Tue.May 04, 2021

article thumbnail

Tesla Remotely Hacked from a Drone

Schneier on Security

This is an impressive hack: Security researchers Ralf-Philipp Weinmann of Kunnamon, Inc. and Benedikt Schmotzle of Comsecuris GmbH have found remote zero-click security vulnerabilities in an open-source software component (ConnMan) used in Tesla automobiles that allowed them to compromise parked cars and control their infotainment systems over WiFi.

Hacking 344
article thumbnail

This ambitious Microsoft project aims to fix cloud computing security

Tech Republic Security

Microsoft Research's Project Freta aims to find invisible malware running on the cloud.

Malware 204
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Fosters Competitive Advantage

Security Boulevard

Tens of billions of dollars each year are spent on cybersecurity, yet cybercriminals continue to succeed. There seems to be a never-ending stream of cybersecurity bad news. Companies constantly experience negative security events – Facebook, Verkada, and Elekta are recent examples. Cybersecurity failures become public relations, customer relations, and financial problems for companies.

article thumbnail

Apple Fixes Zero-Day Flaws in Unscheduled iOS Update – Here’s How to Patch

Hot for Security

Apple this week issued out-of-band updates for mobile customers to patch two zero-day vulnerabilities that let attackers execute remote code on their iDevices. The Cupertino-based tech giant says criminals “may” have already exploited the flaws. Available for most iDevices in circulation, iOS 14.5.1 (and the complementary iPadOS 14.5.1) fixes a critical memory corruption issue in the Safari WebKit engine where “processing maliciously crafted web content may lead to arbitrary code execution,” acc

Adware 144
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

The New Wave of Cybersecurity Awareness Training

Security Boulevard

The only constant is change. The ongoing effects of COVID-19 have taught us that change is inevitable to survive. One major area that has been affected during COVID-19 is how we interact with employees, and what we need those employees to know right now. Cybersecurity is one of those critical areas of this new world. The post The New Wave of Cybersecurity Awareness Training appeared first on Security Boulevard.

article thumbnail

How Cryptocurrency and Cybercrime Trends Influence One Another

Webroot

Typically, when cryptocurrency values change, one would expect to see changes in crypto-related cybercrime. In particular, trends in Bitcoin values tend to be the bellwether you can use to predict how other currencies’ values will shift, and there are usually corresponding shifts in crypto-based crime, such as ransomware, though it’s not necessarily the kind of change you might predict.

More Trending

article thumbnail

Enabling Hardware-enforced Stack Protection (cetcompat) in Chrome

Google Security

Alex Gough, Engineer, Chrome Platform Security Team Chrome 90 for Windows adopts Hardware-enforced Stack Protection, a mitigation technology to make the exploitation of security bugs more difficult for attackers. This is supported by Windows 20H1 (December Update) or later, running on processors with Control-flow Enforcement Technology (CET) such as Intel 11th Gen or AMD Zen 3 CPUs.

Software 137
article thumbnail

Facebook: Don't expect full end-to-end encryption on Messenger until 2022 'at the earliest'

Tech Republic Security

Facebook says it wants to make E2EE the default across all of its messaging platforms, but this will be a gradual process.

article thumbnail

Microsoft will soon remove Flash Player from Windows 10 devices

We Live Security

The Patch Tuesday security update due in July should hammer the last nail in the coffin of Adobe Flash Player. The post Microsoft will soon remove Flash Player from Windows 10 devices appeared first on WeLiveSecurity.

article thumbnail

Vulnerable Dell driver puts hundreds of millions of systems at risk

Bleeping Computer

A driver that's been pushed for the past 12 years to Dell computer devices for consumers and enterprises contains multiple vulnerabilities that could lead to increased privileges on the system. [.].

Risk 132
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Boystown, dark web child abuse image website with 400,000 members, shut down by police

Graham Cluley

Police have shut down one Boystown, ome of the world's largest child abuse image websites, following an investigation that saw authorities across the globe work together to identify and apprehend those responsible for its creation and maintenance.

134
134
article thumbnail

Worldwide phishing attacks deliver three new malware strains

Bleeping Computer

A global-scale phishing campaign targeted worldwide organizations across a large array of industries with never-before-seen malware strains delivered via specially-tailored lures. [.].

Phishing 131
article thumbnail

CSO50 2021 awards showcase world-class security strategies

CSO Magazine

The CSO50 awards recognize security projects that demonstrate outstanding thought leadership and business value. The awards are scored according to a uniform set of criteria by a panel of judges that includes security leaders, industry experts, and academics. It is an opportunity for security leaders to share with their peers the risk and security innovations that led the way to greater success for their organizations.

Risk 129
article thumbnail

Tesla Elon Musk to offer satellite based internet that cannot be hacked

CyberSecurity Insiders

Electric Car’s tycoon Elon Musk has announced that any hacker in the world can never hack his Starlink Satellite Internet Service….hmmm atleast with the currently available technological tools. Musk shared the news on Twitter and added that its SpaceX project of offering internet services through satellite will apparently be available from this year end- provided all goes well with the R&D team.

