Tag Archive for: Wolf

HP Wolf Connect expands PC management to help close security gaps


HP has introduced HP Wolf Connect, a connectivity solution for IT management that offers a secure connection to remote PCs. This solution allows IT professionals to manage devices even when they are offline or turned off.

Using a cellular-based network, HP Wolf Connect’s robust connectivity helps ensure IT teams can readily manage a dispersed hybrid workforce. It can reduce the time and effort needed to resolve support tickets, secure data from loss or theft to mitigate a potential breach and optimize asset management.

“Hybrid work has made remote management at scale more complex, yet more essential,” comments Dr. Ian Pratt, Global Head of Security for Personal Systems, HP Inc. “The cloud has helped but hasn’t solved IT’s ability to manage devices that are powered down or offline. HP Wolf Connect’s highly resilient connection opens new doors to remote device management, enabling efficient and effective management of dispersed workforces.”

HP Wolf Protect and Trace with Wolf Connect is a software service capable of locating, locking and erasing a PC remotely, even when it’s turned off or disconnected from the Internet. This capability protects sensitive data on the move and helps lower IT costs by reducing the need for PC remediation or replacement.

Securing and managing the hybrid workforce is a top priority for organizations. New global research from HP Wolf Security found 82% of security leaders operating a hybrid work model have gaps in their organization’s security posture. The global study of 1,492 security leaders found:

  • 61% say protecting their hybrid workers will get harder in the year ahead.
  • 70% say that hybrid work increases the risk of lost or stolen devices.

“IT teams need a better way to deal with the increase in lost or stolen devices,” continues Pratt. “Before today, solutions relied on PCs being on or connected to the internet, but HP Wolf Connect now provides a highly resilient mobile connection to find, lock, and erase lost or stolen devices even if they are disconnected or powered down.

Pratt continues; “This is particularly crucial in industries where devices may contain PII (personally identifiable information) or…

Source…

Kansas’ Wolf Creek nuclear power plant hack serves as a warning


Former Burlington Mayor and Coffey County Commissioner Gene Merry remember the news about a hack of the Wolf Creek Nuclear Power facility’s computer system in 2017. At the time, the FBI and Homeland Security said the hack was aimed at corporate computers, not the ones that run the plant.Until Thursday, Merry did not know Russian FSB officers devised that intrusion.”It’s good to know,” Merry said. The longtime Burlington businessman and public official reiterated full confidence in the team at the nuclear power facility, operated by Evergy, one day after federal prosecutors revealed three Russian Federal Security Service (FSB) officers targeted the plant in 2017.Evergy released a statement Thursday saying at no point did attackers ever gain access to the cyber systems that operate the facility or power grid.”I have all the faith in the world of this security at the plant and the safety of the plant,” Merry said.Still, Merry said it is a good reminder for everyone to remain on guard, especially now with the War in Ukraine.A cybersecurity expert agrees.”There will be more and more this kind of attack coming up in the future,” said Yongzhi Joe Wang, assistant professor of computer science and information systems at Park University.Wang said the Wolf Creek hack should remind the energy sector along with companies everywhere to make sure they have the most upgraded software and education about malware attacks for employees.He also said cybersecurity insurance is important for companies.”Then, at least they can get some payment from the insurance company,” he said.The Wolf Creek hacking incident is just one of more than 17,000 hacks into unique devices in the United States and around the world, according to the federal indictment released Thursday.

Former Burlington Mayor and Coffey County Commissioner Gene Merry remember the news about a hack of the Wolf Creek Nuclear Power facility’s computer system in 2017.

At the time, the FBI and Homeland Security said the hack was aimed at corporate computers, not the ones that run the plant.

Until Thursday, Merry did not know Russian FSB officers devised that intrusion.

“It’s good to know,”…

Source…

Emad Al Swealmeen: Liverpool hospital bomber’s ‘lone wolf’ plot


T

he Liverpool hospital bomber was believed to be a lone wolf who spent weeks or even months preparing his attack after learning bomb-making techniques online, it has emerged.

They said he was also believed to have acted alone and to have gained both his inspiration and the techniques required to assemble an explosive device on the internet, allowing him to escape detection.

.

But the sources also admitted that his precise motivation — particularly whether he was inspired by Islamist ideology — and exactly when he began preparing remained a mystery and could take weeks to establish as his phone and computer records are examined for evidence.

His intended target is also still to be established conclusively, although police have said that he asked to go to the hospital, rather than the nearby remembrance service at Liverpool’s Anglican Cathedral, and officials suggest that it would be odd to go the hospital if an attack on the service had been his ambition. The disclosure follows the release on Monday of four other people held after the attack in which Al Swealmeen, an asylum seeker who is believed to be of Iraqi and Syrian heritage, died when the cab he was travelling in blew up minutes before 11am on Sunday.

The driver, David Perry, managed to escape moments later before the vehicle burst into flames and became a charred wreck.

On Tuesday ministers warned of the danger of further attacks by bedroom radicals. Damian Hinds said police were making new discoveries about the plot by the hour but that “it could be weeks before the full picture is known of how this came about, the motivation, were there other people involved and so on”.

The security minister warned, however, that “periodically atrocities will happen” and that bedroom radicalisation — which become a heightened risk during the coronavirus lockdowns — was a likely factor in the attack.

“We use the term lone wolf a lot,” he said. “Sometimes it can be a little misleading but it certainly is true that we have seen a shift from directed attacks, part of a bigger organisation, where people are following instructions, sometimes quite complex organisation, and moved from that to more self-directed,…

Source…

‘Wolf Hall’ Team Reunites for Cyber Warfare Series ‘The Undeclared War’

  1. ‘Wolf Hall’ Team Reunites for Cyber Warfare Series ‘The Undeclared War’  Variety
  2. ‘Wolf Hall’ team developing cyber warfare series for Channel 4  Screen International
  3. WOLF HALL Creator Peter Kosminsky to Develop Cyber Warfare Drama for UK’s C4  Broadway World
  4. Full coverage

cyber warfare news – read more