Page 2,210«..1020..2,2092,2102,2112,212..2,2202,230..»

Truman and Hruby 2022 fellows explore their p – EurekAlert

ALBUQUERQUE, N.M. Postdoctoral researchers who are designated Truman and Hruby fellows experience Sandia National Laboratories differently from their peers.

Appointees to the prestigious fellowships are given the latitude to pursue their own ideas, rather than being trained by fitting into the research plans of more experienced researchers. To give wings to this process, the four annual winners two for each category are 100 percent pre-funded for three years. This enables them, like bishops or knights in chess, to cut across financial barriers, walk into any group and participate in work by others that might help illuminate the research each has chosen to pursue.

The extraordinary appointments are named for former President Harry Truman and former Sandia President Jill Hruby, now the U.S. Department of Energy undersecretary for nuclear security and administrator of the National Nuclear Security Administration.

Truman wrote to the president of Bell Labs that he had an opportunity, in managing Sandia in its very earliest days, to perform exceptional service in the national interest. The President Harry S. Truman Fellowship in National Security Science and Engineering could be said to assert Sandias intention to continue to fulfill Trumans hope.

The Jill Hruby Fellowship in National Security Science and Engineering offers the same pay, benefits and privileges as the Truman. It honors former Sandia President Jill Hruby, the first woman to direct a national laboratory. While all qualified applicants will be considered for this fellowship, and its purpose is to pursue independent research to develop advanced technologies to ensure global peace, another aim is to develop a cadre of women in the engineering and science fields who are interested in technical leadership careers in national security.

The selectees are:

Alicia Magann: The quantum information science toolkit

To help speed the emergence of quantum computers as important research tools, Alicia Magann is working to create a quantum information science toolkit. These modeling and simulation algorithms should enable quantum researchers to hit the ground running with meaningful science as quantum computing hardware improves, she says.

Alicia Magann will explore the possibilities of quantum control in the era of quantum computing during her Truman fellowship at Sandia National Laboratories. (Photo courtesy Alicia Magann) Click on the thumbnail for a high-resolution image.

Her focus will extend aspects of her doctoral research at Princeton University to help explore the possibilities of quantum control in the era of quantum computing.

At Sandia, she will be working with Sandias quantum computer science department to develop algorithms for quantum computers that can be used to study the control of molecular systems.

Im most interested in probing how interactions between light and matter can be harnessed towards new science and technology, Magann said. How well can we control the behavior of complicated quantum systems by shining laser light on them? What kinds of interesting dynamics can we create, and what laser resources do we need?

A big problem, she says, is that its so difficult to explore these questions in much detail on conventional computers. But quantum computers would give us a much more natural setting for doing this computational exploration.

Her mentor, Mohan Sarovar, is an ideal mentor because hes knowledgeable about quantum control and quantum computing the two fields Im connecting with my project.

During her doctoral research, Magann was a DOE Computational Science Graduate Fellow and also served as a graduate intern in Sandias extreme-scale data science and analytics department, where she heard by word of mouth about the Truman and Hruby fellowships. She applied for both and was thrilled to be interviewed and thrilled to be awarded the Truman.

Technical journals in which her work has been published include Quantum, Physical Review A, Physical Review Research, PRX Quantum, and IEEE Transactions on Control Systems Technology. One of her most recent 2021 publications is Digital Quantum Simulation of Molecular Dynamics & Control in Physical Review Research.

Gabriel Shipley: Mitigating instabilities at Sandias Z machine

When people mentioned the idea to Gabe Shipley about applying for a Truman fellowship, he scoffed. He hadnt gone to an Ivy League school. He hadnt studied with Nobel laureates. What he had done, by the time he received his doctorate in electrical engineering from the University of New Mexico in 2021, was work at Sandia for eight years as an undergraduate student intern from 2013 and a graduate student intern since 2015. He wasnt sure that counted.

Gabriel Shipley, who broadened the use of a small pulsed power machine called Mykonos in a past internship, plans to investigate the origins and evolution of 3D instabilities in pulsed-power-driven implosions at Sandia National Laboratories powerful Z machine during his Truman fellowship. (Photo courtesy of Gabe Shipley) Click on the thumbnail for a high-resolution image.

The candidates for the Truman are rock stars, Shipley told colleague Paul Schmit. When they graduate, theyre offered tenure track positions at universities.

Schmit, himself a former Truman selectee and in this case a walking embodiment of positive reinforcement, advised, Dont sell yourself short.

That was good advice. Shipley needed to keep in mind that as a student, he led 75 shots on Mykonos, a relatively small Sandia pulsed power machine, significantly broadening its use. I was the first person to execute targeted physics experiments on Mykonos, he said. He measured magnetic field production using miniature magnetic field probes and optically diagnosed dielectric breakdown in the target.

He used the results to convince management to let him lead seven shots on Sandias premier Z machine, an expression of confidence rarely bestowed upon a student. I got amazing support from colleagues, he said. These are the best people in the world.

Among them is theoretical physicist Steve Slutz, who theorized that a magnetized target, preheated by a laser beam, would intensify the effect of Zs electrical pulse to produce record numbers of fusion reactions. Shipley has worked to come up with physical solutions that would best embody that theory.

With Sandia physicist Thomas Awe, he developed methods that may allow researchers to scrap external structures called Helmholtz coils to provide magnetic fields and instead create them using only an invented architecture that takes advantage of Zs own electrical current.

His Truman focus investigating the origins and evolution of 3D instabilities in pulsed-power-driven implosions would ameliorate a major problem with Z pinches if what he finds proves useful. Instabilities have been recognized since at least the 1950s as weakening pinch effectiveness. They currently limit the extent of compression and confinement achievable in the fusion fuel. Mitigating their effect would be a major achievement for everyone at Z and a major improvement for every researcher using those facilities.

Shipley has authored articles in the journal Physics of Plasmas and provided invited talks at the Annual Meeting of the APS Division of Plasma Physics and the 9th Fundamental Science with Pulsed Power: Research Opportunities and User Meeting. His most recent publication in Physics of Plasmas, Design of Dynamic Screw Pinch Experiments for Magnetized Liner Inertial Fusion, represents another attempt to increase Z machine output.

Sommer Johansen: Wheres the nitrogen?

