DOJ reverses itself, says good-faith security researchers should be left alone

Credit to Author: Evan Schuman| Date: Thu, 26 May 2022 03:02:00 -0700

In a move that could have a major impact on enterprise penetration testing and other cybersecurity tactics, the US Department of Justice last Thursday reversed one of its own policies by telling prosecutors not to prosecute anyone involved in “good-faith security research.”

This is one of those common-sense decisions that makes me far more interested in exploring the original DOJ policy (set in 2014, during the Obama era). 

The underlying law at issue is the Computer Fraud and Abuse Act, which made it illegal to access a computer without proper authorization. It was passed in 1986 and has been updated several times since then.

To read this article in full, please click here

Read more

IT salaries aren't keeping up with inflation — but that may soon change

Credit to Author: Lucas Mearian| Date: Thu, 26 May 2022 03:00:00 -0700

Pay for some IT professionals is failing to keep up with inflation, according to a salary survey by IT employment consultancy Janco Associates for calendar year 2021. But preliminary data indicates pay for tech workers could soon change drastically with job market in IT tight, and many companies eyeing major tech projects in the year ahead.

With inflation in the US running at about 8% over the past year, salary increases — even for IT execs — have failed to keep pace.

The mean compensation for all IT pros last year rose only 2.05%, with the median salary at $100,022 for those at large enterprises and at $95,681 for IT workers at mid-sized firms, according to Janco.

To read this article in full, please click here

Read more

Android apps with millions of downloads exposed to high-severity vulnerabilities

Credit to Author: Katie McCafferty| Date: Fri, 27 May 2022 16:00:00 +0000

Microsoft uncovered high-severity vulnerabilities in a mobile framework used by multiple large mobile service providers in pre-installed Android System apps that potentially exposed users to remote or local attacks.

The post Android apps with millions of downloads exposed to high-severity vulnerabilities appeared first on Microsoft Security Blog.

Read more

Rise in XorDdos: A deeper look at the stealthy DDoS malware targeting Linux devices

Credit to Author: Katie McCafferty| Date: Thu, 19 May 2022 16:00:00 +0000

Observing a 254% increase in activity over the last six months from a versatile Linux trojan called XorDdos, the Microsoft 365 Defender research team provides in-depth analysis into this stealthy malware’s capabilities and key infection signs.

The post Rise in XorDdos: A deeper look at the stealthy DDoS malware targeting Linux devices appeared first on Microsoft Security Blog.

Read more