercriminals operating the ZeroAccess botnet and received authorization from the U.S. District Court for the Western District of Texas to simultaneously block incoming and outgoing communications between computers located in the U.S. and the 18 identified Internet Protocol (IP) addresses being used to commit the fraudulent schemes. In addition, Microsoft took over control of 49 domains associated with the ZeroAccess botnet. A10 Networks provided Microsoft with advanced technology to support the disruptive action.

As Microsoft executed the order filed in its civil case, Europol coordinated a multijurisdictional criminal action targeting the 18 IP addresses located in Europe. Specifically, Europol worked with Latvia, Luxembourg, Switzerland, the Netherlands and Germany to execute search warrants and seizures on computer servers associated with the fraudulent IP addresses located in Europe.

This is the second time in six months that Microsoft and law enforcement have worked together to successfully disrupt a prevalent botnet. It demonstrates the value coordinated operations have against cybercriminal enterprises.

“If the hacker community has not yet taken notice, today’s disruption of the ZeroAccess botnet is another example of the power of public-private partnerships,” FBI Executive Assistant Director Richard McFeely said. “It demonstrates our commitment to expand coordination with companies like Microsoft and our foreign law enforcement partners — in this case, Europol — to shut down malicious cyberattacks and hold cybercriminals accountable for exploiting our citizens’ and businesses’ computers.”

Microsoft and its partners do not expect to fully eliminate the ZeroAccess botnet due to the complexity of the threat. However, Microsoft expects that this action will significantly disrupt the botnet’s operation. Microsoft is working with ecosystem partners around the world to notify people if their computers are infected and will make this information available through its Cyber Threat Intelligence Program (C-TIP). ZeroAccess is very sophisticated malware, blocking attempts to remove it, and Microsoft therefore recommends that people visit http://support.microsoft.com/botnets for detailed instructions on how to remove this threat. Because Microsoft found that the ZeroAccess malware disables security features on infected computers, leaving the computer susceptible to secondary infections, it is critical that victims rid their computers of ZeroAccess by using malware removal or antivirus software as quickly as possible. Europol is also providing information on its website about botnets to educate the public on how to protect themselves.

More information about today’s news and the coordinated action against ZeroAccess is available at http://www.microsoft.com/en-us/news/presskits/dcu. Legal documentation in the case can be found at http://www.botnetlegalnotice.com/ZeroAccess.

About Europol

EC3 is the focal point in the EU’s fight against cybercrime, contributing to faster reactions in the event of online crimes. It will support Member States and the European Union’s institutions in building operational and analytical capacity for investigations and cooperation with international partners. EC3 officially commenced its activities on 1 January 2013, and it aims to become the focal point in the EU’s fight against cybercrime, through building operational and analytical capacity for investigations and cooperation with international partners in the pursuit of an EU free from cybercrime. The European Cybercrime Centre is hosted by Europol; the European law enforcement agency in The Hague, The Netherlands, and thus EC3 can draw on Europol’s existing infrastructure and law enforcement network.

About FBI

As an intelligence-driven and a threat-focused national security organization with both intelligence and law enforcement responsibilities, the mission of the FBI is to protect and defend the United States against terrorist and foreign intelligence threats, including cyber-based attacks and high-technology crimes; to uphold and enforce the criminal laws of the United States; and to provide leadership and criminal justice services to federal, state, municipal, and international agencies and partners.

About A10 Networks

A10 Networks was founded in Q4 2004 with a mission to provide innovative networking and security solutions. A10 Networks makes high-performance products that help organizations accelerate, optimize and secure their applications. A10 Networks is headquartered in Silicon Valley with offices in the United States, United Kingdom, France, The Netherlands, Germany, Spain, Brazil, Japan, China, Korea, Taiwan, Hong Kong, Singapore and Malaysia. For more information, visit: http://www.a10networks.com.

About Microsoft

Founded in 1975, Microsoft (Nasdaq “MSFT”) is the worldwide leader in software, services and solutions that help people and businesses realize their full potential.

N ote to editors: For more information, news and perspectives from Microsoft, please visit the Microsoft News Center at http://www.microsoft.com/news. Web links, telephone numbers and titles were correct at time of publication, but may have changed. For additional assistance, journalists and analysts may contact Microsoft’s Rapid Response Team or other appropriate contacts listed at http://www.microsoft.com/news/contactpr.mspx.

Microsoft News Center – News and Announcements from Microsoft