Sommer Johansen received her doctorate in physical chemistry from the University of California, Davis, where her thesis involved going backward in time to explore the evolution of prebiotic molecules in the form of cyclic nitrogen compounds; her time machine consisted of combining laboratory spectroscopy and computational chemistry to learn how these molecules formed during the earliest stages of our solar system.

Sommer Johansen aims to improve models that demonstrate how burning bio-derived fuels affect the Earths planetary ecology and severe forest fires caused by climate change during her Hruby fellowship at Sandia National Laboratories. (Photo courtesy of Sommer Johansen) Click on the thumbnail for a high-resolution image.

Cyclic nitrogen-containing organic molecules are found on meteorites, but we have not directly detected them in space. So how were they formed and why havent we found where that happens? she asked.

That work, funded by a NASA Earth and Space Science Fellowship, formed the basis of publications in The Journal of Physical Chemistry and resulted in the inaugural Lewis E. Snyder Astrochemistry Award at the International Symposium on Molecular Spectroscopy. The work also was the subject of an invited talk she gave at the Harvard-Smithsonian Center for Astrophysics Stars & Planets Seminar in 2020.

At Sandia, she intends to come down to Earth, both literally and metaphorically, by experimenting at Sandias Combustion Research Facility in Livermore on projects of her own design.

She hopes to help improve comprehensive chemical kinetics models of the after-effects on Earths planetary ecology of burning bio-derived fuels and the increasingly severe forest fires caused by climate change.

Every time you burn something that was alive, nitrogen-containing species are released, she says. However, the chemical pathways of organic nitrogen-containing species are vastly under-represented in models of combustion and atmospheric chemistry, she says. We need highly accurate models to make accurate predictions. For example, right now it isnt clear how varying concentrations of different nitrogenated compounds within biofuels could affect efficiency and the emission of pollutants, she said.

Johansen will be working with the gas-phase chemical physics department, studying gas-phase nitrogen chemistry at Sandias Livermore site under the mentorship of Lenny Sheps and Judit Zdor. UC Davis is close to Livermore, and the Combustion Research Facility there was always in the back of my mind. I wanted to go there, use the best equipment in the world and work with some our fields smartest people.

She found particularly attractive that the Hruby fellowship not only encouraged winners to work on their own projects but also had a leadership and professional development component to help scientists become well-rounded. Johansen had already budgeted time outside lab work at UC Davis, where for five years she taught or helped assistants teach a workshop for incoming graduate students on the computer program Python. We had 30 people a year participating, until last year (when we went virtual) and had 150.

The program she initiated, she says, became a permanent fixture in my university.

Alex Downs: Long-lived wearable biosensors

As Alex Downs completed her doctorate at the University of California, Santa Barbara, in August 2021, she liked Sandia on LinkedIn. The Hruby postdoc listing happened to show up, she said, and it interested her. She wanted to create wearable biosensors for long duration, real-time molecular measurements of health markers that would be an ongoing measurement of a persons well-being. This would lessen the need to visit doctors offices and labs for evaluations that were not only expensive but might not register the full range of a persons illness.

Alex Downs hopes to create wearable biosensors that gather real-time molecular measurements from health markers and would lessen the need to visit doctors offices and labs for evaluations during her Hruby fellowship at Sandia National Laboratories. (Photo courtesy of Alex Downs) Click on the thumbnail for a high-resolution image.

Her thesis title was Electrochemical Methods for Improving Spatial Resolution, Temporal Resolution, and Signal Accuracy of Aptamer Biosensors.

She thought, Theres a huge opportunity here for freedom to explore my research interests. I can bring my expertise in electrochemistry and device fabrication and develop new skills working with microneedles and possibly other sensing platforms. That expertise is needed because a key problem with wearable biosensors is that in the body, they degrade. To address this, Downs wants to study the stability of different parts of the sensor interface when its exposed to bodily fluids, like blood.

I plan not only to make the sensors longer lasting by improved understanding of how the sensors are impacted by biofouling in media, I will also investigate replacing the monolayers used in the present sensor design with new, more fouling resistant monolayers, she said.

The recognition element for this type of biosensor are aptamers strands of DNA that bind specifically to a given target, such as a small molecule or protein. When you add a reporter to an aptamer sequence and put it down on a conductive surface, you can measure target binding to the sensor as a change in electrochemical signal, she said.

The work fits well with Sandias biological and chemical sensors team, and when Downs came to Sandia in October, she was welcomed with coffee and donuts from her mentor Ronen Polsky, an internationally recognized expert in wearable microneedle sensors. Polsky introduced her to other scientists, told her of related projects and discussed research ideas.

Right now, meeting with people all across the Labs has been helpful, she said. Later, I look forward to learning more about the Laboratory Directed Research and Development review process, going to Washington, D.C. and learning more about how science policy works. But right now, Im mainly focused on setting up a lab to do the initial experiments for developing microneedle aptamer-based sensors, Downs said.

Sandia National Laboratories is a multimission laboratory operated by National Technology and Engineering Solutions of Sandia LLC, a wholly owned subsidiary of Honeywell International Inc., for the U.S. Department of Energys National Nuclear Security Administration. Sandia Labs has major research and development responsibilities in nuclear deterrence, global security, defense, energy technologies and economic competitiveness, with main facilities in Albuquerque, New Mexico, and Livermore, California.

Sandia news media contact: Neal Singer, nsinger@sandia.gov, 505-977-7255

See original here:
Truman and Hruby 2022 fellows explore their p - EurekAlert

Read More..

An orange revolution filled with chess, space and machines – DutchNews.nl – DutchNews.nl

24oranges.nl, the blog that is now a column, continues to bring you odd and fun Dutch things pressed for your pleasure.

My grandmother was Ukrainian and my grandfather was Belarusian. During the Russian Revolution, they both fled to Canada. One thing that was passed down from them to me was playing chess, taught to me when I was three years old. The Old Slavic word for chess, (shahmat), comes from the Persian for the king [shah] is dead and its also where checkmate comes from.

Playing chess outside is increasingly becoming a Dutch thing in part thanks to Jess Medina Molina, the founder of Urban Chess. One day while jogging, he thought there should be chess tables outdoors. He began convincing local councils to install chess tables in parks, some of which are also wheelchair accessible.

