Mon.Aug 03, 2020

article thumbnail

BlackBerry Phone Cracked

Schneier on Security

Australia is reporting that a BlackBerry device has been cracked after five years: An encrypted BlackBerry device that was cracked five years after it was first seized by police is poised to be the key piece of evidence in one of the state's longest-running drug importation investigations. In April, new technology "capabilities" allowed authorities to probe the encrypted device.

article thumbnail

BlackBerry launches free tool for reverse engineering to fight cybersecurity attacks

Tech Republic Security

One of the first announcements at BlackHat USA 2020 is an open-source tool to fight malware that BlackBerry first used internally and is now making available to everyone.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why Data Ethics Is a Growing CISO Priority

Dark Reading

With data collection growing, and increased concern about how it is handled, a synergy between security and data teams will be essential.

CISO 143
article thumbnail

How to better protect your organization against mobile threats

Tech Republic Security

The increased use of personal phones for work and the growth of mobile malware create a risk to organizations, says Gigamon.

Mobile 210
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Two Strategies You Can Use To Reimagine Cybersecurity Without Looking Like An Amateur

Jane Frankland

Words are power. They have energy, and whether we’re speaking, reading, and exposing ourselves to them, we can use them to build relationships, increase knowledge, and drive action. We can use them purposefully, intuitively and strategically. For good and for bad. Consider one of the most relevant words of the moment, crisis. Most dictionaries define it as: A time of intense difficulty or danger.

article thumbnail

The Linux Foundation announces collective to enhance open source software security

Tech Republic Security

The newly formed Open Source Security Foundation includes titans in technology such as Google, Intel, Microsoft, IBM, and more.

Software 202

More Trending

article thumbnail

Netgear Won’t Patch 45 Router Models Vulnerable to Serious Flaw

Threatpost

Almost two months after a high-severity flaw was disclosed - and seven months after it was first reported - Netgear has yet to issue fixes for 45 of its router models.

111
111
article thumbnail

Reading the 2020 Cost of a Data Breach Report

Security Affairs

2020 Cost of a Data Breach Report: the global total cost of a data breach averaged $3.86 million in 2020, down about 1.5% from the 2019 study. Every year, I write about the annual report published by the Ponemon Institute on the cost of a data breach, it is a very interesting study that explores the economic impact of a “data breach.”. This year the researchers analyzed 524 breaches that occurred between August 2019 and April 2020, in organizations of all sizes, across 17 geographies and 17 indu

article thumbnail

How to make your PC passwordless in the Windows 10 May 2020 Update

Tech Republic Security

You don't need an account password to sign into Windows 10 version 2004.

Passwords 155
article thumbnail

Garmin Pays Up to Evil Corp After Ransomware Attack — Reports

Threatpost

The ransom for the decryptor key in the WastedLocker attack could have topped $10 million, sources said.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Ghostwriter disinformation campaign aimed at discrediting NATO

Security Affairs

Researchers uncovered a disinformation campaign aimed at discrediting NATO via fake news content distributed through compromised news websites. Security experts from FireEye have uncovered a disinformation campaign aimed at discrediting NATO by spreading fake news content on compromised news websites. “The operations have primarily targeted audiences in Lithuania, Latvia, and Poland with anti-North Atlantic Treaty Organization (NATO) narratives, often leveraging website compromises or spoo

article thumbnail

Survey: Barriers prevent data privacy initiatives

Tech Republic Security

Corporate culture, lack of privacy teams hurt privacy initiatives.

article thumbnail

Havenly discloses data breach, 1.3M accounts available online

Security Affairs

Havenly, a Denver-Based company, that realized an interior designer marketplace has disclosed a data breach that impacted 1.3 million users. The US-based interior design web site Havenly has disclosed a data breach after the known threat actor ShinyHunters has leaked for free the databases of multiple companies on a hacker forum. Last week, BleepingComputer reported that ShinyHunterswas offering on a hacker forum the databases stolen from eighteen companies, over 386 million user records avail

article thumbnail

Omdia Cybersecurity Accelerator Analysts to Take Part in Black Hat USA 2020

Dark Reading

Analysts will participate in the Black Hat Briefings, taking place Aug. 4-6, discussing cybersecurity research, offering exclusive video presentations, and meeting with vendors and attendees.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Meetup Critical Flaws Allow ‘Group’ Takeover, Payment Theft

Threatpost

Researchers disclosed critical flaws in the popular Meetup service at Black Hat USA 2020 this week, which could allow takeover of Meetup "Groups.".

