Mon.Nov 28, 2022

article thumbnail

Computer Repair Technicians Are Stealing Your Data

Schneier on Security

Laptop technicians routinely violate the privacy of the people whose computers they repair: Researchers at University of Guelph in Ontario, Canada, recovered logs from laptops after receiving overnight repairs from 12 commercial shops. The logs showed that technicians from six of the locations had accessed personal data and that two of those shops also copied data onto a personal device.

Antivirus 315
article thumbnail

Will EV Charging Infrastructure Be Ready for Cyber Attacks?

Lohrman on Security

A Sandia National Laboratories study determined that electric vehicle charging stations are vulnerable to cyber attacks. What might happen next — and how hard will this be to fix?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

U.S. Govt. Apps Bundled Russian Code With Ties to Mobile Malware Developer

Krebs on Security

A recent scoop by Reuters revealed that mobile apps for the U.S. Army and the Centers for Disease Control and Prevention (CDC) were integrating software that sends visitor data to a Russian company called Pushwoosh , which claims to be based in the United States. But that story omitted an important historical detail about Pushwoosh: In 2013, one of its developers admitted to authoring the Pincer Trojan , malware designed to surreptitiously intercept and forward text messages from Android mob

Mobile 227
article thumbnail

Take The Stress Out of Securing Your Workforce

Jane Frankland

Sir Isaac Newton first presented his three laws of motion in 1686. His third law, is widely known and states that, “for every action there is an equal and opposing reaction.” We see this in business. As technology advances at speed, it enables just as many opportunities as it introduces threats. Gains come but so do threats and losses. No company can escape either.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

AWS re:Invent 2022: Partners on parade

Tech Republic Security

There's news from Amazon Web Services' Las Vegas show as a flurry of partnerships and edge computing initiatives have been revealed. The post AWS re:Invent 2022: Partners on parade appeared first on TechRepublic.

149
149
article thumbnail

Windows 11 gets a VPN Status Indicator

CyberSecurity Insiders

Windows 11 is all set to get a VPN Status Indicator in its system tray, allowing users to connect or download files anonymously and without the revelation of their home or IP address. Therefore, all those using VPN services to browse websites, stream movies and download files can look at their network and proceed only when it shows a sign. According to a report that turned viral on Twitter, Windows 11 users will get an indicator as a shield icon to let us know whether their network is connected

VPN 139

More Trending

article thumbnail

Experts found a vulnerability in AWS AppSync

Security Affairs

Amazon Web Services (AWS) fixed a cross-tenant vulnerability that could have allowed attackers to gain unauthorized access to resources. Amazon Web Services (AWS) has addressed a cross-tenant confused deputy problem in its platform that could have allowed threat actors to gain unauthorized access to resources. The problem was reported to the company by researchers from Datadog on September 1, 2022, and the bug was solved on September 6.

article thumbnail

A Peek Inside the FBI's Unprecedented January 6 Geofence Dragnet

WIRED Threat Level

Google provided investigators with location data for more than 5,000 devices as part of the federal investigation into the attack on the US Capitol.

145
145
article thumbnail

U.S. and UK Ban More Chinese Kit as Xi’s Grip Weakens

Security Boulevard

Two key members of the Five Eyes intelligence alliance have made further moves to stop Chinese equipment imports. The post U.S. and UK Ban More Chinese Kit as Xi’s Grip Weakens appeared first on Security Boulevard.

article thumbnail

500 million WhatsApp mobile numbers up for sale on the dark web

CSO Magazine

A database of 487 million WhatsApp users’ mobile numbers has been put up for sale on the Breached.vc hacking community forum. The data set contains information on WhatsApp users from more than 84 countries, the post shows. The story was first reported by Cybernews. The seller of the leaked data is also offering it through the controversial messaging app Telegram , where the person or the group goes by handle “Palm Yunn.

Mobile 130
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Consumer cyberthreats: predictions for 2023

SecureList

The consumer threat landscape constantly changes. Although the main types of threats (phishing, scams, malware, etc.) remain the same, lures that fraudsters use vary greatly depending on the time of year, current major events, news, etc. This year, we have seen spikes in cybercriminal activity aimed at users amid the shopping and back-to-school season, big pop culture events, such as Grammy and Oscar, movie premieres , new smartphone announcements , game releases , etc.

Education 120
article thumbnail

A flaw in some Acer laptops can be used to bypass security features

Security Affairs

ESET announced the discovery of a vulnerability impacting Acer laptops that can allow an attacker to deactivate UEFI Secure Boot. ESET researchers announced in a series of tweets the discovery of a vulnerability impacting Acer laptops, the issue can allow an attacker to deactivate UEFI Secure Boot. The experts explained that the flaw, tracked as CVE-2022-4020 , is similar to the Lenovo vulnerabilities the company disclosed earlier this month.