Inspired by his daughter who had trouble with arithmetic, Medina Molina learned about how chess had a positive effect on childrens brains. Chess helps overcome loneliness, improves problem-solving skills and makes people get out more. On April 2 in Apeldoorn, Park Zuidbroek will inaugurate its new chess board. Medina Molina is also pushing for some chess tables in Amsterdams Vondelpark.

A galaxy near you

An international team of researchers led by Dutch PhD student Martijn Oei has discovered a radiogalaxy that is at least 16 million light-years long, making it the largest structure made by a galaxy to this day. This is a ginormous deal because scientists had never seen a structure this big made by a single galaxy. It also disproves some long-held hypotheses about the growth of radio galaxies.

Named Alcyoneus, the radio giant is three billion light-years away from Earth. Alcyoneus was a giant that fought against Heracles and other Olympians for supremacy over the cosmos. Despite the mind-boggling distance, the giant looms as large in the sky as the moon, an indication that the structure had to have a record length. What has given Alcyoneus its record length, still remains a mystery.

From Bletchley Park to Alan Turingpark

Speaking of cracking codes, the port city of IJmuiden, home to one of the largest sea locks in the world, recently opened the Alan Turingpark, named after British mathematician, computer scientist and cryptanalist Alan Turing who was instrumental in helping defeat the Germans in WWII. Turing was also a gay man who was mistreated by the state, making him a tragic symbol for LGBTQIA emancipation.

Remy and the Machines

Harpist Remy van Kesteren, considered one of the worlds best harpists, is currently touring Dutch theatres with 30 robots. Remy & The Analogue Robot Orchestra is made up of music boxes controlled by Remy while hes at the harp.

The idea came to him six years ago at music festival Into The Great Wide Open on the island of Vlieland where he met robot builder Jurjen Alkema. They clicked, and the rest is music. The orchestra plays their own compositions and covers.

The DutchNews.nl team would like to thank all the generous readers who have made a donation in recent weeks. Your financial support has helped us to expand our coverage of the coronavirus crisis into the evenings and weekends and make sure you are kept up to date with the latest developments.

DutchNews.nl has been free for 14 years, but without the financial backing of our readers, we would not be able to provide you with fair and accurate news and features about all things Dutch. Your contributions make this possible.

If you have not yet made a donation, but would like to, you can do so via Ideal, credit card or Paypal.

Read the original here:
An orange revolution filled with chess, space and machines - DutchNews.nl - DutchNews.nl

Read More..

Trend Micro Internet Security – Wikipedia

Trend Micro Internet Security (known as PC-cillin Internet Security in Australia and Virus Buster in Japan) is an antivirus and online security program developed by Trend Micro for the consumer market. According to NSS Lab comparative analysis of software products for this market in 2014, Trend Micro Internet Security was fastest in responding to new internet threats.[1]

In addition to anti-malware and web threat protection, the premium version of this software includes compatibility for PCs, Macs, Android or iOS mobile devices; parental controls; identity theft prevention; a privacy scanner for major social networking sites; and 25 GB of cloud storage.[2]

Features in Trend Micro Internet Security 2015 include:[2][3]

The software also includes:

Trend Micro Premium Security includes additional features, including:

AV-Comparatives awarded Trend Micro a three-star Advanced + ratingthe highest ranking given by the organizationin AV-Comparatives Whole Product Dynamic Real-World Protection Test for 2014.[4]

AV-TEST in October 2014 gave Trend Micro Internet Security 2015 a score of 17 out of a possible 18 points.[5]

Trend Micro Maximum Security scored the highest success rate in blocking malware downloads in NSS Labs 2014 Consumer Endpoint Protection test focused on Socially Engineered Malware. The results were based on continuous series of tests to determine the participants effectiveness against socially engineered malware. NSS Labs is an independent network testing facility, security and consultancy organization. NSS Labs also found that Trend Micro had the quickest time in adding protection against unknown threats - less than 15 minutes.[1]

In January 2016 it was discovered that the consumer version of Trend Micro AV allowed any website visited by its users to execute arbitrary code or read all browser passwords on the Windows PC it purportedly protected. A patch was later issued to close the issue.[6]

In June 2014, AV-Test published results for its mobile security endurance tests, which assessed more than 30 apps over a six-month period. Trend Micros mobile security tied for the highest overall score of 13 out of 13 points.[7]

Previous versions include:

As of January 2015, Trend Micro supported Trend Micro Internet Security versions 19/2011 and higher.[8]

PC-cillin 2000 and earlier versions were virus scanners without any additional features. PC-cillin 2002 and 2003 were stand-alone virus scanners which also included a firewall component and improved on the softwares scanning and virus detection engine. Newer versions of Trend Micro Internet Security offer additional features such as spyware protection, antispam and an integrated firewall along with an improved scanning and virus detection engine and enhanced heuristics. PC-cillin 2003 was the last stand-alone antivirus product offered by Trend Micro until 2007, when the company released a standalone anti-malware product that offered protection from malicious software including viruses, spyware, and adware.

Read moreTrend Micro HomePage

The rest is here:
Trend Micro Internet Security - Wikipedia

Read More..

Cyber security expands at IC with Duo authentication – Ithaca College The Ithacan

Ithaca College staff, students and faculty can expect to find an extra step when logging into Zoom and Formstack Forms. Duo Multi-Factor Authentication (MFA) will now be required to prevent accounts from being compromised.

The changes were announced over Intercom, with Zoom requiring Duo MFA on March 17. Formstacks Duo MFA implementation was originally scheduled for March 16, but was pushed back to March 21. When logging in, students will now be expected to answer a phone call or go into the Duo app in order to log into Zoom. Ithaca College is one of more than 300 educational institutions that uses Duo MFA for its programs.

MFA is an electronic authentication method that is gaining popularity with companies including Bank of America, Facebook and Microsoft. For security purposes, it requires users to use two or more identity verification factors in order to gain access to a website or application. This multi-step verification process helps to reinforce security, while usernames and passwords remain vulnerable to cyber-attacks and being stolen by third parties.

While Zoom was highly utilized during the COVID-19 pandemic, it also experiences a form of cyber-attack known as Zoombombing, a practice in which internet trolls hijack calls inserting lewd, obscene, racist, misogynistic, homophobic, Islamophobic or antisemitic material. Zoombombings have occured during classes at the college in the past. Proven methods to prevent this include not sharing Personal Meeting IDs when hosting public events, asking users to provide their email address when registering for an event and MFA.