Hacking 104
article thumbnail

How Should I Securely Destroy/Discard My Devices?

Dark Reading

While it is possible to do data destruction in-house, doing it correctly and at scale can be tedious.

116
116
article thumbnail

Google Updates Ad Policies to Counter Influence Campaigns, Extortion

Threatpost

Starting Sept. 1, Google will crack down on misinformation, a lack of transparency and the ability to amplify or circulate politically influential content.

article thumbnail

A Patriotic Solution to the Cybersecurity Skills Shortage

Dark Reading

Why now is the right time for the security industry to invest in the human capital that will make technology better, smarter, and safer.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Black Hat USA 2020: Critical Meetup.com Flaws Reveal Common AppSec Holes

Threatpost

With Black Hat USA 2020 kicking off this week, Erez Yalon with Checkmarx talks about newly disclosed, critical vulnerabilities in Meetup.com - and why they are the "holy grail" for attackers.

85
article thumbnail

Travel Management Firm CWT Pays $4.5M to Ransomware Attackers

Dark Reading

Attackers claimed to steal two terabytes of files including financial reports, security files, and employees' personal data.

article thumbnail

How To Set Your Phone for Better Privacy and Security?

Hacker Combat

The default factory settings on your phone are a double-edged sword. On one hand, they’re the best way to see what the creator recommends for you, and it makes it easy to get started. But sometimes, these features can have problems. They can be reducing your battery life, or share things you don’t want them to. So no matter what phone you use, you should change a few options around if you want to have the most security.

article thumbnail

FBI Warns on New E-Commerce Fraud

Dark Reading

A wave of new, fraudulent websites has popped up to take advantage of the rise in online shopping during the coronavirus pandemic.

87
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

'In Fraud We Trust:' Malware Author Pleads Guilty

SecureWorld News

"In Fraud We Trust.". Now that's a company slogan you don't hear every day. The first thing to know about Valerian Chiochiu? His cybercrime organization made hundreds of millions in illicit profits. The second thing? He's a man of many nicknames. The 30 year-old Moldovan, also known by the monikers “Onassis,” “Flagler,” “Socrate,” and “Eclessiastes,” just pled guilty to the U.S.

Malware 52
article thumbnail

DHS Urges 'Highest Priority' Attention on Old Chinese Malware Threat

Dark Reading

"Taidoor" is a remote access tool that has been used in numerous cyber espionage campaigns since at least 2008.

Malware 91
article thumbnail

How Better Planning Can Save Your Business From A Data Breach

IT Security Central

2019 was the worst year on record for data breaches by a long shot, increasing by nearly 79% from 2018. Billions of records were compromised as bad actors exploited vulnerabilities and insiders accidentally and maliciously compromised customer and company data. Unfortunately, the record won’t last long. As we approach the halfway point in 2020, this year […].

article thumbnail

11 Hot Startups to Watch at Black Hat USA

Dark Reading

A sneak peek at the up-and-coming organizations to check out on the Black Hat USA virtual show floor.

80
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Robocall Legal Advocate Leaks Customer Data

Krebs on Security

A California company that helps telemarketing firms avoid getting sued for violating a federal law that seeks to curb robocalls has leaked the phone numbers, email addresses and passwords of all its customers, as well as the mobile phone numbers and other data on people who have hired lawyers to go after telemarketers. The Blacklist Alliance provides technologies and services to marketing firms concerned about lawsuits under the Telephone Consumer Protection Act (TCPA), a 1991 law that restricts

Mobile 307
article thumbnail

New 'Nanodegree' Program Provides Hands-On Cybersecurity Training

Dark Reading

Emerging streamlined curriculum programs aim to help narrow the skills gap.

article thumbnail

Hackers stole €1.2m worth of cryptocurrency from 2gether

Security Affairs

2gether has disclosed a security breach, hackers have stolen roughly €1.2 million worth of cryptocurrency from cryptocurrency investment accounts. . Hackers stole roughly €1.183 million worth of cryptocurrency from investment accounts of 2gether, 26.79% of overall funds stored by the accounts. The attack took place on July 31 at 6.00 pm CEST, when hackers compromised the company servers. “As you know, since last Friday July 31, we’ve been managing an extremely difficult situation which has

article thumbnail

11 Hot Startups to Watch at Black Hat USA

Dark Reading

A sneak peek at the up-and-coming organizations to check out on the Black Hat USA virtual show floor.

67
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.