Page 4,029«..1020..4,0284,0294,0304,031..4,0404,050..»

Whats the outlook for Litecoin in 2020? – Coin Rivet

Originally created by former Google employee and later CTO of Coinbase Charlie Lee, Litecoin (LTC) was one of the first serious altcoin projects developed with an actual purpose.

While Bitcoin was seen as digital gold and a potential long-term store of value, Litecoin was created to be silver and used for everyday purposes.

In essence, Litecoin possesses many of Bitcoins features, but is lighter to carry and faster to transact. Lee believes the goal and mission of Litecoin is to be a live testnet for Bitcoin.

LTC has had a turbulent time in 2019, but how will Litecoin fare in 2020? Will higher volumes and fresh cash spur a new bull run after the disappointment of the halving?

Essentially, for any price appreciation to happen, we need serious volume coming into the cryptocurrency market.

In the short term, the outlook for Litecoin is quite grim.

Prior to mid-June, the altcoin was the best performing digital asset of 2019, growing more than 170% in fewer than 90 days and peaking at around $145. However, the uptrend sparked by the Litecoin halving did not last.

The reality is that the Litecoin halving, which took place a few months back, may have been a buy the rumour, sell the news type of event. Seasoned traders took profits weeks before it took place.

A serious summer downtrend then saw LTC tumble to around $49 before a market-wide pump last month following Chinese President Xi Jinpings bullish comments on blockchain.

However, the positive sentiment seems to have faded away again and LTC is back in a downtrend.

In Bitcoin terms, the outlook is even worse.

Looking at the chart above, we can immediately conclude that LTC is near its yearly low against Bitcoin.

At the moment, LTC is just above its 20-day EMA, sitting around 607,800 sats. Volume-wise, price is finding some weak support close to a key level, between 600,000 and 710,000 sats. The next strong level of resistance should be felt around 900,000 sats.

If LTC is able to break above the 50-day EMA and sustain some support below the 200-day EMA, we could see a sudden shift in investor preferences. However, for the time being, it looks like Litecoin is in for a period of accumulation.

Given Litecoins overall panorama, both in terms of USD and BTC, one could argue the altcoin is posed for a positive run during 2020.

For Litecoin to start a serious bull run, I believe fresh cash needs to come into Bitcoin initially before investors and traders move some gains into LTC.

The reason why I argue BTC has to pump first is due to historical reasons. Looking at both charts, it seems LTC/BTC moves before LTC/USD.

Therefore, I believe we could potentially see a mini-rally before May 2020 given the upcoming Bitcoin halving, which will reduce Bitcoins block reward by 50%.

During 2019, LTC pumped prior to its own halving, which took price close to all-time highs in Bitcoin terms.

If Bitcoin recovers to its 2019 highs, around $14,000, we could definitely see some of the gains trickling down into the top altcoins such as Litecoin.

Charlie Lee has also confirmed privacy is on the horizon for Litecoin next year.

Litecoin is making moves to add privacy features through the Mimblewimble protocol.

According to Lee:

Were working with the Grim++ developers to add an implementation of Mimblewimble. It adds an extension block to the Litecoin main-chain. You can transact between chains to use enhanced privacy.

The goal would be to give Litecoin users improved privacy features when transacting.

If theres an altcoin fundamentally ready for a new push, LTC seems to be the one.

Will LTC moon in 2020?Well have to wait and see.

Safe trades!

Go here to see the original:
Whats the outlook for Litecoin in 2020? - Coin Rivet

Read More..

Ethereum Classic is the Top Altcoin in Daily Active Addresses, Heres Why – Coingape

Ethereum Classic (ETC) ranks as the second largest blockchain in number of active addresses, only behind Bitcoin (BTC). Currently at 479,000 active addresses, ETC boasts of a larger user base than Ethereum (ETH), Tron (TRX), and Dash (DASH) with 200k, 67k and 93k daily active addresses respectively. The recent spike in daily active addresses may be a factor of the increasing developer activity on the blockchain and recent launch of futures contracts on ETC.

As explained above, the number of daily active addresses on ETC soared to 479, 030 daily active addresses on December 8th from 433, 880 active addresses the previous day. This set it as the top altcoin across the industry and the second highest daily active addresses behind Bitcoin with 587,010 active addresses.

ETC has been on the back foot of its higher fork, Ethereum, since the two chains forked with a contingent choosing to stay on the original chain, now ETC. Since then Ethereum has had the upper hand in both price and active users on the chain but the latter changed in late September as the ETC users spiked above Ethereum for the first time since the fork.

