FAF deciding on filters on post to be syndicated:

Satnav Spoofing Attacks: Why These Researchers Think They Have The Answer

Array ( [post_title] => Satnav Spoofing Attacks: Why These Researchers Think They Have The Answer [post_content] => [post_date_gmt] => 2017-03-27 15:04:25 [post_date] => 2017-03-27 16:04:25 [post_modified_gmt] => 2017-03-27 15:04:25 [post_modified] => 2017-03-27 16:04:25 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => https://packetstormsecurity.com/news/view/27631/Satnav-Spoofing-Attacks-Why-These-Researchers-Think-They-Have-The-Answer.html [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => News ≈ Packet Storm [syndication_source_uri] => https://packetstormsecurity.com/ [syndication_source_id] => https://rss.packetstormsecurity.com/news/ [rss:comments] => https://packetstormsecurity.com/news/27631/Satnav-Spoofing-Attacks-Why-These-Researchers-Think-They-Have-The-Answer.html [syndication_feed] => https://rss.packetstormsecurity.com/news/ [syndication_feed_id] => 69 [syndication_permalink] => https://packetstormsecurity.com/news/view/27631/Satnav-Spoofing-Attacks-Why-These-Researchers-Think-They-Have-The-Answer.html [syndication_item_hash] => ec6dc0b67da4c0c89729f54eeb3c8fa5 ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 8 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => ) [syndication_source] => News ≈ Packet Storm [syndication_source_uri] => https://packetstormsecurity.com/ [syndication_source_id] => https://rss.packetstormsecurity.com/news/ [rss:comments] => https://packetstormsecurity.com/news/27631/Satnav-Spoofing-Attacks-Why-These-Researchers-Think-They-Have-The-Answer.html [syndication_feed] => https://rss.packetstormsecurity.com/news/ [syndication_feed_id] => 69 [syndication_permalink] => https://packetstormsecurity.com/news/view/27631/Satnav-Spoofing-Attacks-Why-These-Researchers-Think-They-Have-The-Answer.html [syndication_item_hash] => ec6dc0b67da4c0c89729f54eeb3c8fa5 )

Execute : Enclosure images

Enclosure save:

Array ( [0] => )

No match on

Decide filter: Returning post, everything seems orderly :Satnav Spoofing Attacks: Why These Researchers Think They Have The Answer

Array ( [post_title] => Satnav Spoofing Attacks: Why These Researchers Think They Have The Answer [post_content] => [post_date_gmt] => 2017-03-27 15:04:25 [post_date] => 2017-03-27 16:04:25 [post_modified_gmt] => 2017-03-27 15:04:25 [post_modified] => 2017-03-27 16:04:25 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => https://packetstormsecurity.com/news/view/27631/Satnav-Spoofing-Attacks-Why-These-Researchers-Think-They-Have-The-Answer.html [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => News ≈ Packet Storm [syndication_source_uri] => https://packetstormsecurity.com/ [syndication_source_id] => https://rss.packetstormsecurity.com/news/ [rss:comments] => https://packetstormsecurity.com/news/27631/Satnav-Spoofing-Attacks-Why-These-Researchers-Think-They-Have-The-Answer.html [syndication_feed] => https://rss.packetstormsecurity.com/news/ [syndication_feed_id] => 69 [syndication_permalink] => https://packetstormsecurity.com/news/view/27631/Satnav-Spoofing-Attacks-Why-These-Researchers-Think-They-Have-The-Answer.html [syndication_item_hash] => ec6dc0b67da4c0c89729f54eeb3c8fa5 [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 8 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_excerpt] => )

FAF deciding on filters on post to be syndicated:

Apple iCloud Ransom Demands: The Facts You Need To Know

Array ( [post_title] => Apple iCloud Ransom Demands: The Facts You Need To Know [post_content] => [post_date_gmt] => 2017-03-24 14:43:41 [post_date] => 2017-03-24 15:43:41 [post_modified_gmt] => 2017-03-24 14:43:41 [post_modified] => 2017-03-24 15:43:41 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => https://packetstormsecurity.com/news/view/27627/Apple-iCloud-Ransom-Demands-The-Facts-You-Need-To-Know.html [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => News ≈ Packet Storm [syndication_source_uri] => https://packetstormsecurity.com/ [syndication_source_id] => https://rss.packetstormsecurity.com/news/ [rss:comments] => https://packetstormsecurity.com/news/27627/Apple-iCloud-Ransom-Demands-The-Facts-You-Need-To-Know.html [syndication_feed] => https://rss.packetstormsecurity.com/news/ [syndication_feed_id] => 69 [syndication_permalink] => https://packetstormsecurity.com/news/view/27627/Apple-iCloud-Ransom-Demands-The-Facts-You-Need-To-Know.html [syndication_item_hash] => f7d318b101ac7bec00284eb3eb5db403 ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 8 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => ) [syndication_source] => News ≈ Packet Storm [syndication_source_uri] => https://packetstormsecurity.com/ [syndication_source_id] => https://rss.packetstormsecurity.com/news/ [rss:comments] => https://packetstormsecurity.com/news/27627/Apple-iCloud-Ransom-Demands-The-Facts-You-Need-To-Know.html [syndication_feed] => https://rss.packetstormsecurity.com/news/ [syndication_feed_id] => 69 [syndication_permalink] => https://packetstormsecurity.com/news/view/27627/Apple-iCloud-Ransom-Demands-The-Facts-You-Need-To-Know.html [syndication_item_hash] => f7d318b101ac7bec00284eb3eb5db403 )

Execute : Enclosure images

Enclosure save:

Array ( [0] => )

No match on

Decide filter: Returning post, everything seems orderly :Apple iCloud Ransom Demands: The Facts You Need To Know

Array ( [post_title] => Apple iCloud Ransom Demands: The Facts You Need To Know [post_content] => [post_date_gmt] => 2017-03-24 14:43:41 [post_date] => 2017-03-24 15:43:41 [post_modified_gmt] => 2017-03-24 14:43:41 [post_modified] => 2017-03-24 15:43:41 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => https://packetstormsecurity.com/news/view/27627/Apple-iCloud-Ransom-Demands-The-Facts-You-Need-To-Know.html [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => News ≈ Packet Storm [syndication_source_uri] => https://packetstormsecurity.com/ [syndication_source_id] => https://rss.packetstormsecurity.com/news/ [rss:comments] => https://packetstormsecurity.com/news/27627/Apple-iCloud-Ransom-Demands-The-Facts-You-Need-To-Know.html [syndication_feed] => https://rss.packetstormsecurity.com/news/ [syndication_feed_id] => 69 [syndication_permalink] => https://packetstormsecurity.com/news/view/27627/Apple-iCloud-Ransom-Demands-The-Facts-You-Need-To-Know.html [syndication_item_hash] => f7d318b101ac7bec00284eb3eb5db403 [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 8 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_excerpt] => )

FAF deciding on filters on post to be syndicated:

Google: Hacked Sites Rose By A Third In 2016

Array ( [post_title] => Google: Hacked Sites Rose By A Third In 2016 [post_content] => [post_date_gmt] => 2017-03-22 14:07:41 [post_date] => 2017-03-22 15:07:41 [post_modified_gmt] => 2017-03-22 14:07:41 [post_modified] => 2017-03-22 15:07:41 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => https://packetstormsecurity.com/news/view/27621/Google-Hacked-Sites-Rose-By-A-Third-In-2016.html [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => News ≈ Packet Storm [syndication_source_uri] => https://packetstormsecurity.com/ [syndication_source_id] => https://rss.packetstormsecurity.com/news/ [rss:comments] => https://packetstormsecurity.com/news/27621/Google-Hacked-Sites-Rose-By-A-Third-In-2016.html [syndication_feed] => https://rss.packetstormsecurity.com/news/ [syndication_feed_id] => 69 [syndication_permalink] => https://packetstormsecurity.com/news/view/27621/Google-Hacked-Sites-Rose-By-A-Third-In-2016.html [syndication_item_hash] => 862b969f1f17eb8c8182e175d7f19741 ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 8 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => ) [syndication_source] => News ≈ Packet Storm [syndication_source_uri] => https://packetstormsecurity.com/ [syndication_source_id] => https://rss.packetstormsecurity.com/news/ [rss:comments] => https://packetstormsecurity.com/news/27621/Google-Hacked-Sites-Rose-By-A-Third-In-2016.html [syndication_feed] => https://rss.packetstormsecurity.com/news/ [syndication_feed_id] => 69 [syndication_permalink] => https://packetstormsecurity.com/news/view/27621/Google-Hacked-Sites-Rose-By-A-Third-In-2016.html [syndication_item_hash] => 862b969f1f17eb8c8182e175d7f19741 )

Execute : Enclosure images

Enclosure save:

Array ( [0] => )

No match on

Decide filter: Returning post, everything seems orderly :Google: Hacked Sites Rose By A Third In 2016

Array ( [post_title] => Google: Hacked Sites Rose By A Third In 2016 [post_content] => [post_date_gmt] => 2017-03-22 14:07:41 [post_date] => 2017-03-22 15:07:41 [post_modified_gmt] => 2017-03-22 14:07:41 [post_modified] => 2017-03-22 15:07:41 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => https://packetstormsecurity.com/news/view/27621/Google-Hacked-Sites-Rose-By-A-Third-In-2016.html [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => News ≈ Packet Storm [syndication_source_uri] => https://packetstormsecurity.com/ [syndication_source_id] => https://rss.packetstormsecurity.com/news/ [rss:comments] => https://packetstormsecurity.com/news/27621/Google-Hacked-Sites-Rose-By-A-Third-In-2016.html [syndication_feed] => https://rss.packetstormsecurity.com/news/ [syndication_feed_id] => 69 [syndication_permalink] => https://packetstormsecurity.com/news/view/27621/Google-Hacked-Sites-Rose-By-A-Third-In-2016.html [syndication_item_hash] => 862b969f1f17eb8c8182e175d7f19741 [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 8 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_excerpt] => )

FAF deciding on filters on post to be syndicated:

Windows 10: DoubleAgent Zero-Day Hijacks Microsoft Tool To Turn Antivirus Into Malware

Array ( [post_title] => Windows 10: DoubleAgent Zero-Day Hijacks Microsoft Tool To Turn Antivirus Into Malware [post_content] => [post_date_gmt] => 2017-03-22 14:07:36 [post_date] => 2017-03-22 15:07:36 [post_modified_gmt] => 2017-03-22 14:07:36 [post_modified] => 2017-03-22 15:07:36 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => https://packetstormsecurity.com/news/view/27620/Windows-10-DoubleAgent-Zero-Day-Hijacks-Microsoft-Tool-To-Turn-Antivirus-Into-Malware.html [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => News ≈ Packet Storm [syndication_source_uri] => https://packetstormsecurity.com/ [syndication_source_id] => https://rss.packetstormsecurity.com/news/ [rss:comments] => https://packetstormsecurity.com/news/27620/Windows-10-DoubleAgent-Zero-Day-Hijacks-Microsoft-Tool-To-Turn-Antivirus-Into-Malware.html [syndication_feed] => https://rss.packetstormsecurity.com/news/ [syndication_feed_id] => 69 [syndication_permalink] => https://packetstormsecurity.com/news/view/27620/Windows-10-DoubleAgent-Zero-Day-Hijacks-Microsoft-Tool-To-Turn-Antivirus-Into-Malware.html [syndication_item_hash] => 3dfb50a21292a752e613301f06205633 ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 8 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => ) [syndication_source] => News ≈ Packet Storm [syndication_source_uri] => https://packetstormsecurity.com/ [syndication_source_id] => https://rss.packetstormsecurity.com/news/ [rss:comments] => https://packetstormsecurity.com/news/27620/Windows-10-DoubleAgent-Zero-Day-Hijacks-Microsoft-Tool-To-Turn-Antivirus-Into-Malware.html [syndication_feed] => https://rss.packetstormsecurity.com/news/ [syndication_feed_id] => 69 [syndication_permalink] => https://packetstormsecurity.com/news/view/27620/Windows-10-DoubleAgent-Zero-Day-Hijacks-Microsoft-Tool-To-Turn-Antivirus-Into-Malware.html [syndication_item_hash] => 3dfb50a21292a752e613301f06205633 )

Execute : Enclosure images

Enclosure save:

Array ( [0] => )

No match on

Decide filter: Returning post, everything seems orderly :Windows 10: DoubleAgent Zero-Day Hijacks Microsoft Tool To Turn Antivirus Into Malware

Array ( [post_title] => Windows 10: DoubleAgent Zero-Day Hijacks Microsoft Tool To Turn Antivirus Into Malware [post_content] => [post_date_gmt] => 2017-03-22 14:07:36 [post_date] => 2017-03-22 15:07:36 [post_modified_gmt] => 2017-03-22 14:07:36 [post_modified] => 2017-03-22 15:07:36 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => https://packetstormsecurity.com/news/view/27620/Windows-10-DoubleAgent-Zero-Day-Hijacks-Microsoft-Tool-To-Turn-Antivirus-Into-Malware.html [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => News ≈ Packet Storm [syndication_source_uri] => https://packetstormsecurity.com/ [syndication_source_id] => https://rss.packetstormsecurity.com/news/ [rss:comments] => https://packetstormsecurity.com/news/27620/Windows-10-DoubleAgent-Zero-Day-Hijacks-Microsoft-Tool-To-Turn-Antivirus-Into-Malware.html [syndication_feed] => https://rss.packetstormsecurity.com/news/ [syndication_feed_id] => 69 [syndication_permalink] => https://packetstormsecurity.com/news/view/27620/Windows-10-DoubleAgent-Zero-Day-Hijacks-Microsoft-Tool-To-Turn-Antivirus-Into-Malware.html [syndication_item_hash] => 3dfb50a21292a752e613301f06205633 [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 8 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_excerpt] => )

