As we've noted before, Ars readers are extremely skeptical about the whole "connected car" thing. That's not because Ars is a technology site for luddites—the sad truth is that the car industry's approach to security lags far behind its desire to expose the inner thoughts of our cars to us via the cloud.
Security researchers have discovered a new twist in the plot in the ongoing evolutionary journey of the Cerber ransomware. The authors of the malware are now using a new technique that enables Cerber ransomware to morph itself every 15 seconds to avoid detection.
Ransomware is a type of malware that infects victims' systems and then proceeds to hold all data within as hostage until victims pay up a specific amount of money as ransom. In most cases, victims are asked to pay up in Bitcoin and ransom amounts can range from anywhere up to a few hundred to even thousands dollars.
The internet is under heavier attacks than ever. In Akamai's Q1 2016 State of the Internet - Security Report, the content delivery network (CDN) company found there's been a 125 percent increase in distributed denial of service (DDoS) attacks year over year.
But, wait, there's more. Much more. There's also been a 35 percent increase in the average attack duration. In the first quarter of 2015, the average attack lasted almost 15 hours. Now, they're up to just over 16 hours.
Security firm FireEye has found malicious phishing campaigns targeting Apple iCloud users through the use of phony Apple domains.
FireEye has reported that since January this year, several phishing campaigns have targeted the Apple IDs and passwords of Apple users in China and the United Kingdom.
Symantec has expanded its Internet of things lineup with an effort to spot security anomalies for connected automobiles.
The security company launched Symantec Anomaly Detection for Automotive, which is a suite that aims to analyze and spot security threats early and neutralize them.
With the move, Symantec is hoping the Internet of things can be a key growth market for the company. Symantec also has embedded security tools, code signing and managed public key infrastructure to secure Internet of things end points.