ETC users soared to 1.02 million daily active users on 29th September, ETH had 231,660 daily active users the same day, before a short reversal saw the number plummet to about 11,000 daily users in a week. While Ethereums daily active users remained rather constant during the week, ETC shot up to 4 million daily active users on 10th October before crashing to 16,000 active users in the next 48 hours.

Since the start of November, ETC users have been on a climb securing the second position with over 400,000 daily active users since the end of October.

The hike in number of daily active addresses signals a possible hike in developer activity on the platform, Ethereum Classic. The surge in popularity of the blockchain further explains users coming on to the platform due to increased decentralized applications built on ETC. According to Dapp Direct, an independent analysis firm, Saturn Protocol remains the top dApp on the Ethereum classic platform with over 40 users on the platform in the past 72 hours.

Notwithstanding, OKEx introduced the ETC/USDT futures contracts, enticing traders to trade and bet on the future price of ETC. The price of ETC has remained relatively constant at $3.96 USD over the past few days since the announcement by OKEx on Saturday. Since the announcement, the daily active addresses on ETC saw a massive 10% increase in number.

The soaring nature of ETC in other aspects of the blockchain signals a bullish stance for the coin in the near future and a $5 USD price looks set on the horizon.

Summary

Article Name

Ethereum Classic is the top altcoin in daily active addresses

Description

Ethereum Classic (ETC) ranks as the second largest blockchain in number of active addresses, only behind Bitcoin (BTC). Currently at 479,000 active addresses, ETC boasts of a larger user base than Ethereum (ETH), Tron (TRX), and Dash (DASH) with 200k, 67k and 93k daily active addresses respectively.

Author

Lujan Odera

Publisher Name

Coingape

Publisher Logo

Share on Facebook

Share on Twitter

Share on Linkedin

Share on Telegram

See the original post here:
Ethereum Classic is the Top Altcoin in Daily Active Addresses, Heres Why - Coingape

Read More..

Nike Shoes and Ethereum? Why Not – Altcoin Buzz

The behemoth sports manufacturer, Nike, has obtained a patent to tokenize shoes on the Ethereum blockchain.

The US patent and trademark office released a report on December 10, 2019.Nike pointed out that its intention is to produce special identities. And create ERC721 tokens for its sneakers. Also adding that users can easily unlock the tokens by buying real-time shoes. The tokens will include special owner IDs. Besides, they will be capable of recording genotype data of a virtual shoe, for instance, colors, styles, attributes, and background.

Interestingly, the patent provides users with more control over their shoes and the design. The application also disclosed that every owner has the ability to set some limits. For instance, regarding how many copies of these shoes, others may clone or generate. Concurrently, there are some features of surrogacy that permit others to combine shoe designs. The patent also comes with parenting features. These allow third parties to sort of take care of these shoes.

Concurrently, the ownership rights for every successive production of a virtual shoe may belinked back to its authentic, real-time shoes. An encryption key will power this process. The key is closely associated with the digital product, according to the report.

The fact that Nike takes interest in tokenizing shoes is hardly a surprise. Some point out that in China, Nikesaw a 22% quarterly revenue jump this September. Why? Because the Chinese are apparently into limited-edition footwear. Thus, such a move by Nike may become profitable and hence the decision to allow customizing shoes.

To remind, in April, Nike announced that it is gearing up for the launch of its own crypto, Cryptokicks.

Previously, Altcoin Buzz reported about Swiss-based digital payments processor Utrust that has partnered with Alternative Airlines to facilitate crypto payments.

Read more:
Nike Shoes and Ethereum? Why Not - Altcoin Buzz

Read More..

How to Keep a Security Breach Out of your Internet-Connected Stocking this Christmas – Forbes

ID 63400131 Gstockstudio1 | Dreamstime.com

With every passing holiday season, the number of Internet-connected, electronic devices that fill our homes continues to grow, from smart assistants like Amazon Alexa and Google Home, to the video-doorbell Ring, to the now-ubiquitous Nest thermostat. These Internet-of-Things (IoT) devices have quickly changed our daily lifestyles, and we dont expect this trend to slow down anytime soon.