FAF deciding on filters on post to be syndicated:

Microsoft Edge Used To Escape VMware Workstation At Pwn2Own 2017

Array ( [post_title] => Microsoft Edge Used To Escape VMware Workstation At Pwn2Own 2017 [post_content] => [post_date_gmt] => 2017-03-20 15:46:53 [post_date] => 2017-03-20 16:46:53 [post_modified_gmt] => 2017-03-20 15:46:53 [post_modified] => 2017-03-20 16:46:53 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => https://packetstormsecurity.com/news/view/27612/Microsoft-Edge-Used-To-Escape-VMware-Workstation-At-Pwn2Own-2017.html [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => News ≈ Packet Storm [syndication_source_uri] => https://packetstormsecurity.com/ [syndication_source_id] => https://rss.packetstormsecurity.com/news/ [rss:comments] => https://packetstormsecurity.com/news/27612/Microsoft-Edge-Used-To-Escape-VMware-Workstation-At-Pwn2Own-2017.html [syndication_feed] => https://rss.packetstormsecurity.com/news/ [syndication_feed_id] => 69 [syndication_permalink] => https://packetstormsecurity.com/news/view/27612/Microsoft-Edge-Used-To-Escape-VMware-Workstation-At-Pwn2Own-2017.html [syndication_item_hash] => 8f9c5548bd5fa22a916f77cbb350b503 ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 8 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => ) [syndication_source] => News ≈ Packet Storm [syndication_source_uri] => https://packetstormsecurity.com/ [syndication_source_id] => https://rss.packetstormsecurity.com/news/ [rss:comments] => https://packetstormsecurity.com/news/27612/Microsoft-Edge-Used-To-Escape-VMware-Workstation-At-Pwn2Own-2017.html [syndication_feed] => https://rss.packetstormsecurity.com/news/ [syndication_feed_id] => 69 [syndication_permalink] => https://packetstormsecurity.com/news/view/27612/Microsoft-Edge-Used-To-Escape-VMware-Workstation-At-Pwn2Own-2017.html [syndication_item_hash] => 8f9c5548bd5fa22a916f77cbb350b503 )

Execute : Enclosure images

Enclosure save:

Array ( [0] => )

No match on

Decide filter: Returning post, everything seems orderly :Microsoft Edge Used To Escape VMware Workstation At Pwn2Own 2017

Array ( [post_title] => Microsoft Edge Used To Escape VMware Workstation At Pwn2Own 2017 [post_content] => [post_date_gmt] => 2017-03-20 15:46:53 [post_date] => 2017-03-20 16:46:53 [post_modified_gmt] => 2017-03-20 15:46:53 [post_modified] => 2017-03-20 16:46:53 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => https://packetstormsecurity.com/news/view/27612/Microsoft-Edge-Used-To-Escape-VMware-Workstation-At-Pwn2Own-2017.html [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => News ≈ Packet Storm [syndication_source_uri] => https://packetstormsecurity.com/ [syndication_source_id] => https://rss.packetstormsecurity.com/news/ [rss:comments] => https://packetstormsecurity.com/news/27612/Microsoft-Edge-Used-To-Escape-VMware-Workstation-At-Pwn2Own-2017.html [syndication_feed] => https://rss.packetstormsecurity.com/news/ [syndication_feed_id] => 69 [syndication_permalink] => https://packetstormsecurity.com/news/view/27612/Microsoft-Edge-Used-To-Escape-VMware-Workstation-At-Pwn2Own-2017.html [syndication_item_hash] => 8f9c5548bd5fa22a916f77cbb350b503 [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 8 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_excerpt] => )

FAF deciding on filters on post to be syndicated:

Intel Touts Bug Bounties To Hardware Hackers

Array ( [post_title] => Intel Touts Bug Bounties To Hardware Hackers [post_content] => [post_date_gmt] => 2017-03-17 00:38:32 [post_date] => 2017-03-17 01:38:32 [post_modified_gmt] => 2017-03-17 00:38:32 [post_modified] => 2017-03-17 01:38:32 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => https://packetstormsecurity.com/news/view/27610/Intel-Touts-Bug-Bounties-To-Hardware-Hackers.html [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => News ≈ Packet Storm [syndication_source_uri] => https://packetstormsecurity.com/ [syndication_source_id] => https://rss.packetstormsecurity.com/news/ [rss:comments] => https://packetstormsecurity.com/news/27610/Intel-Touts-Bug-Bounties-To-Hardware-Hackers.html [syndication_feed] => https://rss.packetstormsecurity.com/news/ [syndication_feed_id] => 69 [syndication_permalink] => https://packetstormsecurity.com/news/view/27610/Intel-Touts-Bug-Bounties-To-Hardware-Hackers.html [syndication_item_hash] => 295abc39f773d67d7d109a517174570f ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 8 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => ) [syndication_source] => News ≈ Packet Storm [syndication_source_uri] => https://packetstormsecurity.com/ [syndication_source_id] => https://rss.packetstormsecurity.com/news/ [rss:comments] => https://packetstormsecurity.com/news/27610/Intel-Touts-Bug-Bounties-To-Hardware-Hackers.html [syndication_feed] => https://rss.packetstormsecurity.com/news/ [syndication_feed_id] => 69 [syndication_permalink] => https://packetstormsecurity.com/news/view/27610/Intel-Touts-Bug-Bounties-To-Hardware-Hackers.html [syndication_item_hash] => 295abc39f773d67d7d109a517174570f )

Execute : Enclosure images

Enclosure save:

Array ( [0] => )

No match on

Decide filter: Returning post, everything seems orderly :Intel Touts Bug Bounties To Hardware Hackers

Array ( [post_title] => Intel Touts Bug Bounties To Hardware Hackers [post_content] => [post_date_gmt] => 2017-03-17 00:38:32 [post_date] => 2017-03-17 01:38:32 [post_modified_gmt] => 2017-03-17 00:38:32 [post_modified] => 2017-03-17 01:38:32 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => https://packetstormsecurity.com/news/view/27610/Intel-Touts-Bug-Bounties-To-Hardware-Hackers.html [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => News ≈ Packet Storm [syndication_source_uri] => https://packetstormsecurity.com/ [syndication_source_id] => https://rss.packetstormsecurity.com/news/ [rss:comments] => https://packetstormsecurity.com/news/27610/Intel-Touts-Bug-Bounties-To-Hardware-Hackers.html [syndication_feed] => https://rss.packetstormsecurity.com/news/ [syndication_feed_id] => 69 [syndication_permalink] => https://packetstormsecurity.com/news/view/27610/Intel-Touts-Bug-Bounties-To-Hardware-Hackers.html [syndication_item_hash] => 295abc39f773d67d7d109a517174570f [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 8 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_excerpt] => )

FAF deciding on filters on post to be syndicated:

Mastercard buys NuData Security, aims to beef up IoT payment security

Array ( [post_title] => Mastercard buys NuData Security, aims to beef up IoT payment security [post_content] => Mastercard said it is acquiring NuData so it can integrate its technology into its fraud management and security products. [post_excerpt] => Mastercard said it is acquiring NuData so it can integrate its technology into its fraud management and security products. [post_date_gmt] => 2017-03-29 13:46:00 [post_date] => 2017-03-29 14:46:00 [post_modified_gmt] => 2017-03-29 13:46:00 [post_modified] => 2017-03-29 14:46:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 0b1b6a9d-9201-4f04-a354-7d3814bafcc5 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/mastercard-buys-nudata-security-aims-to-beef-up-iot-payment-security/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 19bf8c703831d229525ddbcadda9ace5 [1] => 19bf8c703831d229525ddbcadda9ace5 ) ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => mastercard-buys-nudata-security-aims-to-beef-up-iot-payment-security )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/mastercard-buys-nudata-security-aims-to-beef-up-iot-payment-security/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 19bf8c703831d229525ddbcadda9ace5 [1] => 19bf8c703831d229525ddbcadda9ace5 ) )

Execute : Enclosure images

Enclosure save:

Array ( [0] => )

No match on

Decide filter: Returning post, everything seems orderly :Mastercard buys NuData Security, aims to beef up IoT payment security

Array ( [post_title] => Mastercard buys NuData Security, aims to beef up IoT payment security [post_content] => Mastercard said it is acquiring NuData so it can integrate its technology into its fraud management and security products. [post_excerpt] => Mastercard said it is acquiring NuData so it can integrate its technology into its fraud management and security products. [post_date_gmt] => 2017-03-29 13:46:00 [post_date] => 2017-03-29 14:46:00 [post_modified_gmt] => 2017-03-29 13:46:00 [post_modified] => 2017-03-29 14:46:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 0b1b6a9d-9201-4f04-a354-7d3814bafcc5 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/mastercard-buys-nudata-security-aims-to-beef-up-iot-payment-security/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 19bf8c703831d229525ddbcadda9ace5 [1] => 19bf8c703831d229525ddbcadda9ace5 ) [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => mastercard-buys-nudata-security-aims-to-beef-up-iot-payment-security )

FAF deciding on filters on post to be syndicated:

Congress just obliterated Obama-era rules preventing ISPs from selling your browsing history

Array ( [post_title] => Congress just obliterated Obama-era rules preventing ISPs from selling your browsing history [post_content] => The rules, which were set to go into effect but were blocked by a Republican-controlled FCC chairman, were ruled on in Congress, nuking them from ever going into effect. [post_excerpt] => The rules, which were set to go into effect but were blocked by a Republican-controlled FCC chairman, were ruled on in Congress, nuking them from ever going into effect. [post_date_gmt] => 2017-03-28 21:58:00 [post_date] => 2017-03-28 22:58:00 [post_modified_gmt] => 2017-03-28 21:58:00 [post_modified] => 2017-03-28 22:58:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 008aa3b2-bfb1-4468-82a3-0b45560d210d [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/congress-repeals-obama-internet-history-privacy-rules/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 45eb971e5d3ca89f17ed384a0ef380b1 [1] => 45eb971e5d3ca89f17ed384a0ef380b1 [2] => 45eb971e5d3ca89f17ed384a0ef380b1 [3] => 45eb971e5d3ca89f17ed384a0ef380b1 [4] => 45eb971e5d3ca89f17ed384a0ef380b1 [5] => 45eb971e5d3ca89f17ed384a0ef380b1 [6] => 45eb971e5d3ca89f17ed384a0ef380b1 [7] => 45eb971e5d3ca89f17ed384a0ef380b1 [8] => 45eb971e5d3ca89f17ed384a0ef380b1 [9] => 45eb971e5d3ca89f17ed384a0ef380b1 [10] => 45eb971e5d3ca89f17ed384a0ef380b1 [11] => 45eb971e5d3ca89f17ed384a0ef380b1 [12] => 45eb971e5d3ca89f17ed384a0ef380b1 [13] => 45eb971e5d3ca89f17ed384a0ef380b1 [14] => 45eb971e5d3ca89f17ed384a0ef380b1 [15] => 45eb971e5d3ca89f17ed384a0ef380b1 [16] => 45eb971e5d3ca89f17ed384a0ef380b1 [17] => 45eb971e5d3ca89f17ed384a0ef380b1 [18] => 45eb971e5d3ca89f17ed384a0ef380b1 [19] => 45eb971e5d3ca89f17ed384a0ef380b1 [20] => 45eb971e5d3ca89f17ed384a0ef380b1 [21] => 45eb971e5d3ca89f17ed384a0ef380b1 ) ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => congress-just-obliterated-obama-era-rules-preventing-isps-from-selling-your-browsing-history )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/congress-repeals-obama-internet-history-privacy-rules/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 45eb971e5d3ca89f17ed384a0ef380b1 [1] => 45eb971e5d3ca89f17ed384a0ef380b1 [2] => 45eb971e5d3ca89f17ed384a0ef380b1 [3] => 45eb971e5d3ca89f17ed384a0ef380b1 [4] => 45eb971e5d3ca89f17ed384a0ef380b1 [5] => 45eb971e5d3ca89f17ed384a0ef380b1 [6] => 45eb971e5d3ca89f17ed384a0ef380b1 [7] => 45eb971e5d3ca89f17ed384a0ef380b1 [8] => 45eb971e5d3ca89f17ed384a0ef380b1 [9] => 45eb971e5d3ca89f17ed384a0ef380b1 [10] => 45eb971e5d3ca89f17ed384a0ef380b1 [11] => 45eb971e5d3ca89f17ed384a0ef380b1 [12] => 45eb971e5d3ca89f17ed384a0ef380b1 [13] => 45eb971e5d3ca89f17ed384a0ef380b1 [14] => 45eb971e5d3ca89f17ed384a0ef380b1 [15] => 45eb971e5d3ca89f17ed384a0ef380b1 [16] => 45eb971e5d3ca89f17ed384a0ef380b1 [17] => 45eb971e5d3ca89f17ed384a0ef380b1 [18] => 45eb971e5d3ca89f17ed384a0ef380b1 [19] => 45eb971e5d3ca89f17ed384a0ef380b1 [20] => 45eb971e5d3ca89f17ed384a0ef380b1 [21] => 45eb971e5d3ca89f17ed384a0ef380b1 ) )

Execute : Enclosure images

Enclosure save:

Array ( [0] => )

No match on

Decide filter: Returning post, everything seems orderly :Congress just obliterated Obama-era rules preventing ISPs from selling your browsing history