At IC, we will continue to add Duo protection to systems wherever login is required, while also continuing enhancements to our single sign-on systems to reduce how often individuals are prompted to authenticate, Jason Youngers, information security officer for Information Security and Access Management said via email.

While there have been no immediate threats to security in these programs, David Weil, chief information officer for Information Technology, said the changes were made because of MFAs ability to deter hacking and to better protect all student, staff and faculty accounts.

It really has been shown to be a very strong deterrent to having an account be compromised, Weil said. And industry best practices is really recommending that wherever possible, you should put MFA in front of all logins it really is another layer of protection.

Duos move to Zoom and Formstack was news to some students. Senior Nicholas Isaacs said he was surprised to find out that he would be required to use Duo to log into Zoom. For Isaacs, the change is not entirely welcome.

I just think its too many extra steps, Isaacs said. I think that both platforms have enough security but I can see why the college is doing it. But from a practical standpoint, its really not the best.

For some students, the process of logging in with MFA is tedious. Whenever sophomore Devan Adegbile was without her phone, she said logging into websites became more difficult.

Sometimes I just quickly want to look something up [on Degree Works] on my computer and I need to get my phone, but its all the way in a different room, so its a little inconvenient for me, Adgebile said.

Isaacs similarly said the process of moving between computer and phone to login has created problems for him in the past. In one instance, Isaacs said he was unable to login because his phone had died and he was not able to access Duo Mobile.

Theres been cases where my phones been off and [I] havent been able to get in, Isaacs said. I have to charge my phone before I can get in and I just couldnt get into the account, so that was a big inconvenience. But other than that, if you have your phone on, then maybe [logging in is] 30 seconds more at most.

Duo offers a way to speed up the login process by allowing users to remain logged in for 90 days. Whenever a user is asked to use Duo, Weil said it was to ensure the person using the device is who they say they actually are.

On my computer that Im using right now, I have not been asked to use Duo at all today, Weil said. If I were to use a different machine, its going to be Oh, I dont know who you really are, let me challenge it. I know it can be a little frustrating, but its using intelligence behind the scenes its not just arbitrarily asking.

For sophomore Jesus Burgos, using Duo is just another part of his login process which is why he said he did not mind the addition of Duo to Zoom and Formstack. Instead, he saw it as an opportunity to further prevent Zoombombings.

If you get hacked or if someone knows your password, that doesnt mean theyre going to be able to get into your account, Burgos said. I hope that people here are more mature and that [Zoombombings] wouldnt happen in Zoom meetings and at Ithaca College.

More:
Cyber security expands at IC with Duo authentication - Ithaca College The Ithacan

Read More..

The hard truth behind Biden’s cyber warnings – POLITICO

Security experts have expressed the most worry about hacks on the energy and finance industries. However, each of the nations crucial sectors is at risk in some way.

We should consider every sector vulnerable, said Jen Easterly, director of the Cybersecurity and Infrastructure Security Agency, during a three-hour call this week with around 13,000 participants from multiple industries on the Russian hacking threat. In some ways, we should assume that disruptive cyber activity will occur.

Inevitably, some attack will break through if an adversary like Russia puts enough resources behind it.

If a nation state brings its A-Team, the ability to be 100 percent effective on defense is not always there, said Senate Intelligence Chair Mark Warner (D-Va.), pointing to concerns around the energy and financial sectors. So how do we stay resilient, even if the bad guys get in?

President Joe Biden warned this week that Russian cyberattacks on American companies were coming, citing evolving intelligence that Vladimir Putin was considering using his nations cyber abilities against targets in the United States.

Those warnings came amid a scramble by CISA and other agencies to urge businesses and other potential targets to harden their defenses, along with continued calls from Congress for tougher deterrence against Russian hacking. Attempting to fill that gap, Biden warned Putin during a summit meeting last summer that we will respond if Moscow attacks the United States critical infrastructure.

But critical covers a ton of territory: The Department of Homeland Security has applied that term to 16 sectors of the economy, including dams, transportation, water plants, health care, energy, the financial industry and government. Both criminal and Kremlin-backed Russian hackers have gone after targets in those fields for more than a decade.

The U.S. hammered that message Thursday, when the Justice Department unsealed indictments against three Russian spies it accused of seeking to breach more than 500 energy-related entities, including the U.S. Nuclear Regulatory Commission and a nuclear power plant in Kansas.

The Biden administrations public alarms about the threats cite the risk of retaliation from a desperate Putin, as victory eludes his forces in Ukraine and Western sanctions devastate Russias economy. But the alerts have focused more on some industries than others.

Were really focusing right now on what we call the lifeline sectors, specifically the communications sector, the transportation sector, the energy sector, the water sector, and then of course the financial services sector, Easterly said during the call this week.

These are some of the areas where the United States is vulnerable:

The U.S. has thousands of power plants, hundreds of thousands of miles of electrical transmission lines and millions of miles of pipelines carrying natural gas, oil or fuels like gasoline. Russia has taken notice, said the FBI, which cautioned in a recent alert to industry partners that hackers there had scanned the computer networks of at least five U.S. energy groups.

Russia has shown its ability to turn out the lights in Ukraine, where cyberattacks in 2015 and 2016 temporarily cut off power in parts of the country. A Russian-based criminal hacking group created similar mischief in the U.S. last spring, when a ransomware attack on Colonial Pipeline cut off gasoline deliveries for much of the U.S. East Coast.

Russia has the ability to execute cyber attacks in the United States that generate localized, temporary disruptive effects on critical infrastructure such as disrupting an electrical distribution network for at least a few hours.

U.S. intelligence communitys Worldwide Threat Assessment, 2019

In 2019, the U.S. intelligence community said in an unclassified assessment that Russia has the capability to disrupt electrical distribution centers in the United States for at least a few hours. One of the DOJ indictments unsealed Thursday detailed an unsuccessful effort by Russian hackers to attack a U.S. energy company with a type of malware that would have given them access to certain control systems.

The one to me at the top of the list is energy, said Jim Richberg, a former U.S. national intelligence manager for cyber and current public cybersecurity executive at Fortinet. The reality is if you take away power, none of the other 15 officially designated critical infrastructure are going to work.