As the number of consumer-focused IoT devices continues to expand, businesses are quietly increasing their use of Internet-connected devices as well. These devices include broadly used technology such as printers, security cameras, Bluetooth keyboards and HVAC systems, as well as industry-specific devices such as manufacturing sensors, MRI machines, metal detectors and more. And as the use of all these devices grows, the potential security threats associated with them increase as well. Simply put, more Internet connections and endpoints in a business means more opportunities for hackers to exploitbut unfortunately, many businesses are not set up to deal with this issue.

Its a growing concern for businesses in a diverse set of industries. Gartner predicts that the overall enterprise and automotive IoT market will grow to 5.8 billion endpoints in 2020 (growing 21% year-over-year). Enterprises in sectors including healthcare, manufacturing, hospitality, retail and others have realized that the number of unmanagedand sometimes even unknownIoT devices in their facilities continues to grow, raising management and security concerns.

A recent Forrester survey of 403 technology decision-makers in business found that 69% of them estimated that half of all devices on their enterprise networks were IoT devices that could not be managed via traditional security tools. As a result, 79% of these executives were very to extremely concerned about device security.

This new, hyper-connected environment has already spawned high-profile security attacks. The WannaCry ransomware crypto-worm famously infected more than 230,000 computers in 150 countries and took down half of the hospitals in the UK, after malware infected out-of-date Windows XP devices. The U.S., U.K. and Australia publicly said North Korea was behind the attack. There also have been more pointed, and creative IoT-related security incidents: Hackers stole a reported 40 million customer credit-card numbers from Target due to a breach of a third-party HVAC system used by the company, and security company Darktrace said last year that hackers stole a casinos database of high-roller gamblers via a thermometer in a lobby aquarium.

Often, device manufacturers do not develop their products with security in mind, which increases the need for companies to deploy technology and policies to discover, manage and enforce the use of IoT devices. We think there is a sizable market for such solutionswhich is one reason were excited to announce our investment today in Ordr*.

Ordr, based in Santa Clara, Calif., has an innovative approach to securing managed and unmanaged IoT devices. Taking a network approach by focusing at the device packet-flow level, Ordrs technology can take inventory of devices, monitor their behavior and create a device flow snapshot to understand vulnerabilities in a network and provide protection against intruders. By doing so, Ordr allows security teams to write policies for firewalls and to micro-segment devices on networks so they only connect with other devices and networks that they need to. The technology also provides insight into all devices across a network in a single view.

The company is led by experienced network-and-security executives including CEO Greg Murphy, the former CEO of Zenreach who was previously the VP of business operations at Aruba Networks; Chief Product Officer Pandian Gnanaprakasam, previously the chief development officer and VP engineering at Aruba; and Chief Scientist Sheausong Yang, the former chief architect and VP technology at Aruba.

Ordrs products help security personnel address a top budget priority while supporting the rapid expansion in IoT devices, which are increasingly needed by companies becoming more software-centric in this age of digital transformation. We are excited to partner with the Ordr team to help promote a more connected, but also secure, business environment.

More here:
How to Keep a Security Breach Out of your Internet-Connected Stocking this Christmas - Forbes

Read More..

Internet Security Market: Deep Analysis by Production Overview and Insights 2019-2025 – Drnewsindustry

The Report Titled on Global Internet Security Market Size, Status and Forecast 2025 firstly introduced the Internet Security basics: Definitions, Classifications, Applications And Market Overview; product specifications; manufacturing processes; cost structures, raw materials and so on. This Internet Security industry report also provide crucial insights that facilitate theInternet Security Market Trends, Drivers, Market Dynamics, Opportunities, Competitive Landscape, Share via Region, Price and Gross Margin, New Challenge Feasibility Evaluation, Analysis and Guidelines on New mission Investment. In the end, there are 4 key segments covered in this Internet Security market report: competitor segment, product type segment, end use/application segment and Internet Security industry geography segment.

Get Free Sample PDF (including full TOC, Tables and Figures)of Internet Security[emailprotected]https://www.researchmoz.us/enquiry.php?type=S&repid=1871684

Internet Security Market Analysis by Players: This report includes following top vendors in terms of company basic information, product category, sales (volume), revenue (Million USD), price and gross margin (%).

HPE IBM Intel Symantec AlienVault BlackStratus Check Point Software Technologies Cisco Cyren Fortinet F-Secure Gemalto Kaspersky Lab Microsoft Palo Alto Networks RSA Sophos Trend Micro Trustwave Holdings Wurldtech Security Technologies

Scope of Internet Security Market:Internet security is a branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level, as it applies to other applications or operating systems as a whole. Its objective is to establish rules and measures to use against attacks over the Internet.

