50 F
Fort Worth
Friday, December 4, 2020
Technology Blunting cyberintrusions

Blunting cyberintrusions

Other News

A look at big issues on Supreme Court’s agenda

Some of the issues either already on the Supreme Court's docket when it begins its new session or likely to be before the justices...

Wall Street posts solid gains after surge in corporate deals

By ALEX VEIGA and DAMIAN J. TROISE AP Business Writers Wall Street kicked off the week with a broad rally Monday, clawing back much of...

Tarrant County ranks low in work-from-home study by NAR

North Texas ranks pretty high in the “Work from Home” category, according to a just-released study by the National Association of Realtors. But Tarrant...

Commentary: Universities and COVID-19: Charting turbulent times

Ray Perryman As the COVID-19 pandemic emerged this spring, college campuses across the United States swiftly sent students home in droves and switched to...

After years of dire news, there are signs that cybersecurity measures are making headway against intrusions and malware attacks. Online intrusions are getting detected more quickly. It took FireEye, a major cybersecurity firm, a median of 56 days last year to discover an intrusion. That’s three weeks faster than the previous year. FireEye also says outside threat hunters are getting better at identifying malicious targeting.

In the 12 months through Sept. 30, FireEye said its threat hunters and law enforcement detected 53% of malware attacks, as opposed to the victim identifying them, the first time in four years that outside detections exceeded internal ones. But the cat-and-mouse struggle doesn’t get any easier. The bad guys innovate, too. They created 500 new malware families in the same period, accounting for 41% of malware families seen by FireEye researchers. And they are increasingly turning to ransomware, scrambling an organization’s data — and demanding payment. In fact, that could have contributed to the drop in dwell time. In terms of motivation, FireEye said 22% of targeted intrusions sought to steal intellectual property or were for espionage. It said 29% likely sought direct financial gain, through extortion, ransom, card theft or illicit financial transfers.


close






Oh hi there 👋 It’s nice to meet you.

Sign up to receive awesome content in your inbox.

We don’t spam! Read our privacy policy for more info.


close






Oh hi there 👋
It’s nice to meet you.

Sign up to receive awesome content in your inbox.

We don’t spam! Read our privacy policy for more info.

Latest News

Japan spacecraft approaches Earth to drop asteroid samples

TOKYO (AP) — Japanese space agency officials said Friday the Hayabusa2 spacecraft is on its intended trajectory as it approaches Earth to deliver a...

Hewlett Packard Enterprise to move headquarters to Texas

SPRING, Texas (AP) — Tech giant Hewlett Packard Enterprise said it is moving its global headquarters to the Houston area from California, where the...

Phishing ploy targets COVID-19 vaccine distribution effort

BOSTON (AP) — IBM security researchers say they have detected a cyberespionage effort using targeted phishing emails to try to collect vital information on...

Chinese moon probe begins return to Earth with lunar samples

BEIJING (AP) — A Chinese lunar probe lifted off from the moon Thursday night with a cargo of lunar samples on the first stage...

Trump threatens defense veto over social media protections

WASHINGTON (AP) — President Donald Trump is threatening to veto a defense policy bill unless it ends protections for internet companies that shield them...