Array ( [post_title] => Congress just obliterated Obama-era rules preventing ISPs from selling your browsing history [post_content] => The rules, which were set to go into effect but were blocked by a Republican-controlled FCC chairman, were ruled on in Congress, nuking them from ever going into effect. [post_excerpt] => The rules, which were set to go into effect but were blocked by a Republican-controlled FCC chairman, were ruled on in Congress, nuking them from ever going into effect. [post_date_gmt] => 2017-03-28 21:58:00 [post_date] => 2017-03-28 22:58:00 [post_modified_gmt] => 2017-03-28 21:58:00 [post_modified] => 2017-03-28 22:58:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 008aa3b2-bfb1-4468-82a3-0b45560d210d [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/congress-repeals-obama-internet-history-privacy-rules/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 45eb971e5d3ca89f17ed384a0ef380b1 [1] => 45eb971e5d3ca89f17ed384a0ef380b1 [2] => 45eb971e5d3ca89f17ed384a0ef380b1 [3] => 45eb971e5d3ca89f17ed384a0ef380b1 [4] => 45eb971e5d3ca89f17ed384a0ef380b1 [5] => 45eb971e5d3ca89f17ed384a0ef380b1 [6] => 45eb971e5d3ca89f17ed384a0ef380b1 [7] => 45eb971e5d3ca89f17ed384a0ef380b1 [8] => 45eb971e5d3ca89f17ed384a0ef380b1 [9] => 45eb971e5d3ca89f17ed384a0ef380b1 [10] => 45eb971e5d3ca89f17ed384a0ef380b1 [11] => 45eb971e5d3ca89f17ed384a0ef380b1 [12] => 45eb971e5d3ca89f17ed384a0ef380b1 [13] => 45eb971e5d3ca89f17ed384a0ef380b1 [14] => 45eb971e5d3ca89f17ed384a0ef380b1 [15] => 45eb971e5d3ca89f17ed384a0ef380b1 [16] => 45eb971e5d3ca89f17ed384a0ef380b1 [17] => 45eb971e5d3ca89f17ed384a0ef380b1 [18] => 45eb971e5d3ca89f17ed384a0ef380b1 [19] => 45eb971e5d3ca89f17ed384a0ef380b1 [20] => 45eb971e5d3ca89f17ed384a0ef380b1 [21] => 45eb971e5d3ca89f17ed384a0ef380b1 ) [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => congress-just-obliterated-obama-era-rules-preventing-isps-from-selling-your-browsing-history )

FAF deciding on filters on post to be syndicated:

One of the most dangerous forms of ransomware has just evolved to be harder to spot

Array ( [post_title] => One of the most dangerous forms of ransomware has just evolved to be harder to spot [post_content] => Malicious loaders delivered by self-extracting Dropbox files enable payloads to bypass detection. [post_excerpt] => Malicious loaders delivered by self-extracting Dropbox files enable payloads to bypass detection. [post_date_gmt] => 2017-03-28 16:41:00 [post_date] => 2017-03-28 17:41:00 [post_modified_gmt] => 2017-03-28 16:41:00 [post_modified] => 2017-03-28 17:41:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 1eaaabc0-6113-4060-9edf-7fc4b20da661 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/one-of-the-most-dangerous-forms-of-ransomware-has-just-evolved-to-be-harder-to-spot/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 218a1516ee7ff5e56fe2c708862c0911 [1] => ff842fc0615bafbd8205f47a73d54d6e [2] => ff842fc0615bafbd8205f47a73d54d6e [3] => ff842fc0615bafbd8205f47a73d54d6e [4] => ff842fc0615bafbd8205f47a73d54d6e [5] => ff842fc0615bafbd8205f47a73d54d6e [6] => ff842fc0615bafbd8205f47a73d54d6e [7] => ff842fc0615bafbd8205f47a73d54d6e [8] => ff842fc0615bafbd8205f47a73d54d6e [9] => ff842fc0615bafbd8205f47a73d54d6e [10] => ff842fc0615bafbd8205f47a73d54d6e [11] => ff842fc0615bafbd8205f47a73d54d6e ) ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => one-of-the-most-dangerous-forms-of-ransomware-has-just-evolved-to-be-harder-to-spot )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/one-of-the-most-dangerous-forms-of-ransomware-has-just-evolved-to-be-harder-to-spot/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 218a1516ee7ff5e56fe2c708862c0911 [1] => ff842fc0615bafbd8205f47a73d54d6e [2] => ff842fc0615bafbd8205f47a73d54d6e [3] => ff842fc0615bafbd8205f47a73d54d6e [4] => ff842fc0615bafbd8205f47a73d54d6e [5] => ff842fc0615bafbd8205f47a73d54d6e [6] => ff842fc0615bafbd8205f47a73d54d6e [7] => ff842fc0615bafbd8205f47a73d54d6e [8] => ff842fc0615bafbd8205f47a73d54d6e [9] => ff842fc0615bafbd8205f47a73d54d6e [10] => ff842fc0615bafbd8205f47a73d54d6e [11] => ff842fc0615bafbd8205f47a73d54d6e ) )

Execute : Enclosure images

Enclosure save:

Array ( [0] => )

No match on

Decide filter: Returning post, everything seems orderly :One of the most dangerous forms of ransomware has just evolved to be harder to spot

Array ( [post_title] => One of the most dangerous forms of ransomware has just evolved to be harder to spot [post_content] => Malicious loaders delivered by self-extracting Dropbox files enable payloads to bypass detection. [post_excerpt] => Malicious loaders delivered by self-extracting Dropbox files enable payloads to bypass detection. [post_date_gmt] => 2017-03-28 16:41:00 [post_date] => 2017-03-28 17:41:00 [post_modified_gmt] => 2017-03-28 16:41:00 [post_modified] => 2017-03-28 17:41:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 1eaaabc0-6113-4060-9edf-7fc4b20da661 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/one-of-the-most-dangerous-forms-of-ransomware-has-just-evolved-to-be-harder-to-spot/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 218a1516ee7ff5e56fe2c708862c0911 [1] => ff842fc0615bafbd8205f47a73d54d6e [2] => ff842fc0615bafbd8205f47a73d54d6e [3] => ff842fc0615bafbd8205f47a73d54d6e [4] => ff842fc0615bafbd8205f47a73d54d6e [5] => ff842fc0615bafbd8205f47a73d54d6e [6] => ff842fc0615bafbd8205f47a73d54d6e [7] => ff842fc0615bafbd8205f47a73d54d6e [8] => ff842fc0615bafbd8205f47a73d54d6e [9] => ff842fc0615bafbd8205f47a73d54d6e [10] => ff842fc0615bafbd8205f47a73d54d6e [11] => ff842fc0615bafbd8205f47a73d54d6e ) [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => one-of-the-most-dangerous-forms-of-ransomware-has-just-evolved-to-be-harder-to-spot )

FAF deciding on filters on post to be syndicated:

MIT: US cyber insecurity a 'disgrace' that Trump needs to take seriously

Array ( [post_title] => MIT: US cyber insecurity a 'disgrace' that Trump needs to take seriously [post_content] => MIT says that unless cybersecurity becomes a priority and more than just lip service, US core services will be at risk. [post_excerpt] => MIT says that unless cybersecurity becomes a priority and more than just lip service, US core services will be at risk. [post_date_gmt] => 2017-03-28 14:00:00 [post_date] => 2017-03-28 15:00:00 [post_modified_gmt] => 2017-03-28 14:00:00 [post_modified] => 2017-03-28 15:00:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 6ec0646f-bdd5-4c47-b5d3-f834fd08444e [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/mit-pushes-trump-to-take-critical-grid-utility-hacking-risks-seriously/#ftag=RSSbaffb68 [syndication_item_hash] => 1b373a7616289feb79c430a363618c87 ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/mit-pushes-trump-to-take-critical-grid-utility-hacking-risks-seriously/#ftag=RSSbaffb68 [syndication_item_hash] => 1b373a7616289feb79c430a363618c87 )

Execute : Enclosure images

Enclosure save:

Array ( [0] => )

No match on

Decide filter: Returning post, everything seems orderly :MIT: US cyber insecurity a 'disgrace' that Trump needs to take seriously

Array ( [post_title] => MIT: US cyber insecurity a 'disgrace' that Trump needs to take seriously [post_content] => MIT says that unless cybersecurity becomes a priority and more than just lip service, US core services will be at risk. [post_excerpt] => MIT says that unless cybersecurity becomes a priority and more than just lip service, US core services will be at risk. [post_date_gmt] => 2017-03-28 14:00:00 [post_date] => 2017-03-28 15:00:00 [post_modified_gmt] => 2017-03-28 14:00:00 [post_modified] => 2017-03-28 15:00:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 6ec0646f-bdd5-4c47-b5d3-f834fd08444e [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/mit-pushes-trump-to-take-critical-grid-utility-hacking-risks-seriously/#ftag=RSSbaffb68 [syndication_item_hash] => 1b373a7616289feb79c430a363618c87 [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) )

FAF deciding on filters on post to be syndicated:

Security? What security? Four million data records are stolen or lost every day

Array ( [post_title] => Security? What security? Four million data records are stolen or lost every day [post_content] => The number of data records being stolen almost doubled between 2015 and 2016 - to 1.4 billion [post_excerpt] => The number of data records being stolen almost doubled between 2015 and 2016 - to 1.4 billion [post_date_gmt] => 2017-03-28 13:51:23 [post_date] => 2017-03-28 14:51:23 [post_modified_gmt] => 2017-03-28 13:51:23 [post_modified] => 2017-03-28 14:51:23 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => e44068b2-9f05-46e1-a810-d3afbb984b1d [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/security-what-security-four-million-data-records-are-stolen-or-lost-every-day/#ftag=RSSbaffb68 [syndication_item_hash] => cc725b9c56a124aa79312105e3953dc1 ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/security-what-security-four-million-data-records-are-stolen-or-lost-every-day/#ftag=RSSbaffb68 [syndication_item_hash] => cc725b9c56a124aa79312105e3953dc1 )

Execute : Enclosure images

Enclosure save:

Array ( [0] => )

No match on

Decide filter: Returning post, everything seems orderly :Security? What security? Four million data records are stolen or lost every day

Array ( [post_title] => Security? What security? Four million data records are stolen or lost every day [post_content] => The number of data records being stolen almost doubled between 2015 and 2016 - to 1.4 billion [post_excerpt] => The number of data records being stolen almost doubled between 2015 and 2016 - to 1.4 billion [post_date_gmt] => 2017-03-28 13:51:23 [post_date] => 2017-03-28 14:51:23 [post_modified_gmt] => 2017-03-28 13:51:23 [post_modified] => 2017-03-28 14:51:23 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => e44068b2-9f05-46e1-a810-d3afbb984b1d [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/security-what-security-four-million-data-records-are-stolen-or-lost-every-day/#ftag=RSSbaffb68 [syndication_item_hash] => cc725b9c56a124aa79312105e3953dc1 [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) )

FAF deciding on filters on post to be syndicated:

Adware rewrites phone details for legitimate security software on Google search

Array ( [post_title] => Adware rewrites phone details for legitimate security software on Google search [post_content] => You might not know you have it, but Crusader will manipulate your search results to push tech support scams. [post_excerpt] => You might not know you have it, but Crusader will manipulate your search results to push tech support scams. [post_date_gmt] => 2017-03-28 10:35:00 [post_date] => 2017-03-28 11:35:00 [post_modified_gmt] => 2017-03-28 10:35:00 [post_modified] => 2017-03-28 11:35:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 5547f461-0cac-4fc0-873f-ac0f5dc0172f [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/adware-rewrites-phone-details-for-legitimate-security-software-on-google-search/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 251d7f8e56631e656c5ac09d9d216ed8 [1] => 251d7f8e56631e656c5ac09d9d216ed8 [2] => 251d7f8e56631e656c5ac09d9d216ed8 [3] => 251d7f8e56631e656c5ac09d9d216ed8 [4] => 251d7f8e56631e656c5ac09d9d216ed8 [5] => 251d7f8e56631e656c5ac09d9d216ed8 [6] => 251d7f8e56631e656c5ac09d9d216ed8 [7] => 251d7f8e56631e656c5ac09d9d216ed8 [8] => 251d7f8e56631e656c5ac09d9d216ed8 [9] => 251d7f8e56631e656c5ac09d9d216ed8 [10] => 251d7f8e56631e656c5ac09d9d216ed8 [11] => 251d7f8e56631e656c5ac09d9d216ed8 [12] => 251d7f8e56631e656c5ac09d9d216ed8 [13] => 251d7f8e56631e656c5ac09d9d216ed8 [14] => 251d7f8e56631e656c5ac09d9d216ed8 [15] => 251d7f8e56631e656c5ac09d9d216ed8 [16] => 251d7f8e56631e656c5ac09d9d216ed8 [17] => 251d7f8e56631e656c5ac09d9d216ed8 [18] => 251d7f8e56631e656c5ac09d9d216ed8 [19] => 251d7f8e56631e656c5ac09d9d216ed8 [20] => 251d7f8e56631e656c5ac09d9d216ed8 [21] => 251d7f8e56631e656c5ac09d9d216ed8 [22] => 251d7f8e56631e656c5ac09d9d216ed8 ) ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => adware-rewrites-phone-details-for-legitimate-security-software-on-google-search )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/adware-rewrites-phone-details-for-legitimate-security-software-on-google-search/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 251d7f8e56631e656c5ac09d9d216ed8 [1] => 251d7f8e56631e656c5ac09d9d216ed8 [2] => 251d7f8e56631e656c5ac09d9d216ed8 [3] => 251d7f8e56631e656c5ac09d9d216ed8 [4] => 251d7f8e56631e656c5ac09d9d216ed8 [5] => 251d7f8e56631e656c5ac09d9d216ed8 [6] => 251d7f8e56631e656c5ac09d9d216ed8 [7] => 251d7f8e56631e656c5ac09d9d216ed8 [8] => 251d7f8e56631e656c5ac09d9d216ed8 [9] => 251d7f8e56631e656c5ac09d9d216ed8 [10] => 251d7f8e56631e656c5ac09d9d216ed8 [11] => 251d7f8e56631e656c5ac09d9d216ed8 [12] => 251d7f8e56631e656c5ac09d9d216ed8 [13] => 251d7f8e56631e656c5ac09d9d216ed8 [14] => 251d7f8e56631e656c5ac09d9d216ed8 [15] => 251d7f8e56631e656c5ac09d9d216ed8 [16] => 251d7f8e56631e656c5ac09d9d216ed8 [17] => 251d7f8e56631e656c5ac09d9d216ed8 [18] => 251d7f8e56631e656c5ac09d9d216ed8 [19] => 251d7f8e56631e656c5ac09d9d216ed8 [20] => 251d7f8e56631e656c5ac09d9d216ed8 [21] => 251d7f8e56631e656c5ac09d9d216ed8 [22] => 251d7f8e56631e656c5ac09d9d216ed8 ) )