Split by Product Types, with production, revenue, price, and market share and growth rate of Internet Security market in each type, can be divided into:

Malicious software Denial-of-service attacks Phishing Application vulnerabilities

Split by applications, this report focuses on consumption, market share and growth rate of Internet Security market in each application, can be divided into:

Government Banking financial services and insurance (BFSI) Manufacturing Information communication and technology (ICT) Retail Healthcare

Do You Have Any Query Or Specific Requirement? Ask to Our Industry[emailprotected]https://www.researchmoz.us/enquiry.php?type=E&repid=1871684

Geographically, the report includes the research on production, consumption, revenue, Internet Security market share and growth rate, and forecast (2019-2025) of the following regions:

Key highlights of Internet Security market report include:

Overview of Key Market Forces Propelling and Restraining Internet Security market growth.

Up-to-date analyses of Market Trends and Technological Improvements of Internet Security market.

Pin-point analyses of Internet Security market competition dynamics to offer you a competitive edge.

An analysis of Strategies of Major Competitors.

An array of graphics and SWOT analysis of major Internet Security market segments.

Detailed analyses of Internet Security industry trends.

Contact:

ResearchMozMr. Nachiket Ghumare,Tel: +1-518-621-2074USA-Canada Toll Free: 866-997-4948Email:[emailprotected]

Browse More Reports Visit @https://bit.ly/2Sepby2

View original post here:
Internet Security Market: Deep Analysis by Production Overview and Insights 2019-2025 - Drnewsindustry

Read More..

The Great $50M African IP Address Heist – Krebs on Security

A top executive at the nonprofit entity responsible for doling out chunks of Internet addresses to businesses and other organizations in Africa has resigned his post following accusations that he secretly operated several companies which sold tens of millions of dollars worth of the increasingly scarce resource to online marketers. The allegations stemmed from a three-year investigation by a U.S.-based researcher whose findings shed light on a murky area of Internet governance that is all too often exploited by spammers and scammers alike.

There are fewer than four billion so-called Internet Protocol version 4 or IPv4 addresses available for use, but the vast majority of them have already been allocated. The global dearth of available IP addresses has turned them into a commodity wherein each IP can fetch between $15-$25 on the open market. This has led to boom times for those engaged in the acquisition and sale of IP address blocks, but it has likewise emboldened those who specialize in absconding with and spamming from dormant IP address blocks without permission from the rightful owners.

Perhaps the most dogged chronicler of this trend is California-based freelance researcher Ron Guilmette, who since 2016 has been tracking several large swaths of IP address blocks set aside for use by African entities that somehow found their way into the hands of Internet marketing firms based in other continents.

Over the course of his investigation, Guilmette unearthed records showing many of these IP addresses were quietly commandeered from African businesses that are no longer in existence or that were years ago acquired by other firms. Guilmette estimates the current market value of the purloined IPs hes documented in this case exceeds USD $50 million.

In collaboration with journalists based in South Africa, Guilmette discovered tens of thousands of these wayward IP addresses that appear to have been sold off by a handful of companies founded by the policy coordinator for The African Network Information Centre (AFRINIC), one of the worlds five regional Internet registries which handles IP address allocations for Africa and the Indian Ocean region.

That individual Ernest Byaruhanga was only the second person hired at AFRINIC back in 2004.Byaruhanga did not respond to requests for comment. However, he abruptly resigned from his position in October 2019 shortly after news of the IP address scheme was first detailed by Jan Vermeulen, a reporter for the South African tech news publication Mybroadband.co.za who assisted Guilmette in his research.

KrebsOnSecurity sought comment from AFRINICs new CEO Eddy Kayihura, who said the organization was aware of the allegations and is currently conducting an investigation into the matter.

Since the investigation is ongoing, you will understand that we prefer to complete it before we make a public statement, Kayihura said. Mr. Byauhangas resignation letter did not mention specific reasons, though no one would be blamed to think the two events are related.

Guilmette said the first clue he found suggesting someone at AFRINIC may have been involved came after he located records suggesting that official AFRINIC documents had been altered to change the ownership of IP address blocks once assigned to Infoplan (now Network and Information Technology Ltd), a South African company that was folded into the State IT Agency in 1998.

This guy was shoveling IP addresses out the backdoor and selling them on the streets, said Guilmette, whos been posting evidence of his findings for years to public discussion lists on Internet governance. To say that he had an evident conflict of interest would be a gross understatement.