Not all parts of the U.S. energy supply face equal oversight of their cybersecurity practices: The electricity sector has long faced mandatory cyber standards, for example, while the oil and gas pipeline industry is sparring with federal regulators over the governments first-ever attempt to impose similar requirements for those companies.

Cybersecurity experts generally consider financial institutions to be ahead of other industries in their defenses against hacking, in part because they are highly regulated. Cyberattacks that significantly harm banks or other financial companies including insurers, stock or commodity exchanges, payments systems or financial market utilities are relatively rare, according to the Financial Services Information Sharing and Analysis Center, a global cyber information clearinghouse for the industry.

But as financial services increasingly shift online, those risks have accelerated. FS-ISAC raised its threat level from guarded to elevated three times in 2021, up from the once-a-year that was typical in the previous five years.

That threat level is once again elevated, but not yet considered high or severe, FS-ISAC chief executive Steven Silberstein said in a statement Thursday.

This means that the financial sector is in a state of heightened cybersecurity awareness and is taking extra steps to strengthen cyber defenses, he said. At this time, the sector is not seeing any significant increase of attack activity directly attributable to any origin.

The Covid-19 pandemic helped shine a light on vulnerabilities in hospitals and other health-care companies.

The sector is an attractive target for hackers given its trove of valuable information, and because the need to remain operating means that hospitals facing a ransomware attack feel the pressure to pay.

Our organizations are continuously being probed and scanned from Russia, China, Iran and North Korea thousands of times a day, literally, whether its a small critical access hospital or the largest systems.

John Riggi, the national adviser for cybersecurity and risk at the American Hospital Association.

Amid a hacking surge, nearly 50 million people in the U.S. saw their sensitive health data breached in 2021, more than triple 2018s total, according to a POLITICO analysis of data from the Department of Health and Human Services. In addition to being overwhelmed with patients during the pandemic, health care organizations often have meager cybersecurity budgets, according to the most recent Healthcare Information and Management Systems Society cybersecurity survey.

Our organizations are continuously being probed and scanned from Russia, China, Iran and North Korea thousands of times a day, literally, whether its a small critical access hospital or the largest systems, John Riggi, the national adviser for cybersecurity and risk at the American Hospital Association, said last month.

A direct attack on U.S. health care organizations which could threaten patients lives would be more likely if more countries get involved in the war in Ukraine, or if sanctions cripple Russia, experts say.

If NATO gets involved, or if somehow the U.S. gets involved, thats going to change the whole dynamic, said Mac McMillan, CEO of the cybersecurity firm CynergisTek. Russia is being careful not to do anything overtly to the United States at the moment.

These essentials are also vulnerable, as shown in an unsuccessful cyberattack last year on a Florida water treatment plant, in which unidentified hackers tried to inject poisonous levels of lye into a citys water supply. Months later came a ransomware attack on JBS Foods, the worlds largest meat processing company, which contributed to a spike in U.S. consumer prices for pork and other meats. The company eventually agreed to pay $11 million to the hackers, whom authorities identified as a Russian criminal hacker gang.

The JBS attack came after years of warnings that food and agriculture companies werent keeping up with proper cybersecurity protocols, even as the industrys day-to-day operations increasingly relied on the internet and automation. Cybersecurity measures have been mostly voluntary across the massive sector, with virtually no federal rules in place. And while other industries that have formed information-sharing collectives to coordinate their responses to potential cyber threats, the food industry disbanded its group in 2008.

Russias ongoing invasion of Ukraine is a stark reminder that we must protect our ag producers from outside threats that could interrupt the United States food security and critical supply chains, said Sen. Steve Daines (R-Mont.). We need to be doing everything we can to proactively support and defend Americas producers which in turn strengthens our national security.

Air, transit, train, ship and even car travel have also shown themselves vulnerable to various forms of hacking, some more plausible than others.

For aviation, the possible targets include airports flight information display boards, vendor payment systems, parking meters or any technology that can connect to public Wi-Fi, according to a recent report from the Institute for Critical Infrastructure Technology. Airlines booking systems or flight manifests are particularly vulnerable, as shown by repeated computer failures that lead to mass flight cancellations, while hackers have also stolen personal passenger data.

As technology makes planes more interconnected, the Government Accountability Office warned in a 2020 report that critical data used by cockpit systems could be altered, and that malevolent hackers could seek to disrupt flight operations with various types of attacks on navigational data.

In 2017, the giant Danish shipping company Maersk was one of many businesses around the globe crippled by a massive cyberattack later blamed on Russia. And as car manufacturers look toward a future of self-driving cars, the lack of federal regulations around the security of autonomous vehicles could become a security hazard.

The most at-risk targets include small businesses and local governments, which often have little funding for cyber defenses and lack the expertise to counter large hacking outfits. A spree of ransomware attacks in 2019 mired the governments of almost two dozen small towns in Texas, while a Small Business Administration survey found that 88 percent of companies believed they were vulnerable to a cyberattack.

We have a major challenge ahead, and that is to help businesses, particularly small businesses, local governments that are small get prepared for this, Sen. Ron Wyden (D-Ore.), a member of the Senate Intelligence Committee, said Wednesday.

But a determined adversary can penetrate even large companies and federal agencies. That became apparent after the discovery in late 2020 of a sophisticated cyber-espionage campaign blamed on Russian foreign intelligence, which compromised at least 12 federal agencies and 100 private companies.

If you have 3,000 servers if youre a large organization, its easy to gain access to a low-value server or something thats unpatched, said Jonathan Reiber, a top Pentagon cyber official during the Obama administration and current senior director for cybersecurity strategy and policy at AttackIQ. You cant patch every vulnerability right now, today, its not possible.

You have to assume the adversary is going to break past the perimeterso the first step is to assume breach and plan for known threats, Reiber said.

Kate Davidson, Ben Leonard, Meredith Lee, Tanya Snyder, Oriana Pawlyk and Alex Daugherty contributed to this report.

Continue reading here:
The hard truth behind Biden's cyber warnings - POLITICO

Read More..

Avast antivirus | What it is, features, functions and more – New America Media

In the search for internet security, every system is on the hunt for the best safeguard programming for its users. Several types of malware situations can cause great danger to ones devices. This also happens because of the grand level of the page's protection. Thankfully, these issues create a list of consequences that can be avoidable nowadays. Above all, with the use of effectively programmed tools, it can be easier to detect software issues related to dangerous external agents. And on the subject, one of the most effective software existing is Avast Antivirus software.