Execute : Enclosure images

Enclosure save:

Array ( [0] => )

No match on

Decide filter: Returning post, everything seems orderly :Adware rewrites phone details for legitimate security software on Google search

Array ( [post_title] => Adware rewrites phone details for legitimate security software on Google search [post_content] => You might not know you have it, but Crusader will manipulate your search results to push tech support scams. [post_excerpt] => You might not know you have it, but Crusader will manipulate your search results to push tech support scams. [post_date_gmt] => 2017-03-28 10:35:00 [post_date] => 2017-03-28 11:35:00 [post_modified_gmt] => 2017-03-28 10:35:00 [post_modified] => 2017-03-28 11:35:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 5547f461-0cac-4fc0-873f-ac0f5dc0172f [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/adware-rewrites-phone-details-for-legitimate-security-software-on-google-search/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 251d7f8e56631e656c5ac09d9d216ed8 [1] => 251d7f8e56631e656c5ac09d9d216ed8 [2] => 251d7f8e56631e656c5ac09d9d216ed8 [3] => 251d7f8e56631e656c5ac09d9d216ed8 [4] => 251d7f8e56631e656c5ac09d9d216ed8 [5] => 251d7f8e56631e656c5ac09d9d216ed8 [6] => 251d7f8e56631e656c5ac09d9d216ed8 [7] => 251d7f8e56631e656c5ac09d9d216ed8 [8] => 251d7f8e56631e656c5ac09d9d216ed8 [9] => 251d7f8e56631e656c5ac09d9d216ed8 [10] => 251d7f8e56631e656c5ac09d9d216ed8 [11] => 251d7f8e56631e656c5ac09d9d216ed8 [12] => 251d7f8e56631e656c5ac09d9d216ed8 [13] => 251d7f8e56631e656c5ac09d9d216ed8 [14] => 251d7f8e56631e656c5ac09d9d216ed8 [15] => 251d7f8e56631e656c5ac09d9d216ed8 [16] => 251d7f8e56631e656c5ac09d9d216ed8 [17] => 251d7f8e56631e656c5ac09d9d216ed8 [18] => 251d7f8e56631e656c5ac09d9d216ed8 [19] => 251d7f8e56631e656c5ac09d9d216ed8 [20] => 251d7f8e56631e656c5ac09d9d216ed8 [21] => 251d7f8e56631e656c5ac09d9d216ed8 [22] => 251d7f8e56631e656c5ac09d9d216ed8 ) [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => adware-rewrites-phone-details-for-legitimate-security-software-on-google-search )

FAF deciding on filters on post to be syndicated:

Ransom scam exploits Apple iOS Safari flaw to target porn viewers

Array ( [post_title] => Ransom scam exploits Apple iOS Safari flaw to target porn viewers [post_content] => The scareware campaign duped victims into paying a ransom. [post_excerpt] => The scareware campaign duped victims into paying a ransom. [post_date_gmt] => 2017-03-28 09:30:00 [post_date] => 2017-03-28 10:30:00 [post_modified_gmt] => 2017-03-28 09:30:00 [post_modified] => 2017-03-28 10:30:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 65d26be8-3f4d-4ad7-8c8c-caa61c696123 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/ransomware-exploits-apple-ios-safari-flaw-to-target-porn-viewers/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => cb798effcb372c5835da719cf9a53c38 [1] => cb798effcb372c5835da719cf9a53c38 [2] => cb798effcb372c5835da719cf9a53c38 [3] => cb798effcb372c5835da719cf9a53c38 [4] => cb798effcb372c5835da719cf9a53c38 [5] => cb798effcb372c5835da719cf9a53c38 [6] => cb798effcb372c5835da719cf9a53c38 [7] => cb798effcb372c5835da719cf9a53c38 [8] => cb798effcb372c5835da719cf9a53c38 [9] => cb798effcb372c5835da719cf9a53c38 [10] => cb798effcb372c5835da719cf9a53c38 [11] => cb798effcb372c5835da719cf9a53c38 [12] => cb798effcb372c5835da719cf9a53c38 [13] => cb798effcb372c5835da719cf9a53c38 [14] => cb798effcb372c5835da719cf9a53c38 [15] => cb798effcb372c5835da719cf9a53c38 [16] => cb798effcb372c5835da719cf9a53c38 [17] => cb798effcb372c5835da719cf9a53c38 [18] => cb798effcb372c5835da719cf9a53c38 [19] => cb798effcb372c5835da719cf9a53c38 [20] => cb798effcb372c5835da719cf9a53c38 [21] => cb798effcb372c5835da719cf9a53c38 [22] => cb798effcb372c5835da719cf9a53c38 ) ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => ransom-scam-exploits-apple-ios-safari-flaw-to-target-porn-viewers )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/ransomware-exploits-apple-ios-safari-flaw-to-target-porn-viewers/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => cb798effcb372c5835da719cf9a53c38 [1] => cb798effcb372c5835da719cf9a53c38 [2] => cb798effcb372c5835da719cf9a53c38 [3] => cb798effcb372c5835da719cf9a53c38 [4] => cb798effcb372c5835da719cf9a53c38 [5] => cb798effcb372c5835da719cf9a53c38 [6] => cb798effcb372c5835da719cf9a53c38 [7] => cb798effcb372c5835da719cf9a53c38 [8] => cb798effcb372c5835da719cf9a53c38 [9] => cb798effcb372c5835da719cf9a53c38 [10] => cb798effcb372c5835da719cf9a53c38 [11] => cb798effcb372c5835da719cf9a53c38 [12] => cb798effcb372c5835da719cf9a53c38 [13] => cb798effcb372c5835da719cf9a53c38 [14] => cb798effcb372c5835da719cf9a53c38 [15] => cb798effcb372c5835da719cf9a53c38 [16] => cb798effcb372c5835da719cf9a53c38 [17] => cb798effcb372c5835da719cf9a53c38 [18] => cb798effcb372c5835da719cf9a53c38 [19] => cb798effcb372c5835da719cf9a53c38 [20] => cb798effcb372c5835da719cf9a53c38 [21] => cb798effcb372c5835da719cf9a53c38 [22] => cb798effcb372c5835da719cf9a53c38 ) )

Execute : Enclosure images

Enclosure save:

Array ( [0] => )

No match on

Decide filter: Returning post, everything seems orderly :Ransom scam exploits Apple iOS Safari flaw to target porn viewers

Array ( [post_title] => Ransom scam exploits Apple iOS Safari flaw to target porn viewers [post_content] => The scareware campaign duped victims into paying a ransom. [post_excerpt] => The scareware campaign duped victims into paying a ransom. [post_date_gmt] => 2017-03-28 09:30:00 [post_date] => 2017-03-28 10:30:00 [post_modified_gmt] => 2017-03-28 09:30:00 [post_modified] => 2017-03-28 10:30:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 65d26be8-3f4d-4ad7-8c8c-caa61c696123 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/ransomware-exploits-apple-ios-safari-flaw-to-target-porn-viewers/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => cb798effcb372c5835da719cf9a53c38 [1] => cb798effcb372c5835da719cf9a53c38 [2] => cb798effcb372c5835da719cf9a53c38 [3] => cb798effcb372c5835da719cf9a53c38 [4] => cb798effcb372c5835da719cf9a53c38 [5] => cb798effcb372c5835da719cf9a53c38 [6] => cb798effcb372c5835da719cf9a53c38 [7] => cb798effcb372c5835da719cf9a53c38 [8] => cb798effcb372c5835da719cf9a53c38 [9] => cb798effcb372c5835da719cf9a53c38 [10] => cb798effcb372c5835da719cf9a53c38 [11] => cb798effcb372c5835da719cf9a53c38 [12] => cb798effcb372c5835da719cf9a53c38 [13] => cb798effcb372c5835da719cf9a53c38 [14] => cb798effcb372c5835da719cf9a53c38 [15] => cb798effcb372c5835da719cf9a53c38 [16] => cb798effcb372c5835da719cf9a53c38 [17] => cb798effcb372c5835da719cf9a53c38 [18] => cb798effcb372c5835da719cf9a53c38 [19] => cb798effcb372c5835da719cf9a53c38 [20] => cb798effcb372c5835da719cf9a53c38 [21] => cb798effcb372c5835da719cf9a53c38 [22] => cb798effcb372c5835da719cf9a53c38 ) [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => ransom-scam-exploits-apple-ios-safari-flaw-to-target-porn-viewers )

FAF deciding on filters on post to be syndicated:

How to fix disappearing iPhone passwords

Array ( [post_title] => How to fix disappearing iPhone passwords [post_content] => Once you've changed your Apple/iCloud password you may find it keeps disappearing from your iPhone, iPad, or iPod Touch. Here's how to bring it back for good. [post_excerpt] => Once you've changed your Apple/iCloud password you may find it keeps disappearing from your iPhone, iPad, or iPod Touch. Here's how to bring it back for good. [post_date_gmt] => 2017-03-28 00:16:00 [post_date] => 2017-03-28 01:16:00 [post_modified_gmt] => 2017-03-28 00:16:00 [post_modified] => 2017-03-28 01:16:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 6d9ceb8d-ffc2-49af-a779-06fb4f5e8d56 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/how-to-fix-disappearing-iphone-passwords/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => fbaec3764fa7d03a28979cf666c9c6a3 [1] => fbaec3764fa7d03a28979cf666c9c6a3 [2] => fbaec3764fa7d03a28979cf666c9c6a3 [3] => fbaec3764fa7d03a28979cf666c9c6a3 [4] => fbaec3764fa7d03a28979cf666c9c6a3 [5] => fbaec3764fa7d03a28979cf666c9c6a3 [6] => fbaec3764fa7d03a28979cf666c9c6a3 [7] => fbaec3764fa7d03a28979cf666c9c6a3 [8] => fbaec3764fa7d03a28979cf666c9c6a3 [9] => fbaec3764fa7d03a28979cf666c9c6a3 [10] => fbaec3764fa7d03a28979cf666c9c6a3 [11] => fbaec3764fa7d03a28979cf666c9c6a3 [12] => fbaec3764fa7d03a28979cf666c9c6a3 [13] => fbaec3764fa7d03a28979cf666c9c6a3 [14] => fbaec3764fa7d03a28979cf666c9c6a3 [15] => fbaec3764fa7d03a28979cf666c9c6a3 [16] => fbaec3764fa7d03a28979cf666c9c6a3 [17] => fbaec3764fa7d03a28979cf666c9c6a3 [18] => fbaec3764fa7d03a28979cf666c9c6a3 [19] => fbaec3764fa7d03a28979cf666c9c6a3 [20] => fbaec3764fa7d03a28979cf666c9c6a3 [21] => fbaec3764fa7d03a28979cf666c9c6a3 ) ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => how-to-fix-disappearing-iphone-passwords )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/how-to-fix-disappearing-iphone-passwords/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => fbaec3764fa7d03a28979cf666c9c6a3 [1] => fbaec3764fa7d03a28979cf666c9c6a3 [2] => fbaec3764fa7d03a28979cf666c9c6a3 [3] => fbaec3764fa7d03a28979cf666c9c6a3 [4] => fbaec3764fa7d03a28979cf666c9c6a3 [5] => fbaec3764fa7d03a28979cf666c9c6a3 [6] => fbaec3764fa7d03a28979cf666c9c6a3 [7] => fbaec3764fa7d03a28979cf666c9c6a3 [8] => fbaec3764fa7d03a28979cf666c9c6a3 [9] => fbaec3764fa7d03a28979cf666c9c6a3 [10] => fbaec3764fa7d03a28979cf666c9c6a3 [11] => fbaec3764fa7d03a28979cf666c9c6a3 [12] => fbaec3764fa7d03a28979cf666c9c6a3 [13] => fbaec3764fa7d03a28979cf666c9c6a3 [14] => fbaec3764fa7d03a28979cf666c9c6a3 [15] => fbaec3764fa7d03a28979cf666c9c6a3 [16] => fbaec3764fa7d03a28979cf666c9c6a3 [17] => fbaec3764fa7d03a28979cf666c9c6a3 [18] => fbaec3764fa7d03a28979cf666c9c6a3 [19] => fbaec3764fa7d03a28979cf666c9c6a3 [20] => fbaec3764fa7d03a28979cf666c9c6a3 [21] => fbaec3764fa7d03a28979cf666c9c6a3 ) )

Execute : Enclosure images

Enclosure save:

Array ( [0] => )

No match on

Decide filter: Returning post, everything seems orderly :How to fix disappearing iPhone passwords