For example, documents obtained from the government of Uganda by Guilmette and others show Byaruhanga registered a private company called ipv4leasingafter joining AFRINIC.Historic WHOIS records from domaintools.com [a former advertiser on this site] indicate Byaruhanga was the registrant of two domain names tied to this company ipv4leasing.org and .net back in 2013.

Guilmette and his journalist contacts in South Africa uncovered many instances of other companies tied to Byaruhanga and his immediate family members that appear to have been secretly selling AFRINIC IP address blocks to just about anyone willing to pay the asking price. But the activities of ipv4leasing are worth a closer look because they demonstrate how this type of shadowy commerce is critical to operations of spammers and scammers, who are constantly sullying swaths of IP addresses and seeking new ones to keep their operations afloat.

Historic AFRINIC record lookupsshow ipv4leasing.org tied to at least six sizable blocks of IP addresses that once belonged to a now defunct company from Cameroon called ITCthat also did business as Afriq*Access.

In 2013, Anti-spam group Spamhaus.org began tracking floods of junk email originating from this block of IPs that once belonged to Afriq*Access. Spamhaus says it ultimately traced the domains advertised in those spam emails back to Adconion Direct, a U.S. based email marketing company that employs several executives whoare now facing federal criminal charges for allegedly paying others to hijack large ranges of IP addressesused in wide-ranging spam campaigns.

Anyone interested in a deeper dive on Guilmettes years-long investigation including the various IP address blocks in question should check out MyBroadbands detailed Dec. 4 story, How Internet Resources Worth R800 Million (USD $54M) Were Stolen and Sold on the Black Market.

Tags: Adconion Direct, AFRINIC, Afriq*Access, Eddy Kayihura, Infoplan, ipv4leasing, ITC, Jan Vermeulen, Mybroadband.co.za, Ron Guilmette, The African Network Information Centre

This entry was posted on Wednesday, December 11th, 2019 at 5:31 pmand is filed under A Little Sunshine, Web Fraud 2.0.You can follow any comments to this entry through the RSS 2.0 feed.You can skip to the end and leave a comment. Pinging is currently not allowed.

See the original post here:
The Great $50M African IP Address Heist - Krebs on Security

Read More..

Avast announces cybersecurity predictions for 2020, expects rise in mobile scams and IoT Malware – Gadgets Now

Internet security provider Avast has released its annual Threat Landscape Report with cybersecurity predictions list for the year 2020. According to the company, mobile scams, sophisticated mailspam, IoT malware and botnets will be major security threats in 2020. It anticipates that a greater focus will also be placed on data privacy in the field of Artificial Intelligence (AI) in the coming year. The report says that 2020 may see an advancements in terms of how malware is delivered to PCs with more sophisticated methods of spreading threats being deployed. Avasts head of the threat intelligence systems, Jakub Kroustek said, Cybercriminals are constantly innovating and looking for new ways to circumvent todays powerful personal and business security solutions. Not only is it harder for people to spot malicious emails or suspicious links and attachments, making attacks more likely to be successful, but the exploitation of RDP vulnerabilities to spread worm-like strains of threats could have significant impact.On the mobile side, Avast predicts that more subscription scams and fake apps will make their way onto official app store. More iOS vulnerabilities will be exposed by security researchers, it adds. Nikoloas Chrysaidos, Head of Mobile Threat Intelligence and Security at Avast, said Getting malicious apps onto the Google Play Store and the Apple App Store is not an easy task, which is why cybercriminals are shifting towards subscription scams, and fake apps integrated with aggressive adware to make money. According to the report, Internet of Things (IoT) devices will become an even greater target for hackers in the year 2020. As more and more smart devices will be used by vendors to collect more data about users in order to learn and predict their behavior, peoples control over their privacy will be limited. Security researcher Daniel Uhricek says that malware authors will continue to build upon older, already established malware families, expanding them with newly released exploits to widen their IoT attack surface. The year 2020 also expects to see practical applications of AI algorithms, including differential privacy, to profit from big data insights as we do today, but without exposing all the private details, says Rajarshi Gupta, Head of Artificial Intelligence at Avast.

Read more here:
Avast announces cybersecurity predictions for 2020, expects rise in mobile scams and IoT Malware - Gadgets Now

Read More..