Avast Antivirus is a protective software with a strong sense of practical internet safety. In addition, its system comes with freeware and paid versions, with s great diversity of functions and features. Here well explain these topics in the best way possible

In between its main functions, Avast Antivirus counts with:

The free version of Avast Antivirus also combines the most advanced cybersecurity system, based on AI. In other words, this system counts with a threat detection network thats made a safer program for over 435 million users. This also allows the system to protect its users from cyberattacks in real-time. In addition, the real-time feature of this system can get to detect every type of malware for its immediate blocking. And at the same time, it analyses the users PC for its complete assuring and security.

Avast Antivirus has got a lot of great functions to offer regardless of the device, including:

For general reasons, Avast Antivirus is still a solid choice for malware treatment on devices. Therefore, it comes with great permanent choices for users for its economical and operational processes. Although theres still a vast variety of antivirus software to choose from, Avast Antivirus will always grant strong virus disinfectant tasks. In a specific sense, Avast Antivirus brings out a safe computing system to boost the devices functionality and effectiveness.

See the article here:
Avast antivirus | What it is, features, functions and more - New America Media

Read More..

Vladimir Putin increases security after invasion of Ukraine: No mobile phone, no internet, and his own army – Marca English

A month after the start of the war in Ukraine and with Russian troops showing no mercy to the civilian population, Vladimir Putin is living in a parallel world. The president, given his past as a spy for the KGB, wants to control everything and fears for his security.

During the war, Russia has been accused of countless war crimes, including the use of unauthorised weapons and executions of civilians.

All of this has been orchestrated by Putin who, according to the BBC, has increased his security amid fears of attacks against him. The Russian Presidential Security Service, which reports to Russia's Federal Security Service (FSO), is responsible for his protection and that of his entourage.

Among the many measures that the Russian leader has in place, the fact that his entourage is divided into four circles stands out.

The first is made up of his bodyguards, the second of guards who go unnoticed in public, the third is in charge of surrounding the perimeter, and the last is made up of snipers posted on building tops.

The BBC has also revealed that Vladimir Putin does not like helicopters, so he travels in a motorcade of motorcyclists, black cars and trucks. On his way, traffic is stopped and any drones are prevented from flying over the area.

To reinforce his security, Putin has his own personal 'army', known as Rosgvardia and supported by the Russian National Guard.

"It's a huge number, security units for presidents in the US are nowhere near that number," Stephen Hall, an academic expert on Russia at the University of Bath in the UK, told the BBC.

Given the scale of Russia's actions in Ukraine, Vladimir Putin trusts no one and fears he will be poisoned. For this reason, the president has his own taster, who is responsible for tasting food before he does.

Such is the former KGB spy's obsession that, at toasts, he usually drinks from a bottle brought to him by his team and not from the one drunk by the rest, as Mark Galeotti explains in BBC's Mark Galeotti.

Another sign that Putin's paranoia has only increased with each passing day is that he does not use mobile phones or the internet. He is afraid of being tracked and all the documentation he handles is on paper, to prevent outside agencies such as the CIA from spying on him.

In recent months, Putin's public appearances have also declined, largely because of the pandemic. But everything has worsened since the start of the war, since which the Russian is rarely seen and his circle is increasingly closed.

Continue reading here:
Vladimir Putin increases security after invasion of Ukraine: No mobile phone, no internet, and his own army - Marca English

Read More..

What is Session Hijacking and How to Prevent It – TheWindowsClub

This article is about Session Hijacking and the ways to prevent it. But before we proceed with it, let me first tell you what a Session is.The total time you devote to your internet activity is called a Session. A session starts as soon as you log into a website or a service and ends when you end the connection or shut down your computer system. All your internet activity details are stored in a session temporarily.

When a Session is a time when you are on the internet, Session hijacking means an attack over your internet session and the most common example one can give here is that, when you are using internet banking to check your bills or to do some transaction, an attacker can take over your internet session and hijack it. Session hijacking is usually done using web applications or browser sessions.A session hijacker can get complete access to your session and can do anything you could do on that website.

Lets learn about a few more examples of Session Hijacking so that you can avoid them.

Session Hijacking can be done in three different types

In the Active session hijacking, the attacker attacks your active internet connection, which means, hijacking your internet session while you are logged in and the other is passive session hijacking wherein the attacker monitors your session and steals the information exchanged between you and the server. In a hybrid hijack, the attackers monitor the network session and then attack as soon as they find the way.

Read:What are Cloud Security Challenges, Threats and Issues

Session Hijacking undoubtedly is one of the most common cyber-crime and is pretty scary too, but we can certainly prevent it with some simple measures. These attacks can really bring some terrible consequences for business organizations including data theft, financial losses, and much more.

As we can see most of the attacks happen through malicious links, the best way to prevent these attacks is to be watchful and check if a doubtful link is safe or not. The attackers use very catchy and tempting phrases like, click on this link to claim your prize or they may try to scare you by saying, Is this you in this video,to trick you but you should not click on any link until it is from a verified and legitimate sender.

Organizations can add certain encryptions to avoid such session hijacking on their official websites and accounts. Certificates like SSL (Secure Sockets Layer) and TLS (Transport Layer Security) safeguard your data online and also make your internet connectin secure enough for the attackers to enter.

HTTPS (Hypertext transfer protocol secure) is a better and more secure version of HTTP. Especially the websites that require login details. HTTPS makes sure that the website has the SSL and TLS certification throughout the session and ensures the increased security of data transfer. Also, popular web browsers like Google Chrome flag all the non-HTTPS websites as unsafe, and you get a warning message too.

Make sure that your PC and the operating system are updated regularly. Protect your PC from viruses by using good antivirus software. Also, keep updating and patching your web browsers on a regular basis.

Make sure that you log out of all your active internet sessions after you are done with the work there. While most of the banking websites end the session automatically at a set time, you should also log out of the shopping websites when not in use.

This is actually the best thing you can do to avoid session hijacking. Avoid using public WiFi and public computers, especially to access your banking websites or any website that requires your login credentials. If you have to use public WiFi, make a VPN (Virtual Private Network) to make sure that no one intrudes.