Internet 128
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Experian API Leaked Credit Scores

Security Boulevard

After Experian fixed a weakness at a partner website that let anyone view credit scores for nearly every American by just inputting a name and address, questions remain about whether the same problem exists with other partners, and how widespread the problem might be. A security researcher and college student, Bill Demirkapi, stumbled across the. The post Experian API Leaked Credit Scores appeared first on Security Boulevard.

Risk 123
article thumbnail

5 key qualities of successful CISOs, and how to develop them

CSO Magazine

The role of the CISO is relatively immature in comparison to other, longer standing C-level business positions such as CEO, COO, or CFO, but it has evolved significantly in just the last few years alone. Today’s CISOs are required to be somewhat different from the traditional security leaders of the past, and that is reflective of two things: the vital and growing role data plays in the everyday running of a business and increased expectations of the security function to keep that data safe and

CISO 122
article thumbnail

New Windows 'Pingback' malware uses ICMP for covert communication

Bleeping Computer

Today, Trustwave researchers have disclosed their findings on a novel Windows malware sample that uses Internet Control Message Protocol (ICMP) for its command-and-control (C2) activities. Dubbed "Pingback," this malware targets Windows 64-bit systems, and uses DLL Hijacking to gain persistence. [.].

Malware 122
article thumbnail

Cloud adoption is accelerating, but cloud security might be an issue

Tech Republic Security

The problem is not the cloud, one expert said. It's the speed at which companies are moving items to the cloud without considering security controls.

118
118
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

8 top identity and access management tools

CSO Magazine

The days of perimeter security acting as the core of cybersecurity defenses are long gone. No organization would be caught without firewalls and antivirus scanners to catch low-sophistication attacks, but the real battle to protect the network has moved to the realm of identity and access management (IAM). [ 5 steps to simple role-based access control (RBAC) | Sign up for CSO newsletters !

CSO 118
article thumbnail

A massive DDoS knocked offline Belgian government websites

Security Affairs

A massive distributed denial of service (DDoS) attack shut down Belgiums’ government websites, internal networks were also impacted. A massive distributed denial of service (DDoS) attack hit most of the Belgium government ’s IT network, according to the media the attack also knocked offline internal systems. People attempting to visit websites hosted on the Belnet network were not able to reach them and were displayed error messages.

DDOS 117
article thumbnail

Then a Hacker Began Posting Patients’ Deepest Secrets Online

WIRED Threat Level

A family-run psychotherapy startup grew into a health care giant. It was a huge success—until the data breach and the anonymous ransom notes sent to clients.

article thumbnail

Twilio discloses impact from Codecov supply-chain attack

Bleeping Computer

Cloud communications company Twilio has now disclosed that the recent Codecov supply-chain attack exposed a small number of Twilio's customer email addresses. [.].

117
117
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Choose Your Own Adventure game animates security awareness training

SC Magazine

Infosec’s Choose Your Own Adventure training game “Deep Space Danger” tests employees on their knowledge of social engineering. The employees at your organization are badly in need of security awareness training. What do you do? A. Bore them with dull content that feels like a lecture. B. Engage them with gamified, interactive lessons. “B” is obviously the correct choice, but not all companies succeed in motivating their workers to learn the ins and outs of phishing

article thumbnail

Australia’s Proposed Curriculum Aims to Teach Five-Year-Olds About Online Privacy and Cybersecurity

Hot for Security

The latest revised draft of Australia’s primary school curriculum proposes to teach students about cybersecurity from the age of five. The newly proposed curriculum for children aged five to 16 includes a new strand indicating a new discipline “Considering privacy and security” that “involves students developing appropriate techniques for managing data, which is personal, and effectively implementing security protocols.”.

article thumbnail

Expert: The cloud is more secure than on-prem, but the speed of adoption is making it less so

Tech Republic Security

Companies are accelerating their use of the cloud, but should slow down and make sure security is built in from the beginning.

119
119
article thumbnail

U.S. Agency for Global Media data breach caused by a phishing attack

Bleeping Computer

The U.S. Agency for Global Media (USAGM) has disclosed a data breach that exposed the personal information of current and former employees and their beneficiaries. [.].

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Spectre attacks come back from the dead

Malwarebytes

Spectre is the name for a whole class of vulnerabilities discovered in January 2018 that affected huge numbers of modern computer processors that rely on a performance feature called speculative execution. Since then, some of the world’s most talented computer scientists from industry and academia have worked on software patches and hardware defenses.

Big data 108
article thumbnail

DOD expands bug disclosure program to all publicly accessible systems

Bleeping Computer

US Department of Defense (DOD) officials today announced that the department's Vulnerability Disclosure Program (VDP) has been expanded to include all publicly accessible DOD websites and applications. [.].

106
106
article thumbnail

Global Phishing Attacks Spawn Three New Malware Strains

Threatpost

The never-seen malware strains have "professionally coded sophistication" and were launched by a well-resourced APT using nearly 50 domains, one hijacked.

Malware 109
article thumbnail

Google Chrome adopts Windows 10 exploit protection feature

Bleeping Computer

Google Chrome now hinders attackers' efforts to exploit security bugs on systems with Intel 11th Gen or AMD Zen 3 CPUs, running Windows 10 2004 or later. [.].

112
112
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.