Office and Penetration Testing Software Increasingly Becoming Vectors for Malware – Campus Technology

Research

Half of all malware that tried to infect computers during the third quarter of 2019 was already known, according to a newreportfrom WatchGuard Technologies. The other half was "zero-day" malware, which bypassed (and therefore went undetected by) traditional signature-based security software. On its list of the top-10 malware attacks for a three-month period, WatchGuardidentified several Apache Struts vulnerabilities, which the cybersecurity company identified as the same type of malware used in the Equifax data breach. In its report, WatchGuard also highlighted an increase in the use of Microsoft Office exploits as well as "legitimate penetration testing tools" for delivering computer infections.

The bulk of the content for the latest "Internet Security Report" is generated and collected by willing participants using the company's products, including its Firebox firewall appliances and software, and DNS-level protection services.

Among the many findings shared in the report are these:

Overall network attacks rose by 8 percent quarter over quarter, the company found. Among them was the Apache Struts 2 Remote Code Execution (the one that hit Equifax), which allows attackers to install Python or make a custom HTTP request to exploit the vulnerability "with just a few lines of code and obtain shell access to an exposed system." Two additional Apache Struts were also on the top-10 list. As the security researchers pointed out, the continued use of this vulnerability "should serve as a reminder of how important it is for web admins to patch known flaws as soon as possible."

Also on the list: two malware flavors that hit Office products. Both were delivered via email, the report noted, pointing up the importance of training users in the art of being able to identify phishing attempts and potentially malicious attachments.

Two newly identified malware flavors incorporated penetration testing tools: Boxter, a "PowerSploit" script; and Hacktool.JQ, a password stealer. What researchers couldn't determine was whether these were being used by legitimate hackers for the purposes of testing enterprise networks or by cyber criminals "leveraging readily available open source tools."

Among top compromised websites was one legitimate site (an Arabic platform) for sharing photos and links, which also hosted "malicious payloads." While the site validates the file extension when accepting an image, it doesn't go beyond that, which means attackers can change the file extension to something friendly while uploads still carry malware that's activated when the files are clicked.

The dramatic increase in zero-day malware instances (up to 50 percent from 38 percent over the last several quarters) pointed up the need for a layered security approach that could use multiple services to defend against "advanced, ever-evolving threats."

"Our latest threat intelligence showcases the variability and sophistication of cyber criminals' growing playbook. Not only are they leveraging notorious attacks, but they're launching evasive malware campaigns and hijacking products, tools and domains we use every day," said Corey Nachreiner, the company's chief technology officer, in a statement. "As threat actors continue to modify their tactics, organizations of every size must protect themselves, their customers and their partners with a set of layered security services that cover everything from the core network to endpoints to the users themselves."

The security report, with more detailed findings, is availableon the WatchGuard website(registration required).

About the Author

Dian Schaffhauser is a senior contributing editor for 1105 Media's education publications THE Journal and Campus Technology. She can be reached at dian@dischaffhauser.com or on Twitter @schaffhauser.

See the original post:
Office and Penetration Testing Software Increasingly Becoming Vectors for Malware - Campus Technology

Read More..

Network attacks increased in third quarter, WatchGuard says – TechRepublic

One network attack targeted the same vulnerability exploited in the Equifax data breach from September 2017, according to a new report.

Keeping up with the latest tactics and tricks of cybercriminals is a challenging process, especially as the level of certain threats seems to keep rising from quarter to quarter.

There was a jump in the number of network attacks in the third quarter, as outlined in WatchGuard Technologies' Internet Security Report for Q3 2019, released on Wednesday.

SEE:Network Attacks and Their Detection Mechanisms: A Review (free PDF) (TechRepublic)

For the quarter, network attacks rose by 8% compared with the second quarter of 2019.

Among the Top 10 most "popular" network attacks seen by WatchGuard last quarter, one exploits a vulnerability found in the open-source web application framework Apache Struts, the same vulnerability used in the Equifax data breach from September 2017.

Specifically, cybercriminals use Apache Struts 2 Remote Code Execution to install Python or create a custom HTTP request using just a few lines of code to obtain shell access to an exposed system.

Other threats analyzed for the quarter exploited two additional Apache Struts vulnerabilities, a reminder that web admins need to patch security holes as soon as possible.

On the malware front, WatchGuard offered good and bad news. The good news? The overall number of malware detections dropped by 4% from the second quarter. The bad news? The number was a huge jump of 60% from the third quarter of 2018.