A session is said to be hijacked when an attacker intrudes in your session and takes full control. The attackers most of the time impersonate themselves like you and steal all your important data stored on the webserver.

Read: Internet Security article and tips for Windows users

Yes, a VPN established the internet connection through a private tunnel and hides your IP address. It also keeps your internet activity secret making it almost impossible for the attackers to intrude.

Go here to read the rest:
What is Session Hijacking and How to Prevent It - TheWindowsClub

Read More..

Global Internet of Things Security Market Top Players Ananlysis: Intel, Verizon Enterprises Solutions, Symantec, PTC Inc., Check Point Security…

The global Internet of Things Security market report is an overview of the Internet of Things Security Market industry in the context of its economical and geographical importance. The status of the Internet of Things Security industry in terms of production, consumption, growth projections, trade, and more such market aspects are studied in the report. Additionally, the report outlines the manufacturing industries, operational processes, distribution networks, sales channels, and the overall domestic and global supply chain. The annual production of the products or goods in the listed countries in million tonnes is mentioned in the report in the form of pictorial representations like graphs and indexes.

Key Players in the Internet of Things Security market:

IntelVerizon Enterprises SolutionsSymantecPTC Inc.Check Point Security Software Technologies Ltd., Cisco Systems, Inc., IBM Corporation, Infineon Technologies, Gemalto NV, and AT&T Inc.Symantec CorporationIBMInfineon TechnologiesTrustwaveCisco Systems

Request a sample report : https://www.orbismarketreports.com/sample-request/144744?utm_source=Rohit

The report provides comprehensive data on the global Internet of Things Security market by geography, share of overall industry production by region, and highlights the leading producing countries in the region. The exports and imports of the goods and products by region, the trade balance by region along with the industrial employment by region is studied in the report. Also, the report studies the impact of trade on the major regions in the market. The regional analysis determines the opportunities and threats that exist within the competitive environment of the region. The report helps understand the market conditions, demand & supply, and financial returns of investing in the regions.

Internet of Things Security Market Types:

Network SecurityEndpoint SecurityApplication SecurityCloud SecurityOthers

Internet of Things Security Market Applications:

HealthcareInformation Technology (IT)Telecom BankingFinancial Services and Insurance (BFSI)AutomotiveOthers

To offer a detail analysis of the global Internet of Things Security market the report has fragmented the industry based on price, type, end use, region, application, and buying patterns. The report does a comprehensive mapping of the competitive landscape of the segments. Most importantly, the report studies the impact of Covid-19 on the segments and how they are sustaining in the fast-evolving markets. Moreover, the report analyzes the drivers and opportunities of investing in the segments and growth forecast from the year 2022-2027. The report defines the scope of the segments and their direct impact on the total revenue of the Internet of Things Security industry.

Highlights of the Report:

The report evaluates the digital disruption taking place in the market and the new technologies that can mitigate the challenges are included in the report.

The report includes valuable inputs and suggestions from the industry experts.

The report studies Internet of Things Security industrys primary, secondary, and tertiary sectors.

The segments that have experienced upward trend and those segments that have seen downward trend since the pandemic are included in the report.

The report forecasts global Internet of Things Security market mergers and acquisitions activities in 2020 that have led the foundation for further growth of global Internet of Things Security market.

Do Inquiry before Accessing Report at: https://www.orbismarketreports.com/enquiry-before-buying/144744?utm_source=Rohit

About Us:

Orbis Research (orbisresearch.com) is a single point aid for all your market research requirements. We have a vast database of reports from leading publishers and authors across the globe. We specialize in delivering customized reports as per the requirements of our clients. We have complete information about our publishers and hence are sure about the accuracy of the industries and verticals of their specialization. This helps our clients to map their needs and we produce the perfect required market research study for our clients.

Contact Us:

Hector CostelloSenior Manager Client Engagements4144N Central Expressway,Suite 600, Dallas,Texas 75204, U.S.A.Phone No.: USA: +1 (972)-362-8199 | IND: +91 895 659 5155Email ID: [emailprotected]

View post:
Global Internet of Things Security Market Top Players Ananlysis: Intel, Verizon Enterprises Solutions, Symantec, PTC Inc., Check Point Security...

Read More..

Serious Security: DEADBOLT the ransomware that goes straight for your backups – Naked Security

In January 2021, reports surfaced of a backup-busting ransomware strain called Deadbolt, apparently aimed at small businesses, hobbyists and serious home users.

As far as we can see, Deadbolt deliberately chose a deadly niche in which to operate: users who needed backups and were well-informed enough to make them, but who didnt have the time or funds to give their backup routine the attention it really deserved.

Many ransomware attacks unfold with cybercriminals breaking into your network, mapping out all your computers, scrambling all the files on all of them in unison, and then changing everyones wallpaper to show a blackmail demand along the lines of, Pay us $BIGVAL and well send you a decryption key to unlock everything.

For large networks, this attack technique has, sadly, helped numerous audacious criminals to extort hundreds of millions of dollars out of organisations that simply didnt have any other way to get their business back on track.

Deadbolt, however, ignores the desktops and laptops on your network, instead finding and attacking vulnerable network-attached storage (NAS) devices directly over the internet.

To be clear, the decryption tools delivered by todays cybercriminals even when the amount involved is hundreds of thousands or millions of dollars routinely do a mediocre job. In our State of Ransomware 2021 survey, for example, half of our respondents who paid up nevertheless lost at least a third of their data. In fact, a third of them lost more than half of the data they paid to recover, and a disastrously disappointed 4% paid full price but got nothing back at all.

By exploiting a security vulnerability in QNAP products, the Deadbolt malware didnt need to get a foothold on your laptop first, and then to spread sideways through your home or business network.

A remote code execution (RCE) hole identified in QNAPs security advisory QSA-21-57 could be exploited to inject malicious code directly onto the storage device itself. (Like many internet-connected hardware devices, the affected products run a customised Linux distribution.)

So, if youd inadvertently set up your backup device so that its web portal was accessible from the internet side of your network connection the port thats probably labelled WAN on your router, short for wide-area network then anyone who knew how to abuse the security hole patched in QSA-21-57 could attack your backup files with malware.

In fact, if you were in the habit of looking at your device only when you needed to recover or review files you didnt have space to keep live on your laptop, you might not have realised that your files had been scrambled until you next went to the web interface of your NAS.