Array ( [post_title] => How to fix disappearing iPhone passwords [post_content] => Once you've changed your Apple/iCloud password you may find it keeps disappearing from your iPhone, iPad, or iPod Touch. Here's how to bring it back for good. [post_excerpt] => Once you've changed your Apple/iCloud password you may find it keeps disappearing from your iPhone, iPad, or iPod Touch. Here's how to bring it back for good. [post_date_gmt] => 2017-03-28 00:16:00 [post_date] => 2017-03-28 01:16:00 [post_modified_gmt] => 2017-03-28 00:16:00 [post_modified] => 2017-03-28 01:16:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 6d9ceb8d-ffc2-49af-a779-06fb4f5e8d56 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/how-to-fix-disappearing-iphone-passwords/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => fbaec3764fa7d03a28979cf666c9c6a3 [1] => fbaec3764fa7d03a28979cf666c9c6a3 [2] => fbaec3764fa7d03a28979cf666c9c6a3 [3] => fbaec3764fa7d03a28979cf666c9c6a3 [4] => fbaec3764fa7d03a28979cf666c9c6a3 [5] => fbaec3764fa7d03a28979cf666c9c6a3 [6] => fbaec3764fa7d03a28979cf666c9c6a3 [7] => fbaec3764fa7d03a28979cf666c9c6a3 [8] => fbaec3764fa7d03a28979cf666c9c6a3 [9] => fbaec3764fa7d03a28979cf666c9c6a3 [10] => fbaec3764fa7d03a28979cf666c9c6a3 [11] => fbaec3764fa7d03a28979cf666c9c6a3 [12] => fbaec3764fa7d03a28979cf666c9c6a3 [13] => fbaec3764fa7d03a28979cf666c9c6a3 [14] => fbaec3764fa7d03a28979cf666c9c6a3 [15] => fbaec3764fa7d03a28979cf666c9c6a3 [16] => fbaec3764fa7d03a28979cf666c9c6a3 [17] => fbaec3764fa7d03a28979cf666c9c6a3 [18] => fbaec3764fa7d03a28979cf666c9c6a3 [19] => fbaec3764fa7d03a28979cf666c9c6a3 [20] => fbaec3764fa7d03a28979cf666c9c6a3 [21] => fbaec3764fa7d03a28979cf666c9c6a3 ) [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => how-to-fix-disappearing-iphone-passwords )

FAF deciding on filters on post to be syndicated:

Apple pushes security update to OS X Yosemite and El Capitan

Array ( [post_title] => Apple pushes security update to OS X Yosemite and El Capitan [post_content] => Apple has a surprise for OS X Yosemite and El Capitan users: A security update. [post_excerpt] => Apple has a surprise for OS X Yosemite and El Capitan users: A security update. [post_date_gmt] => 2017-03-27 18:25:00 [post_date] => 2017-03-27 19:25:00 [post_modified_gmt] => 2017-03-27 18:25:00 [post_modified] => 2017-03-27 19:25:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 91b607d6-51ff-45b3-aa2e-89cbbcbabf2a [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/apple-pushes-security-update-to-os-x-yosemite-and-el-capitan/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => e6b31d5870677b096e0453aab814a3a0 [1] => 72a6af91610396684dc2378b91ab0735 [2] => 72a6af91610396684dc2378b91ab0735 [3] => 72a6af91610396684dc2378b91ab0735 [4] => 72a6af91610396684dc2378b91ab0735 [5] => 72a6af91610396684dc2378b91ab0735 [6] => 72a6af91610396684dc2378b91ab0735 [7] => 72a6af91610396684dc2378b91ab0735 [8] => 72a6af91610396684dc2378b91ab0735 [9] => 72a6af91610396684dc2378b91ab0735 [10] => 72a6af91610396684dc2378b91ab0735 [11] => 72a6af91610396684dc2378b91ab0735 [12] => 72a6af91610396684dc2378b91ab0735 [13] => 72a6af91610396684dc2378b91ab0735 [14] => 72a6af91610396684dc2378b91ab0735 [15] => 72a6af91610396684dc2378b91ab0735 [16] => 72a6af91610396684dc2378b91ab0735 [17] => 72a6af91610396684dc2378b91ab0735 [18] => 72a6af91610396684dc2378b91ab0735 [19] => 72a6af91610396684dc2378b91ab0735 [20] => 72a6af91610396684dc2378b91ab0735 [21] => 72a6af91610396684dc2378b91ab0735 [22] => 72a6af91610396684dc2378b91ab0735 [23] => 72a6af91610396684dc2378b91ab0735 [24] => 72a6af91610396684dc2378b91ab0735 [25] => 72a6af91610396684dc2378b91ab0735 [26] => 72a6af91610396684dc2378b91ab0735 [27] => 72a6af91610396684dc2378b91ab0735 [28] => 72a6af91610396684dc2378b91ab0735 [29] => 72a6af91610396684dc2378b91ab0735 [30] => 72a6af91610396684dc2378b91ab0735 [31] => 72a6af91610396684dc2378b91ab0735 [32] => 72a6af91610396684dc2378b91ab0735 [33] => 72a6af91610396684dc2378b91ab0735 [34] => 72a6af91610396684dc2378b91ab0735 [35] => 72a6af91610396684dc2378b91ab0735 [36] => 72a6af91610396684dc2378b91ab0735 [37] => 72a6af91610396684dc2378b91ab0735 [38] => 72a6af91610396684dc2378b91ab0735 ) ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => apple-pushes-security-update-to-os-x-yosemite-and-el-capitan )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/apple-pushes-security-update-to-os-x-yosemite-and-el-capitan/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => e6b31d5870677b096e0453aab814a3a0 [1] => 72a6af91610396684dc2378b91ab0735 [2] => 72a6af91610396684dc2378b91ab0735 [3] => 72a6af91610396684dc2378b91ab0735 [4] => 72a6af91610396684dc2378b91ab0735 [5] => 72a6af91610396684dc2378b91ab0735 [6] => 72a6af91610396684dc2378b91ab0735 [7] => 72a6af91610396684dc2378b91ab0735 [8] => 72a6af91610396684dc2378b91ab0735 [9] => 72a6af91610396684dc2378b91ab0735 [10] => 72a6af91610396684dc2378b91ab0735 [11] => 72a6af91610396684dc2378b91ab0735 [12] => 72a6af91610396684dc2378b91ab0735 [13] => 72a6af91610396684dc2378b91ab0735 [14] => 72a6af91610396684dc2378b91ab0735 [15] => 72a6af91610396684dc2378b91ab0735 [16] => 72a6af91610396684dc2378b91ab0735 [17] => 72a6af91610396684dc2378b91ab0735 [18] => 72a6af91610396684dc2378b91ab0735 [19] => 72a6af91610396684dc2378b91ab0735 [20] => 72a6af91610396684dc2378b91ab0735 [21] => 72a6af91610396684dc2378b91ab0735 [22] => 72a6af91610396684dc2378b91ab0735 [23] => 72a6af91610396684dc2378b91ab0735 [24] => 72a6af91610396684dc2378b91ab0735 [25] => 72a6af91610396684dc2378b91ab0735 [26] => 72a6af91610396684dc2378b91ab0735 [27] => 72a6af91610396684dc2378b91ab0735 [28] => 72a6af91610396684dc2378b91ab0735 [29] => 72a6af91610396684dc2378b91ab0735 [30] => 72a6af91610396684dc2378b91ab0735 [31] => 72a6af91610396684dc2378b91ab0735 [32] => 72a6af91610396684dc2378b91ab0735 [33] => 72a6af91610396684dc2378b91ab0735 [34] => 72a6af91610396684dc2378b91ab0735 [35] => 72a6af91610396684dc2378b91ab0735 [36] => 72a6af91610396684dc2378b91ab0735 [37] => 72a6af91610396684dc2378b91ab0735 [38] => 72a6af91610396684dc2378b91ab0735 ) )

Execute : Enclosure images

Enclosure save:

Array ( [0] => )

No match on

Decide filter: Returning post, everything seems orderly :Apple pushes security update to OS X Yosemite and El Capitan

Array ( [post_title] => Apple pushes security update to OS X Yosemite and El Capitan [post_content] => Apple has a surprise for OS X Yosemite and El Capitan users: A security update. [post_excerpt] => Apple has a surprise for OS X Yosemite and El Capitan users: A security update. [post_date_gmt] => 2017-03-27 18:25:00 [post_date] => 2017-03-27 19:25:00 [post_modified_gmt] => 2017-03-27 18:25:00 [post_modified] => 2017-03-27 19:25:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 91b607d6-51ff-45b3-aa2e-89cbbcbabf2a [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/apple-pushes-security-update-to-os-x-yosemite-and-el-capitan/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => e6b31d5870677b096e0453aab814a3a0 [1] => 72a6af91610396684dc2378b91ab0735 [2] => 72a6af91610396684dc2378b91ab0735 [3] => 72a6af91610396684dc2378b91ab0735 [4] => 72a6af91610396684dc2378b91ab0735 [5] => 72a6af91610396684dc2378b91ab0735 [6] => 72a6af91610396684dc2378b91ab0735 [7] => 72a6af91610396684dc2378b91ab0735 [8] => 72a6af91610396684dc2378b91ab0735 [9] => 72a6af91610396684dc2378b91ab0735 [10] => 72a6af91610396684dc2378b91ab0735 [11] => 72a6af91610396684dc2378b91ab0735 [12] => 72a6af91610396684dc2378b91ab0735 [13] => 72a6af91610396684dc2378b91ab0735 [14] => 72a6af91610396684dc2378b91ab0735 [15] => 72a6af91610396684dc2378b91ab0735 [16] => 72a6af91610396684dc2378b91ab0735 [17] => 72a6af91610396684dc2378b91ab0735 [18] => 72a6af91610396684dc2378b91ab0735 [19] => 72a6af91610396684dc2378b91ab0735 [20] => 72a6af91610396684dc2378b91ab0735 [21] => 72a6af91610396684dc2378b91ab0735 [22] => 72a6af91610396684dc2378b91ab0735 [23] => 72a6af91610396684dc2378b91ab0735 [24] => 72a6af91610396684dc2378b91ab0735 [25] => 72a6af91610396684dc2378b91ab0735 [26] => 72a6af91610396684dc2378b91ab0735 [27] => 72a6af91610396684dc2378b91ab0735 [28] => 72a6af91610396684dc2378b91ab0735 [29] => 72a6af91610396684dc2378b91ab0735 [30] => 72a6af91610396684dc2378b91ab0735 [31] => 72a6af91610396684dc2378b91ab0735 [32] => 72a6af91610396684dc2378b91ab0735 [33] => 72a6af91610396684dc2378b91ab0735 [34] => 72a6af91610396684dc2378b91ab0735 [35] => 72a6af91610396684dc2378b91ab0735 [36] => 72a6af91610396684dc2378b91ab0735 [37] => 72a6af91610396684dc2378b91ab0735 [38] => 72a6af91610396684dc2378b91ab0735 ) [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => apple-pushes-security-update-to-os-x-yosemite-and-el-capitan )

FAF deciding on filters on post to be syndicated:

Passwords: Workers say they will hand them over for next to nothing

Array ( [post_title] => Passwords: Workers say they will hand them over for next to nothing [post_content] => One in seven employees would risk a data breach for a small amount of money. [post_excerpt] => One in seven employees would risk a data breach for a small amount of money. [post_date_gmt] => 2017-03-27 14:04:00 [post_date] => 2017-03-27 15:04:00 [post_modified_gmt] => 2017-03-27 14:04:00 [post_modified] => 2017-03-27 15:04:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 38fa66da-3faf-48d1-bb46-8fc64f7a6282 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/passwords-workers-say-they-will-hand-them-over-for-next-to-nothing/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 5c3199d98d801cb107a78a496c470719 [1] => 5c3199d98d801cb107a78a496c470719 [2] => 5c3199d98d801cb107a78a496c470719 [3] => 5c3199d98d801cb107a78a496c470719 [4] => 5c3199d98d801cb107a78a496c470719 [5] => 5c3199d98d801cb107a78a496c470719 [6] => 5c3199d98d801cb107a78a496c470719 [7] => 5c3199d98d801cb107a78a496c470719 [8] => 5c3199d98d801cb107a78a496c470719 [9] => 5c3199d98d801cb107a78a496c470719 [10] => 5c3199d98d801cb107a78a496c470719 [11] => 5c3199d98d801cb107a78a496c470719 [12] => 5c3199d98d801cb107a78a496c470719 [13] => 5c3199d98d801cb107a78a496c470719 [14] => 5c3199d98d801cb107a78a496c470719 [15] => 5c3199d98d801cb107a78a496c470719 [16] => 5c3199d98d801cb107a78a496c470719 [17] => 5c3199d98d801cb107a78a496c470719 [18] => 5c3199d98d801cb107a78a496c470719 [19] => 5c3199d98d801cb107a78a496c470719 [20] => 5c3199d98d801cb107a78a496c470719 [21] => 5c3199d98d801cb107a78a496c470719 [22] => 5c3199d98d801cb107a78a496c470719 [23] => 5c3199d98d801cb107a78a496c470719 [24] => 5c3199d98d801cb107a78a496c470719 [25] => 5c3199d98d801cb107a78a496c470719 [26] => 5c3199d98d801cb107a78a496c470719 [27] => 5c3199d98d801cb107a78a496c470719 [28] => 5c3199d98d801cb107a78a496c470719 [29] => 5c3199d98d801cb107a78a496c470719 [30] => 5c3199d98d801cb107a78a496c470719 ) ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => passwords-workers-say-they-will-hand-them-over-for-next-to-nothing )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/passwords-workers-say-they-will-hand-them-over-for-next-to-nothing/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 5c3199d98d801cb107a78a496c470719 [1] => 5c3199d98d801cb107a78a496c470719 [2] => 5c3199d98d801cb107a78a496c470719 [3] => 5c3199d98d801cb107a78a496c470719 [4] => 5c3199d98d801cb107a78a496c470719 [5] => 5c3199d98d801cb107a78a496c470719 [6] => 5c3199d98d801cb107a78a496c470719 [7] => 5c3199d98d801cb107a78a496c470719 [8] => 5c3199d98d801cb107a78a496c470719 [9] => 5c3199d98d801cb107a78a496c470719 [10] => 5c3199d98d801cb107a78a496c470719 [11] => 5c3199d98d801cb107a78a496c470719 [12] => 5c3199d98d801cb107a78a496c470719 [13] => 5c3199d98d801cb107a78a496c470719 [14] => 5c3199d98d801cb107a78a496c470719 [15] => 5c3199d98d801cb107a78a496c470719 [16] => 5c3199d98d801cb107a78a496c470719 [17] => 5c3199d98d801cb107a78a496c470719 [18] => 5c3199d98d801cb107a78a496c470719 [19] => 5c3199d98d801cb107a78a496c470719 [20] => 5c3199d98d801cb107a78a496c470719 [21] => 5c3199d98d801cb107a78a496c470719 [22] => 5c3199d98d801cb107a78a496c470719 [23] => 5c3199d98d801cb107a78a496c470719 [24] => 5c3199d98d801cb107a78a496c470719 [25] => 5c3199d98d801cb107a78a496c470719 [26] => 5c3199d98d801cb107a78a496c470719 [27] => 5c3199d98d801cb107a78a496c470719 [28] => 5c3199d98d801cb107a78a496c470719 [29] => 5c3199d98d801cb107a78a496c470719 [30] => 5c3199d98d801cb107a78a496c470719 ) )

