Yesterday, I mentioned that experts weren’t sure how Petya 2.0 first originated. Some experts claimed it arrived in emails exploiting an Office flaw, but not all of them agreed. Today’s video covers new evidence that suggests Ukrainian accounting software may have been involved in this latest ransomworm’s spread Read more “Accounting Software Delivers NotPetya? – Daily Security Byte”

It’s estimated that there are 111 billion lines of new software code generated by developers each year – a staggering figure. But unfortunately, research from the U.S. Department of Homeland Security?shows that 90 percent of reported security incidents are the result of exploits against defects in the design or code of software. Read more “111 Billion New Lines of Software Code – What Could Go Wrong?”

When a hacker hijacks a computer, gaining persistence (or making sure his malicious trojan stays on the computer) is easy. The attacker just has to load malware onto the computer’s hard drive and make sure it runs when the computer reboots. However, hijacking the Internet of Things (IoT) is a different story. Read more “WatchGuard Security Prediction #8 – Breaches Come to the IoT Frontier”

To use an iOS beta release, you need to be a member of Apple Beta Software Program, Customer Seed Program, or iOS Developer Program. Read more “What to do before you install iOS beta”