In particular, zero day malware instances accounted for half of all malware detections last quarter, up from around 38% over the past several quarters.

This shows that half of all malware attacks in the third quarter were able to bypass traditional signature-based security solutions, pointing out a need for more layered security methods.

Microsoft Office continues to be another exploitable product. On WatchGuard's Top 10 list were two malware variants that target Office products.

Both attacks were deployed primarily via email, which means that organizations need to focus on training and education to help users learn how to identify phishing emails and messages with malicious attachments.

Cybercriminals appear to be using legitimate penetration testing tools for nefarious purposes. Two malware variants caught by WatchGuard exploited the Kali Linux penetration testing tools.

One variant, dubbed Boxter, is a PowerShell Trojan used to download and install unwanted programs on a user's device without permission. The other, known as Hacktool.JQ, was the only other authentication attack tool besides Mimikatz to appear on WatchGuard's list.

Researchers weren't sure whether the rise in these types of detections was attributable to legitimate penetration testing activities or malicious attackers exploiting readily-available open source tools.

Either way, organizations should continue to make use of anti-malware services to protect their data, they said.

Finally, malware attacks targeting the Americas rose dramatically. More than 42% of such attacks were launched against organizations and users in North, Central, and South America, up from just 27% in the second quarter.

WatchGuard was unclear as to the specific reasons, but organizations in these regions should be aware of this trend, it said.

The findings for WatchGuard's "Internet Security Report for Q3 2019" were taken from anonymized Firebox Feed data from active WatchGuard Unified Threat Management appliances whose owners have agreed to share data. More than 37,000 appliances worldwide contributed threat intelligence data to the report.

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays

Image: Getty Images/iStockphoto

Originally posted here:
Network attacks increased in third quarter, WatchGuard says - TechRepublic

Read More..

What is a VPN Used for on Android? – eTurboNews | Trends | Travel News

Want to know more about how to use a VPN on your Android device? Then youve found yourself in the right place. Using a VPN on your tablet, or smartphone is a great idea. But what exactly is a VPN used for on Android?

Whether youre sitting soundly in your local caf, or getting ready to board a flight from Budapest to Moscow, youre going to need to get a handle on your internet security. Those public networks can certainly be helpful, but they are also a danger to your information! Lets take a look at what you should know about VPNs and your Android device.

Your VPN, or Virtual Private Network, is a great way to keep your data and private information away from hackers. Lets say youre in a public space, a restaurant, or coffee shop, and you want to use their public network. Its not a bad idea, but it is potentially a very easy way for hackers to get ahold of your personal information.

A VPN makes it so your personal Android device can connect to the internet securely, while helping keep your personal data private. Not only that, but VPNs make it so your browsing activity cant be accessed on a public network as well! Finding the right VPN is easy, This is because a good Android VPN will be affordable and easy to access. But why should you use one?

Today, we use technology for such a wide variety of things. Whether youre sending important legal documents via email, or googling adorable cat videos, there are a lot of things that you may want to keep hidden.

Here are just a few things that a hacker can access from your Android on a Public Network:

However, there are ways to keep your private data, well private! Using a VPN on your smaller devices will help to not only keep hackers at bay, but also a wide array of other things. It is not as complicated as building new technology for NASA. But all things considered, finding internet safety shouldnt have to be!

A VPN will also allow you to operate online through a proxy IP Address. Meaning you can access websites, streaming platforms, and so many other things that may be limited in your region. You can access Japanese streaming platforms from the U.S., you can watch British television from North Africa, the world is pretty much your private oyster!

Your phone or tablet holds an enormous amount of personal data. In order to keep that information safe, you should definitely look into using a VPN. As these devices hold not only the information you put on there, but also the data from servers, your location, and so much more!

In order to help you keep your data secure on your phone, as well as your other Android devices, it is highly recommended that you access unknown networks through a VPN. Not only that, but you can even use your Android VPN at home as well! This can allow you a new wave of opportunities online.

Though they are helpful in keeping your internet information more private, VPNs are not perfect! VPNs may cause slower download speeds, or connectivity speeds, as well as cost more than you thought. There ARE free VPN services out there, but the best ones are going to have a price tag.

There are many pros to using a VPN on your Android device. From keeping your information safe and secure, to bypassing geo-blocking, youre well on your way to making the most of this internet platform. Secure your Android by signing up for a VPN.

Excerpt from:
What is a VPN Used for on Android? - eTurboNews | Trends | Travel News

Read More..