Execute : Enclosure images

Enclosure save:

Array ( [0] => )

No match on

Decide filter: Returning post, everything seems orderly :Passwords: Workers say they will hand them over for next to nothing

Array ( [post_title] => Passwords: Workers say they will hand them over for next to nothing [post_content] => One in seven employees would risk a data breach for a small amount of money. [post_excerpt] => One in seven employees would risk a data breach for a small amount of money. [post_date_gmt] => 2017-03-27 14:04:00 [post_date] => 2017-03-27 15:04:00 [post_modified_gmt] => 2017-03-27 14:04:00 [post_modified] => 2017-03-27 15:04:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 38fa66da-3faf-48d1-bb46-8fc64f7a6282 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/passwords-workers-say-they-will-hand-them-over-for-next-to-nothing/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 5c3199d98d801cb107a78a496c470719 [1] => 5c3199d98d801cb107a78a496c470719 [2] => 5c3199d98d801cb107a78a496c470719 [3] => 5c3199d98d801cb107a78a496c470719 [4] => 5c3199d98d801cb107a78a496c470719 [5] => 5c3199d98d801cb107a78a496c470719 [6] => 5c3199d98d801cb107a78a496c470719 [7] => 5c3199d98d801cb107a78a496c470719 [8] => 5c3199d98d801cb107a78a496c470719 [9] => 5c3199d98d801cb107a78a496c470719 [10] => 5c3199d98d801cb107a78a496c470719 [11] => 5c3199d98d801cb107a78a496c470719 [12] => 5c3199d98d801cb107a78a496c470719 [13] => 5c3199d98d801cb107a78a496c470719 [14] => 5c3199d98d801cb107a78a496c470719 [15] => 5c3199d98d801cb107a78a496c470719 [16] => 5c3199d98d801cb107a78a496c470719 [17] => 5c3199d98d801cb107a78a496c470719 [18] => 5c3199d98d801cb107a78a496c470719 [19] => 5c3199d98d801cb107a78a496c470719 [20] => 5c3199d98d801cb107a78a496c470719 [21] => 5c3199d98d801cb107a78a496c470719 [22] => 5c3199d98d801cb107a78a496c470719 [23] => 5c3199d98d801cb107a78a496c470719 [24] => 5c3199d98d801cb107a78a496c470719 [25] => 5c3199d98d801cb107a78a496c470719 [26] => 5c3199d98d801cb107a78a496c470719 [27] => 5c3199d98d801cb107a78a496c470719 [28] => 5c3199d98d801cb107a78a496c470719 [29] => 5c3199d98d801cb107a78a496c470719 [30] => 5c3199d98d801cb107a78a496c470719 ) [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => passwords-workers-say-they-will-hand-them-over-for-next-to-nothing )

FAF deciding on filters on post to be syndicated:

Threat Landscape for Industrial Automation Systems, H2 2016

Array ( [post_title] => Threat Landscape for Industrial Automation Systems, H2 2016 [post_content] =>

The Kaspersky Lab Industrial Control Systems Cyber Emergency Response Team (Kaspersky Lab ICS CERT) is starting a series of regular publications about our research devoted to the threat landscape for industrial organizations.

All statistical data used in the report was obtained using Kaspersky Security Network (KSN), a distributed antivirus network. Data was received from those KSN users who consented to have their data collected anonymously.

The research carried out in the second half of 2016 by Kaspersky Lab ICS CERT experts clearly demonstrates a number of trends in the evolution of industrial enterprise security.

  1. On average, in the second half of 2016 Kaspersky Lab products across the globe blocked attempted attacks on 39.2% of protected computers that Kaspersky Lab ICS CERT classifies as being part of industrial enterprise technology infrastructure.

    This group includes computers that run Windows and perform one or more of the following functions:

    The group also includes computers of external 3-d party contractors, SCADA vendors and system integrators as well as internal SCADA administrators.

  2. Every month, an average of one industrial computer in five (20.1%) is attacked by malware. We have seen stable growth in the percentage of industrial computers attacked since the beginning of our observations, highlighting the importance of cybersecurity issues.

    Threat Landscape for Industrial Automation Systems, H2 2016

    Percentage of industrial computers attacked by month (second half of 2016)

  3. Isolation of industrial networks can no longer be considered an effective protective measure. The proportion of malware infection attempts involving portable media, infection of backup copies, use of sophisticated schemes for transferring data from isolated networks in complex attacks – all of this demonstrates that risks cannot be avoided by simply disconnecting a system from the Internet.

    Threat Landscape for Industrial Automation Systems, H2 2016

    Sources of threats blocked on industrial computers (second half of 2016)

  4. Remarkably, there is very little difference between the rankings of malware detected on industrial computers and those of malware detected on corporate computers. We believe that this demonstrates the absence of significant differences between computers on corporate networks and those on industrial networks in terms of the risk of chance infections. However, it is obvious that even a chance infection on an industrial network can lead to dangerous consequences.
  5. Threat Landscape for Industrial Automation Systems, H2 2016

    Distribution of industrial computers attacked by classes of malware used in attacks (second half of 2016)

  6. According to our data, targeted attacks on companies in different industrial sectors are increasingly common. These are organized attacks that can target one enterprise, several enterprises, companies in one industrial sector or a broad range of industrial enterprises.

    The Kaspersky Lab ICS CERT detected a series of phishing attacks which began no later than June 2016 and which are still active. The attacks target primarily industrial companies – metallurgical, electric power, construction, engineering and others. We estimate the number of companies attacked at over 500 in more than 50 countries around the world.

    None of the malicious programs used in the attack – trojan spies and backdoors from different families, such as ZeuS, Pony/FareIT, Luminosity RAT, NetWire RAT, HawkEye, and ISR Stealer – are unique to this malicious campaign. They are all very popular among cybercriminals. However, these programs are packed with unique modifications of VB and MSIL packers that are used only in this attack. Our experience of investigating targeted attacks shows that cyberespionage is often used to prepare subsequent attack stages.

  7. One quarter of all targeted attacks uncovered by Kaspersky Lab in 2016 targeted, among others, different industries – machine building, energy, chemical, transport and others.

  8. In 2016, Kaspersky Lab evaluated the current state of IT security components in the industrial control systems of different vendors. As a result of this research, 75 vulnerabilities were identified in ICS components. 58 of them were marked as maximum critical vulnerabilities (CVSS v3.0 severity score 7.0 or higher).

  9. Threat Landscape for Industrial Automation Systems, H2 2016

    Distribution of vulnerabilities uncovered by Kaspersky Lab in 2016 according to the ways in which they can be used

    Of the 75 vulnerabilities identified by the middle of March 2017 by Kaspersky Lab, industrial software vendors closed 30.

    The approach of industrial software vendors to closing vulnerabilities and the situation with fixing known vulnerabilities at enterprises is by no means reassuring. The approach to addressing vulnerabilities as part of the software development cycle has not yet been sufficiently refined: vendors do not prioritize the closing of identified vulnerabilities based on their severity, they prefer to fix vulnerabilities in the next release of their product rather than releasing a fix or patch that is critical from an IT security viewpoint.

    Another issue is the installation of updates and security patches at enterprises. Based on our research and ICS IT security audits, we believe that for ICS owners, the process of installing critical updates is either too labor-intensive or not a high-priority task in the system’s overall lifecycle. As a result, at some enterprises critical updates of various industrial system components are not installed for years, making these enterprises vulnerable in the event of cyberattacks.

The industrial network is increasingly similar to the corporate network – both in terms of usage scenarios and in terms of technologies used. New technologies are being used that improve process transparency and efficiency at the enterprise level, as well as providing flexibility and fault tolerance of the functions performed at medium and lower industrial automation levels. The upshot of all this is that the cyber threat landscape for industrial systems is increasingly similar to the threat landscape for corporate networks. Consequently, we can expect not only the emergence of new threats specifically designed for industrial enterprises but also the evolution of existing, traditional IT threats, which involves their adaptation for attacks against industrial enterprises and physical world objects.

The emergence of large-scale malicious campaigns targeting industrial enterprises indicates that black hats see this area as promising. This is a serious challenge for the entire community of industrial automation system developers, owners and operators of such systems, and security vendors. We are still remarkably languid and slow-moving in most cases, which is fraught with dangers under the circumstances.

The full report is available on Kaspersky Lab ICS CERT website.

[post_excerpt] => On average, in the second half of 2016 Kaspersky Lab products across the globe blocked attempted attacks on 39.2% of protected computers that Kaspersky Lab ICS CERT classifies as being part of industrial enterprise technology infrastructure. [post_date_gmt] => 2017-03-28 09:00:34 [post_date] => 2017-03-28 10:00:34 [post_modified_gmt] => 2017-03-28 09:00:34 [post_modified] => 2017-03-28 10:00:34 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => https://kasperskycontenthub.com/securelist/?p=77842 [meta] => Array ( [enclosure] => Array ( [0] => https://securelist.com/files/2017/03/ics_cert_report_main.jpg ) [syndication_source] => Securelist - Information about Viruses, Hackers and Spam [syndication_source_uri] => https://securelist.com [syndication_source_id] => https://securelist.com/feed/ [rss:comments] => https://securelist.com/analysis/publications/77842/threat-landscape-for-industrial-automation-systems-h2-2016/#respond [wfw:commentRSS] => https://securelist.com/analysis/publications/77842/threat-landscape-for-industrial-automation-systems-h2-2016/feed/ [syndication_feed] => https://securelist.com/feed/ [syndication_feed_id] => 68 [syndication_permalink] => https://securelist.com/analysis/publications/77842/threat-landscape-for-industrial-automation-systems-h2-2016/ [syndication_item_hash] => d5f89187d0444cf181ec0bb56cb5ad10 ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 8 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

Local save:https://securelist.com/files/2017/03/ics_cert_report_main-990x400.jpg

Image process :: Saving local image

grab remote location : https://securelist.com/files/2017/03/ics_cert_report_main-990x400.jpg