When you got there, however, youd be in no doubt at all what had happened to your data, because the Deadbolt attackers deliberately modified the portal page of the NAS itself to confront you with the grim news:

Intriguingly, the criminals behind this attack dont supply you with an email address or a website by which to get in touch.

The crooks instruct you to contact them simply by sending the blackmail money to a specific Bitcoin address (in current attacks, theyre demanding BTC 0.03, presently about $1250 [2022-03-23T15:00Z]).

They promise to send you the 16-byte decryption key you need via a return transaction, encoding the data as a transaction message on the public Bitcoin blockchain:

The business of using cryptocurrency blockchains for exchanging messages with cybercriminals is common these days. In the infamous Poly Networks hack, where a crook stole cryptocoins collectively worth about $600,000,000, the company notoriously negotiated with the attacker via messages on the Ethereum blockchain. After sending a rather bizarrely worded series of justifications for the cryptocrime, the attacker suddenly messaged 52454144 5920544f 20524554 55524e20 54484520 46554e44 21, which comes out as READY TO RETURN THE FUND! Poly Networks began referring to him as Mr White Hat; agreed he could keep $500,000 as a curious sort of bug bounty; and ultimately, if amazingly, got the lions share of the missing cryptocoins back.

Also, perhaps taking a leaf out of the playbook tried by the Kaseya ransomware criminals, the Deadbolt crew have included what you might call a meta-blackmail demands aimed at QNAP, the makers of the device itself.

For BTC 5 (just over $200,000 today), the crooks claim that theyll reveal the vulnerability to QNAP, although that offer seems redundant in March 2022 given that QNAPs QSA-21-57 bulletin states that it identified and patched the hole itself back in January this year.

And for BTC 50 (more than $2 million today), the crooks promise to provide a magic all-you-can-eat buffet ticket that will decrypt any device infected with the current strain of Deadbolt malware:

The Kaseya gang notoriously demanded $70,000,000 for their ultimate decryptor. (Whether that was in the hope that victims might rally together and actually pay up, or simply to thumb their noses at the world, we couldnt tell at the time.)

Interestingly, with one of the alleged perpetrators of the Kaseya attack now awaiting trial in Texas, we may yet find out more about that $70m blackmail note:

The good news in the Deadbolt story is that QNAP not only published a patch for the QSA-21-57 vulnerability back in January 2021, but also apparently went on to take the unusual step of automatically pushing out that update even to devices with automatic updating turned off.

The bad news is that the online internet security scanning service Censys is reporting that Deadbolt infections have suddenly leapt back onto its radar, with more than 1000 affected devices showing up in the past few days.

As it happens, spotting devices affected by this malware is fairly easy.

If a publicly accessible IP number has a listening HTTP server, then the first few lines of HTML sent back in the web servers main page will give away whether that the server has already been scrambled by Deadbolt (or, alternatively, that its deliberately pretending to have been attacked).

As you can see in the screenshots above, the Deadbolt extortion page has a dramatic, all-caps title that is easy to detect using a simple text search at the top the HTML page, which starts like this:

What we cant tell you is why these infections have returned.

Admittedly, 1000 visibly affected devices is a tiny number against the size of the global internet and the huge number of devices QNAP has sold, so its perfectly possible that these numbers have arisen entirely from devices that failed to update back in January and February, despite QNAPs efforts to update everyone regardless of their auto-update settings.

Its also possible that the crooks behind Deadbolt have come up with a brand new exploit, or a variation on the exploit they used before, though you might expect a bigger surge in new Deadbolt infections if the crooks really had come up with a fresh attack.

And its even possible that some unpatched devices that were theoretically at risk before, but werent exposed to the internet, have recently been opened up to attack by users hurriedly reviewing and revising their network configurations and perhaps promising themselves to make more backups more often in the light of current cybersecurity anxieties provoked by the war in Ukraine.

We suspect, however, that the Deadbolt crooks, or someone associated with them, simply decided to have another try, on the grounds that what worked before might very well work again.

Whatever the reason, youll be happy to know that no one seems to have paid up, because the Bitcoin address redacted in the screenshots above (we saw just one address, for victims and QNAP alike, in all the recent samples we looked at) currently shows a balance of zero, and an empty transaction history.

Fascinatingly, the Deadbolt crooks have left a tempting but as-good-as-impossible clue to that 50-bitcoin master decryption key, right in the blackmail page they install on each infected device.

If you enter a decryption key, the web page itself checks to see if its valid before activating the decryptor, presumably to prevent you from decrypting the data with the wrong key, which were guessing would leave you with doubly-encrypted, garbled data rather than stripping off the encryption originally applied.

To prevent you simply reading the decryption key out of the JavaScript source, the web page checks that the decryption key you enter has the SHA-256 hash it expects, rather than directly comparing your input with a text string stored in the code.

And although you can easily go forwards from the correct key to the matching hash, SHA-256 is specifically designed so you cant go the other way, thus allowing the right password to be verified if you know it already, but not to be recovered if you dont:

As you can see, theres a test for the one-off key unique to your infected device, but theres also a test that claims to check whether youve put in the multi-million dollar master key offered for sale to QNAP.

So, if you can figure out the input data that would produce a SHA-256 hash of 93f21756 aeeb5a95 47cc62de a8d58581 b0da4f23 286f14d1 0559e6f8 9b078052

youve just cracked this particular ransomware for everyone.

Heres our advice for protecting specifically against this malware, as well as protecting generally against network attacks of this sort:

When it comes to backups, you might find the 3-2-1 rule handy.

The 3-2-1 principle suggests having at least three copies of your data, including the master copy); using two different types of backup (so that if one fails, its less likely the other will be similarly affected), and keeping one of them offline, and preferably offsite, so you can get at it even if youre locked out of your home or office.

Remember to encrypt your backups so that stolen backup devices cant be accessed by the thieves.

If you dont have the experience or the time to maintain ongoing threat response by yourself, consider partnering with a service like Sophos Managed Threat Response. We help you take care of the activities youre struggling to keep up with because of all all the other daily demands that IT dumps on your plate.

Not enough time or staff? Learn more about Sophos Managed Threat Response:Sophos MTR Expert Led Response24/7 threat hunting, detection, and response

Original post:
Serious Security: DEADBOLT the ransomware that goes straight for your backups - Naked Security

Read More..