Image exists, checking for same file size

Replacing images : - ON The Kaspersky Lab Industrial Control Systems Cyber Emergency Response Team (Kaspersky Lab ICS CERT) is starting a series of regular publications about our research devoted to the threat landscape for industrial organizations. All statistical data used in the report was obtained using Kaspersky Security Network (KSN), a distributed antivirus network. Data was received from those KSN users who consented to have their data collected anonymously. The research carried out in the second half of 2016 by Kaspersky Lab ICS CERT experts clearly demonstrates a number of trends in the evolution of industrial enterprise security. On average, in the second half of 2016 Kaspersky Lab products across the globe blocked attempted attacks on 39.2% of protected computers that Kaspersky Lab ICS CERT classifies as being part of industrial enterprise technology infrastructure. This group includes computers that run Windows and perform one or more of the following functions: Supervisory Control and Data Acquisition (SCADA) servers, Data storage servers (Historian), Data gateways (OPC), Stationary engineer and operator workstations, Mobile engineer and operator workstations, Human Machine Interface (HMI). The group also includes computers of external 3-d party contractors, SCADA vendors and system integrators as well as internal SCADA administrators. Every month, an average of one industrial computer in five (20.1%) is attacked by malware. We have seen stable growth in the percentage of industrial computers attacked since the beginning of our observations, highlighting the importance of cybersecurity issues. Threat Landscape for Industrial Automation Systems, H2 2016 Percentage of industrial computers attacked by month (second half of 2016) Isolation of industrial networks can no longer be considered an effective protective measure. The proportion of malware infection attempts involving portable media, infection of backup copies, use of sophisticated schemes for transferring data from isolated networks in complex attacks – all of this demonstrates that risks cannot be avoided by simply disconnecting a system from the Internet. Threat Landscape for Industrial Automation Systems, H2 2016 Sources of threats blocked on industrial computers (second half of 2016) Remarkably, there is very little difference between the rankings of malware detected on industrial computers and those of malware detected on corporate computers. We believe that this demonstrates the absence of significant differences between computers on corporate networks and those on industrial networks in terms of the risk of chance infections. However, it is obvious that even a chance infection on an industrial network can lead to dangerous consequences. Threat Landscape for Industrial Automation Systems, H2 2016 Distribution of industrial computers attacked by classes of malware used in attacks (second half of 2016) According to our data, targeted attacks on companies in different industrial sectors are increasingly common. These are organized attacks that can target one enterprise, several enterprises, companies in one industrial sector or a broad range of industrial enterprises. The Kaspersky Lab ICS CERT detected a series of phishing attacks which began no later than June 2016 and which are still active. The attacks target primarily industrial companies – metallurgical, electric power, construction, engineering and others. We estimate the number of companies attacked at over 500 in more than 50 countries around the world. None of the malicious programs used in the attack – trojan spies and backdoors from different families, such as ZeuS, Pony/FareIT, Luminosity RAT, NetWire RAT, HawkEye, and ISR Stealer – are unique to this malicious campaign. They are all very popular among cybercriminals. However, these programs are packed with unique modifications of VB and MSIL packers that are used only in this attack. Our experience of investigating targeted attacks shows that cyberespionage is often used to prepare subsequent attack stages. One quarter of all targeted attacks uncovered by Kaspersky Lab in 2016 targeted, among others, different industries – machine building, energy, chemical, transport and others. In 2016, Kaspersky Lab evaluated the current state of IT security components in the industrial control systems of different vendors. As a result of this research, 75 vulnerabilities were identified in ICS components. 58 of them were marked as maximum critical vulnerabilities (CVSS v3.0 severity score 7.0 or higher). Threat Landscape for Industrial Automation Systems, H2 2016 Distribution of vulnerabilities uncovered by Kaspersky Lab in 2016 according to the ways in which they can be used Of the 75 vulnerabilities identified by the middle of March 2017 by Kaspersky Lab, industrial software vendors closed 30. The approach of industrial software vendors to closing vulnerabilities and the situation with fixing known vulnerabilities at enterprises is by no means reassuring. The approach to addressing vulnerabilities as part of the software development cycle has not yet been sufficiently refined: vendors do not prioritize the closing of identified vulnerabilities based on their severity, they prefer to fix vulnerabilities in the next release of their product rather than releasing a fix or patch that is critical from an IT security viewpoint. Another issue is the installation of updates and security patches at enterprises. Based on our research and ICS IT security audits, we believe that for ICS owners, the process of installing critical updates is either too labor-intensive or not a high-priority task in the system’s overall lifecycle. As a result, at some enterprises critical updates of various industrial system components are not installed for years, making these enterprises vulnerable in the event of cyberattacks. The industrial network is increasingly similar to the corporate network – both in terms of usage scenarios and in terms of technologies used. New technologies are being used that improve process transparency and efficiency at the enterprise level, as well as providing flexibility and fault tolerance of the functions performed at medium and lower industrial automation levels. The upshot of all this is that the cyber threat landscape for industrial systems is increasingly similar to the threat landscape for corporate networks. Consequently, we can expect not only the emergence of new threats specifically designed for industrial enterprises but also the evolution of existing, traditional IT threats, which involves their adaptation for attacks against industrial enterprises and physical world objects. The emergence of large-scale malicious campaigns targeting industrial enterprises indicates that black hats see this area as promising. This is a serious challenge for the entire community of industrial automation system developers, owners and operators of such systems, and security vendors. We are still remarkably languid and slow-moving in most cases, which is fraught with dangers under the circumstances. The full report is available on Kaspersky Lab ICS CERT website.

Local save:https://securelist.com/files/2017/03/ics_cert_en_1.png

Image process :: Saving local image

grab remote location : https://securelist.com/files/2017/03/ics_cert_en_1.png

Image exists, checking for same file size

Replacing images : Threat Landscape for Industrial Automation Systems, H2 2016 - Threat Landscape for Industrial Automation Systems, H2 2016 ON Threat Landscape for Industrial Automation Systems, H2 2016The Kaspersky Lab Industrial Control Systems Cyber Emergency Response Team (Kaspersky Lab ICS CERT) is starting a series of regular publications about our research devoted to the threat landscape for industrial organizations. All statistical data used in the report was obtained using Kaspersky Security Network (KSN), a distributed antivirus network. Data was received from those KSN users who consented to have their data collected anonymously. The research carried out in the second half of 2016 by Kaspersky Lab ICS CERT experts clearly demonstrates a number of trends in the evolution of industrial enterprise security. On average, in the second half of 2016 Kaspersky Lab products across the globe blocked attempted attacks on 39.2% of protected computers that Kaspersky Lab ICS CERT classifies as being part of industrial enterprise technology infrastructure. This group includes computers that run Windows and perform one or more of the following functions: Supervisory Control and Data Acquisition (SCADA) servers, Data storage servers (Historian), Data gateways (OPC), Stationary engineer and operator workstations, Mobile engineer and operator workstations, Human Machine Interface (HMI). The group also includes computers of external 3-d party contractors, SCADA vendors and system integrators as well as internal SCADA administrators. Every month, an average of one industrial computer in five (20.1%) is attacked by malware. We have seen stable growth in the percentage of industrial computers attacked since the beginning of our observations, highlighting the importance of cybersecurity issues. Threat Landscape for Industrial Automation Systems, H2 2016 Percentage of industrial computers attacked by month (second half of 2016) Isolation of industrial networks can no longer be considered an effective protective measure. The proportion of malware infection attempts involving portable media, infection of backup copies, use of sophisticated schemes for transferring data from isolated networks in complex attacks – all of this demonstrates that risks cannot be avoided by simply disconnecting a system from the Internet. Threat Landscape for Industrial Automation Systems, H2 2016 Sources of threats blocked on industrial computers (second half of 2016) Remarkably, there is very little difference between the rankings of malware detected on industrial computers and those of malware detected on corporate computers. We believe that this demonstrates the absence of significant differences between computers on corporate networks and those on industrial networks in terms of the risk of chance infections. However, it is obvious that even a chance infection on an industrial network can lead to dangerous consequences. Threat Landscape for Industrial Automation Systems, H2 2016 Distribution of industrial computers attacked by classes of malware used in attacks (second half of 2016) According to our data, targeted attacks on companies in different industrial sectors are increasingly common. These are organized attacks that can target one enterprise, several enterprises, companies in one industrial sector or a broad range of industrial enterprises. The Kaspersky Lab ICS CERT detected a series of phishing attacks which began no later than June 2016 and which are still active. The attacks target primarily industrial companies – metallurgical, electric power, construction, engineering and others. We estimate the number of companies attacked at over 500 in more than 50 countries around the world. None of the malicious programs used in the attack – trojan spies and backdoors from different families, such as ZeuS, Pony/FareIT, Luminosity RAT, NetWire RAT, HawkEye, and ISR Stealer – are unique to this malicious campaign. They are all very popular among cybercriminals. However, these programs are packed with unique modifications of VB and MSIL packers that are used only in this attack. Our experience of investigating targeted attacks shows that cyberespionage is often used to prepare subsequent attack stages. One quarter of all targeted attacks uncovered by Kaspersky Lab in 2016 targeted, among others, different industries – machine building, energy, chemical, transport and others. In 2016, Kaspersky Lab evaluated the current state of IT security components in the industrial control systems of different vendors. As a result of this research, 75 vulnerabilities were identified in ICS components. 58 of them were marked as maximum critical vulnerabilities (CVSS v3.0 severity score 7.0 or higher). Threat Landscape for Industrial Automation Systems, H2 2016 Distribution of vulnerabilities uncovered by Kaspersky Lab in 2016 according to the ways in which they can be used Of the 75 vulnerabilities identified by the middle of March 2017 by Kaspersky Lab, industrial software vendors closed 30. The approach of industrial software vendors to closing vulnerabilities and the situation with fixing known vulnerabilities at enterprises is by no means reassuring. The approach to addressing vulnerabilities as part of the software development cycle has not yet been sufficiently refined: vendors do not prioritize the closing of identified vulnerabilities based on their severity, they prefer to fix vulnerabilities in the next release of their product rather than releasing a fix or patch that is critical from an IT security viewpoint. Another issue is the installation of updates and security patches at enterprises. Based on our research and ICS IT security audits, we believe that for ICS owners, the process of installing critical updates is either too labor-intensive or not a high-priority task in the system’s overall lifecycle. As a result, at some enterprises critical updates of various industrial system components are not installed for years, making these enterprises vulnerable in the event of cyberattacks. The industrial network is increasingly similar to the corporate network – both in terms of usage scenarios and in terms of technologies used. New technologies are being used that improve process transparency and efficiency at the enterprise level, as well as providing flexibility and fault tolerance of the functions performed at medium and lower industrial automation levels. The upshot of all this is that the cyber threat landscape for industrial systems is increasingly similar to the threat landscape for corporate networks. Consequently, we can expect not only the emergence of new threats specifically designed for industrial enterprises but also the evolution of existing, traditional IT threats, which involves their adaptation for attacks against industrial enterprises and physical world objects. The emergence of large-scale malicious campaigns targeting industrial enterprises indicates that black hats see this area as promising. This is a serious challenge for the entire community of industrial automation system developers, owners and operators of such systems, and security vendors. We are still remarkably languid and slow-moving in most cases, which is fraught with dangers under the circumstances. The full report is available on Kaspersky Lab ICS CERT website.

Local save:https://securelist.com/files/2017/03/ics_cert_en_2-1024x547.png

Image process :: Saving local image

grab remote location : https://securelist.com/files/2017/03/ics_cert_en_2-1024x547.png

Image exists, checking for same file size

Replacing images : Threat Landscape for Industrial Automation Systems, H2 2016 - Threat Landscape for Industrial Automation Systems, H2 2016 ON Threat Landscape for Industrial Automation Systems, H2 2016The Kaspersky Lab Industrial Control Systems Cyber Emergency Response Team (Kaspersky Lab ICS CERT) is starting a series of regular publications about our research devoted to the threat landscape for industrial organizations. All statistical data used in the report was obtained using Kaspersky Security Network (KSN), a distributed antivirus network. Data was received from those KSN users who consented to have their data collected anonymously. The research carried out in the second half of 2016 by Kaspersky Lab ICS CERT experts clearly demonstrates a number of trends in the evolution of industrial enterprise security. On average, in the second half of 2016 Kaspersky Lab products across the globe blocked attempted attacks on 39.2% of protected computers that Kaspersky Lab ICS CERT classifies as being part of industrial enterprise technology infrastructure. This group includes computers that run Windows and perform one or more of the following functions: Supervisory Control and Data Acquisition (SCADA) servers, Data storage servers (Historian), Data gateways (OPC), Stationary engineer and operator workstations, Mobile engineer and operator workstations, Human Machine Interface (HMI). The group also includes computers of external 3-d party contractors, SCADA vendors and system integrators as well as internal SCADA administrators. Every month, an average of one industrial computer in five (20.1%) is attacked by malware. We have seen stable growth in the percentage of industrial computers attacked since the beginning of our observations, highlighting the importance of cybersecurity issues. Threat Landscape for Industrial Automation Systems, H2 2016 Percentage of industrial computers attacked by month (second half of 2016) Isolation of industrial networks can no longer be considered an effective protective measure. The proportion of malware infection attempts involving portable media, infection of backup copies, use of sophisticated schemes for transferring data from isolated networks in complex attacks – all of this demonstrates that risks cannot be avoided by simply disconnecting a system from the Internet. Threat Landscape for Industrial Automation Systems, H2 2016 Sources of threats blocked on industrial computers (second half of 2016) Remarkably, there is very little difference between the rankings of malware detected on industrial computers and those of malware detected on corporate computers. We believe that this demonstrates the absence of significant differences between computers on corporate networks and those on industrial networks in terms of the risk of chance infections. However, it is obvious that even a chance infection on an industrial network can lead to dangerous consequences. Threat Landscape for Industrial Automation Systems, H2 2016 Distribution of industrial computers attacked by classes of malware used in attacks (second half of 2016) According to our data, targeted attacks on companies in different industrial sectors are increasingly common. These are organized attacks that can target one enterprise, several enterprises, companies in one industrial sector or a broad range of industrial enterprises. The Kaspersky Lab ICS CERT detected a series of phishing attacks which began no later than June 2016 and which are still active. The attacks target primarily industrial companies – metallurgical, electric power, construction, engineering and others. We estimate the number of companies attacked at over 500 in more than 50 countries around the world. None of the malicious programs used in the attack – trojan spies and backdoors from different families, such as ZeuS, Pony/FareIT, Luminosity RAT, NetWire RAT, HawkEye, and ISR Stealer – are unique to this malicious campaign. They are all very popular among cybercriminals. However, these programs are packed with unique modifications of VB and MSIL packers that are used only in this attack. Our experience of investigating targeted attacks shows that cyberespionage is often used to prepare subsequent attack stages. One quarter of all targeted attacks uncovered by Kaspersky Lab in 2016 targeted, among others, different industries – machine building, energy, chemical, transport and others. In 2016, Kaspersky Lab evaluated the current state of IT security components in the industrial control systems of different vendors. As a result of this research, 75 vulnerabilities were identified in ICS components. 58 of them were marked as maximum critical vulnerabilities (CVSS v3.0 severity score 7.0 or higher). Threat Landscape for Industrial Automation Systems, H2 2016 Distribution of vulnerabilities uncovered by Kaspersky Lab in 2016 according to the ways in which they can be used Of the 75 vulnerabilities identified by the middle of March 2017 by Kaspersky Lab, industrial software vendors closed 30. The approach of industrial software vendors to closing vulnerabilities and the situation with fixing known vulnerabilities at enterprises is by no means reassuring. The approach to addressing vulnerabilities as part of the software development cycle has not yet been sufficiently refined: vendors do not prioritize the closing of identified vulnerabilities based on their severity, they prefer to fix vulnerabilities in the next release of their product rather than releasing a fix or patch that is critical from an IT security viewpoint. Another issue is the installation of updates and security patches at enterprises. Based on our research and ICS IT security audits, we believe that for ICS owners, the process of installing critical updates is either too labor-intensive or not a high-priority task in the system’s overall lifecycle. As a result, at some enterprises critical updates of various industrial system components are not installed for years, making these enterprises vulnerable in the event of cyberattacks. The industrial network is increasingly similar to the corporate network – both in terms of usage scenarios and in terms of technologies used. New technologies are being used that improve process transparency and efficiency at the enterprise level, as well as providing flexibility and fault tolerance of the functions performed at medium and lower industrial automation levels. The upshot of all this is that the cyber threat landscape for industrial systems is increasingly similar to the threat landscape for corporate networks. Consequently, we can expect not only the emergence of new threats specifically designed for industrial enterprises but also the evolution of existing, traditional IT threats, which involves their adaptation for attacks against industrial enterprises and physical world objects. The emergence of large-scale malicious campaigns targeting industrial enterprises indicates that black hats see this area as promising. This is a serious challenge for the entire community of industrial automation system developers, owners and operators of such systems, and security vendors. We are still remarkably languid and slow-moving in most cases, which is fraught with dangers under the circumstances. The full report is available on Kaspersky Lab ICS CERT website.

Local save:https://securelist.com/files/2017/03/ics_cert_en_3-1024x544.png

Image process :: Saving local image

grab remote location : https://securelist.com/files/2017/03/ics_cert_en_3-1024x544.png

Image exists, checking for same file size

Replacing images : Threat Landscape for Industrial Automation Systems, H2 2016 - Threat Landscape for Industrial Automation Systems, H2 2016 ON Threat Landscape for Industrial Automation Systems, H2 2016The Kaspersky Lab Industrial Control Systems Cyber Emergency Response Team (Kaspersky Lab ICS CERT) is starting a series of regular publications about our research devoted to the threat landscape for industrial organizations. All statistical data used in the report was obtained using Kaspersky Security Network (KSN), a distributed antivirus network. Data was received from those KSN users who consented to have their data collected anonymously. The research carried out in the second half of 2016 by Kaspersky Lab ICS CERT experts clearly demonstrates a number of trends in the evolution of industrial enterprise security. On average, in the second half of 2016 Kaspersky Lab products across the globe blocked attempted attacks on 39.2% of protected computers that Kaspersky Lab ICS CERT classifies as being part of industrial enterprise technology infrastructure. This group includes computers that run Windows and perform one or more of the following functions: Supervisory Control and Data Acquisition (SCADA) servers, Data storage servers (Historian), Data gateways (OPC), Stationary engineer and operator workstations, Mobile engineer and operator workstations, Human Machine Interface (HMI). The group also includes computers of external 3-d party contractors, SCADA vendors and system integrators as well as internal SCADA administrators. Every month, an average of one industrial computer in five (20.1%) is attacked by malware. We have seen stable growth in the percentage of industrial computers attacked since the beginning of our observations, highlighting the importance of cybersecurity issues. Threat Landscape for Industrial Automation Systems, H2 2016 Percentage of industrial computers attacked by month (second half of 2016) Isolation of industrial networks can no longer be considered an effective protective measure. The proportion of malware infection attempts involving portable media, infection of backup copies, use of sophisticated schemes for transferring data from isolated networks in complex attacks – all of this demonstrates that risks cannot be avoided by simply disconnecting a system from the Internet. Threat Landscape for Industrial Automation Systems, H2 2016 Sources of threats blocked on industrial computers (second half of 2016) Remarkably, there is very little difference between the rankings of malware detected on industrial computers and those of malware detected on corporate computers. We believe that this demonstrates the absence of significant differences between computers on corporate networks and those on industrial networks in terms of the risk of chance infections. However, it is obvious that even a chance infection on an industrial network can lead to dangerous consequences. Threat Landscape for Industrial Automation Systems, H2 2016 Distribution of industrial computers attacked by classes of malware used in attacks (second half of 2016) According to our data, targeted attacks on companies in different industrial sectors are increasingly common. These are organized attacks that can target one enterprise, several enterprises, companies in one industrial sector or a broad range of industrial enterprises. The Kaspersky Lab ICS CERT detected a series of phishing attacks which began no later than June 2016 and which are still active. The attacks target primarily industrial companies – metallurgical, electric power, construction, engineering and others. We estimate the number of companies attacked at over 500 in more than 50 countries around the world. None of the malicious programs used in the attack – trojan spies and backdoors from different families, such as ZeuS, Pony/FareIT, Luminosity RAT, NetWire RAT, HawkEye, and ISR Stealer – are unique to this malicious campaign. They are all very popular among cybercriminals. However, these programs are packed with unique modifications of VB and MSIL packers that are used only in this attack. Our experience of investigating targeted attacks shows that cyberespionage is often used to prepare subsequent attack stages. One quarter of all targeted attacks uncovered by Kaspersky Lab in 2016 targeted, among others, different industries – machine building, energy, chemical, transport and others. In 2016, Kaspersky Lab evaluated the current state of IT security components in the industrial control systems of different vendors. As a result of this research, 75 vulnerabilities were identified in ICS components. 58 of them were marked as maximum critical vulnerabilities (CVSS v3.0 severity score 7.0 or higher). Threat Landscape for Industrial Automation Systems, H2 2016 Distribution of vulnerabilities uncovered by Kaspersky Lab in 2016 according to the ways in which they can be used Of the 75 vulnerabilities identified by the middle of March 2017 by Kaspersky Lab, industrial software vendors closed 30. The approach of industrial software vendors to closing vulnerabilities and the situation with fixing known vulnerabilities at enterprises is by no means reassuring. The approach to addressing vulnerabilities as part of the software development cycle has not yet been sufficiently refined: vendors do not prioritize the closing of identified vulnerabilities based on their severity, they prefer to fix vulnerabilities in the next release of their product rather than releasing a fix or patch that is critical from an IT security viewpoint. Another issue is the installation of updates and security patches at enterprises. Based on our research and ICS IT security audits, we believe that for ICS owners, the process of installing critical updates is either too labor-intensive or not a high-priority task in the system’s overall lifecycle. As a result, at some enterprises critical updates of various industrial system components are not installed for years, making these enterprises vulnerable in the event of cyberattacks. The industrial network is increasingly similar to the corporate network – both in terms of usage scenarios and in terms of technologies used. New technologies are being used that improve process transparency and efficiency at the enterprise level, as well as providing flexibility and fault tolerance of the functions performed at medium and lower industrial automation levels. The upshot of all this is that the cyber threat landscape for industrial systems is increasingly similar to the threat landscape for corporate networks. Consequently, we can expect not only the emergence of new threats specifically designed for industrial enterprises but also the evolution of existing, traditional IT threats, which involves their adaptation for attacks against industrial enterprises and physical world objects. The emergence of large-scale malicious campaigns targeting industrial enterprises indicates that black hats see this area as promising. This is a serious challenge for the entire community of industrial automation system developers, owners and operators of such systems, and security vendors. We are still remarkably languid and slow-moving in most cases, which is fraught with dangers under the circumstances. The full report is available on Kaspersky Lab ICS CERT website.

Local save:https://securelist.com/files/2017/03/ics_cert_en_4-1024x538.png

Image process :: Saving local image

grab remote location : https://securelist.com/files/2017/03/ics_cert_en_4-1024x538.png

Image exists, checking for same file size

Replacing images : Threat Landscape for Industrial Automation Systems, H2 2016 - Threat Landscape for Industrial Automation Systems, H2 2016 ON Threat Landscape for Industrial Automation Systems, H2 2016The Kaspersky Lab Industrial Control Systems Cyber Emergency Response Team (Kaspersky Lab ICS CERT) is starting a series of regular publications about our research devoted to the threat landscape for industrial organizations. All statistical data used in the report was obtained using Kaspersky Security Network (KSN), a distributed antivirus network. Data was received from those KSN users who consented to have their data collected anonymously. The research carried out in the second half of 2016 by Kaspersky Lab ICS CERT experts clearly demonstrates a number of trends in the evolution of industrial enterprise security. On average, in the second half of 2016 Kaspersky Lab products across the globe blocked attempted attacks on 39.2% of protected computers that Kaspersky Lab ICS CERT classifies as being part of industrial enterprise technology infrastructure. This group includes computers that run Windows and perform one or more of the following functions: Supervisory Control and Data Acquisition (SCADA) servers, Data storage servers (Historian), Data gateways (OPC), Stationary engineer and operator workstations, Mobile engineer and operator workstations, Human Machine Interface (HMI). The group also includes computers of external 3-d party contractors, SCADA vendors and system integrators as well as internal SCADA administrators. Every month, an average of one industrial computer in five (20.1%) is attacked by malware. We have seen stable growth in the percentage of industrial computers attacked since the beginning of our observations, highlighting the importance of cybersecurity issues. Threat Landscape for Industrial Automation Systems, H2 2016 Percentage of industrial computers attacked by month (second half of 2016) Isolation of industrial networks can no longer be considered an effective protective measure. The proportion of malware infection attempts involving portable media, infection of backup copies, use of sophisticated schemes for transferring data from isolated networks in complex attacks – all of this demonstrates that risks cannot be avoided by simply disconnecting a system from the Internet. Threat Landscape for Industrial Automation Systems, H2 2016 Sources of threats blocked on industrial computers (second half of 2016) Remarkably, there is very little difference between the rankings of malware detected on industrial computers and those of malware detected on corporate computers. We believe that this demonstrates the absence of significant differences between computers on corporate networks and those on industrial networks in terms of the risk of chance infections. However, it is obvious that even a chance infection on an industrial network can lead to dangerous consequences. Threat Landscape for Industrial Automation Systems, H2 2016 Distribution of industrial computers attacked by classes of malware used in attacks (second half of 2016) According to our data, targeted attacks on companies in different industrial sectors are increasingly common. These are organized attacks that can target one enterprise, several enterprises, companies in one industrial sector or a broad range of industrial enterprises. The Kaspersky Lab ICS CERT detected a series of phishing attacks which began no later than June 2016 and which are still active. The attacks target primarily industrial companies – metallurgical, electric power, construction, engineering and others. We estimate the number of companies attacked at over 500 in more than 50 countries around the world. None of the malicious programs used in the attack – trojan spies and backdoors from different families, such as ZeuS, Pony/FareIT, Luminosity RAT, NetWire RAT, HawkEye, and ISR Stealer – are unique to this malicious campaign. They are all very popular among cybercriminals. However, these programs are packed with unique modifications of VB and MSIL packers that are used only in this attack. Our experience of investigating targeted attacks shows that cyberespionage is often used to prepare subsequent attack stages. One quarter of all targeted attacks uncovered by Kaspersky Lab in 2016 targeted, among others, different industries – machine building, energy, chemical, transport and others. In 2016, Kaspersky Lab evaluated the current state of IT security components in the industrial control systems of different vendors. As a result of this research, 75 vulnerabilities were identified in ICS components. 58 of them were marked as maximum critical vulnerabilities (CVSS v3.0 severity score 7.0 or higher). Threat Landscape for Industrial Automation Systems, H2 2016 Distribution of vulnerabilities uncovered by Kaspersky Lab in 2016 according to the ways in which they can be used Of the 75 vulnerabilities identified by the middle of March 2017 by Kaspersky Lab, industrial software vendors closed 30. The approach of industrial software vendors to closing vulnerabilities and the situation with fixing known vulnerabilities at enterprises is by no means reassuring. The approach to addressing vulnerabilities as part of the software development cycle has not yet been sufficiently refined: vendors do not prioritize the closing of identified vulnerabilities based on their severity, they prefer to fix vulnerabilities in the next release of their product rather than releasing a fix or patch that is critical from an IT security viewpoint. Another issue is the installation of updates and security patches at enterprises. Based on our research and ICS IT security audits, we believe that for ICS owners, the process of installing critical updates is either too labor-intensive or not a high-priority task in the system’s overall lifecycle. As a result, at some enterprises critical updates of various industrial system components are not installed for years, making these enterprises vulnerable in the event of cyberattacks. The industrial network is increasingly similar to the corporate network – both in terms of usage scenarios and in terms of technologies used. New technologies are being used that improve process transparency and efficiency at the enterprise level, as well as providing flexibility and fault tolerance of the functions performed at medium and lower industrial automation levels. The upshot of all this is that the cyber threat landscape for industrial systems is increasingly similar to the threat landscape for corporate networks. Consequently, we can expect not only the emergence of new threats specifically designed for industrial enterprises but also the evolution of existing, traditional IT threats, which involves their adaptation for attacks against industrial enterprises and physical world objects. The emergence of large-scale malicious campaigns targeting industrial enterprises indicates that black hats see this area as promising. This is a serious challenge for the entire community of industrial automation system developers, owners and operators of such systems, and security vendors. We are still remarkably languid and slow-moving in most cases, which is fraught with dangers under the circumstances. The full report is available on Kaspersky Lab ICS CERT website.

Array ( [enclosure] => Array ( [0] => https://securelist.com/files/2017/03/ics_cert_report_main.jpg ) [syndication_source] => Securelist - Information about Viruses, Hackers and Spam [syndication_source_uri] => https://securelist.com [syndication_source_id] => https://securelist.com/feed/ [rss:comments] => https://securelist.com/analysis/publications/77842/threat-landscape-for-industrial-automation-systems-h2-2016/#respond [wfw:commentRSS] => https://securelist.com/analysis/publications/77842/threat-landscape-for-industrial-automation-systems-h2-2016/feed/ [syndication_feed] => https://securelist.com/feed/ [syndication_feed_id] => 68 [syndication_permalink] => https://securelist.com/analysis/publications/77842/threat-landscape-for-industrial-automation-systems-h2-2016/ [syndication_item_hash] => d5f89187d0444cf181ec0bb56cb5ad10 )

Execute : Enclosure images

Enclosure save:

Array ( [0] => https://securelist.com/files/2017/03/ics_cert_report_main.jpg )

grab remote location : https://securelist.com/files/2017/03/ics_cert_report_main.jpg

Image exists, checking for same file size