Firmware 119
article thumbnail

US bans sales of Huawei, Hikvision, ZTE, and Dahua equipment

Bleeping Computer

The United States government, through the Federal Communications Commission (FCC), has banned the sale of equipment from Chinese telecommunications and video surveillance vendor Huawei, ZTE, Hytera, Hikvision, and Dahua due "unacceptable risks to national security". [.].

article thumbnail

AWS releases Wickr, its encrypted messaging service for enterprises

CSO Magazine

Just days after announcing the close of its consumer-oriented Wickr Me encrypted messaging service, Amazon Web Services (AWS), at its annual re:Invent conference on Monday, said that it was making the enterprise version of the app generally available. Dubbed simply AWS Wickr, the service was first announced in July and has been in preview till now. The enterprise version of the messaging service, designed to allow enterprise users to securely collaborate via text, voice and video, along with fil

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Latest WhatsApp Data Leak 2022 details are here

CyberSecurity Insiders

Every year, we hear something or the other about WhatsApp data breach and following this course is this news that is currently trending on various social media platforms and community forums at the end of this year, i.e. November 2022. According to a post on a dark web forum, a hacker is claiming to sell information related to about 487 million WhatsApp users that includes their mobile numbers, respectively.

article thumbnail

Financial services increasingly targeted for API-based cyberattacks

CSO Magazine

A report published Monday by cloud services and CDN (content delivery network) platform Akamai said that the financial services industry is an increasingly popular target for a wide range of cyberattacks, with application and API attacks against the vertical more than tripling in the past year. APIs are a core part of how financial services firms are changing their operations in the modern era, Akamai said, given the growing desire for more and more app-based services among the consumer base.

article thumbnail

Threat Actors #Giveaway: 5.4 Million Twitter User Data Exposed

Heimadal Security

5,485,635 Twitter user records that contain personal data were released on November 24th, for free, on a hacker forum. Cybersecurity researchers say that the data was stolen due to an API vulnerability that Twitter announced to have fixed in January this year. The same data is thought to have been previously for sale in August, […]. The post Threat Actors #Giveaway: 5.4 Million Twitter User Data Exposed appeared first on Heimdal Security Blog.

article thumbnail

RansomBoggs: New ransomware targeting Ukraine

We Live Security

ESET researchers spot a new ransomware campaign that goes after Ukrainian organizations and has Sandworm's fingerprints all over it. The post RansomBoggs: New ransomware targeting Ukraine appeared first on WeLiveSecurity.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

RansomBoggs Ransomware hit several Ukrainian entities, experts attribute it to Russia

Security Affairs

Several Ukrainian organizations were hit by Russia-based RansomBoggs Ransomware in the last week, ESET reports. Researchers from ESET observed multiple attacks involving a new family of ransomware, tracked as RansomBoggs ransomware, against Ukrainian organizations. The security firm first detected the attacks on November 21 and immediately alerted the CERT US.

article thumbnail

EU Council adopts NIS2 directive to harmonize cybersecurity across member states

CSO Magazine

The Council of the European Union (EU) has adopted a new cybersecurity directive designed to improve resilience and incident response capacities across the EU, replacing NIS , the current directive on the security of network and information systems. The new directive, NIS2, will set the baseline for cybersecurity risk management measures and reporting obligations across sectors and aims to harmonize cybersecurity requirements and implementation of measures in different member states.

article thumbnail

TikTok ‘Invisible Body’ challenge exploited to push malware

Bleeping Computer

Hackers are capitalizing on a trending TikTok challenge named 'Invisible Challenge' to install malware on thousands of devices and steal their passwords, Discord accounts, and, potentially, cryptocurrency wallets. [.].

Malware 107
article thumbnail

Password management policy

Tech Republic Security

Password-driven security may not be the perfect solution, but the alternatives haven’t gained much traction. This policy defines best practices that will make password protection as strong and manageable as possible. From the policy: Employee passwords are the first line of defense in securing the organization from inappropriate or malicious access to data and services.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Moving the Cybersecurity Goal Posts

Security Boulevard

Moving the Cybersecurity Goal Posts. Photo Credit — Interexy.com — Top Cybersecurity Trends To Monitor In 2022–2023. Are you Staying Ahead or Falling Behind the Cybersecurity Curve? Adaptive control, no trust, zero-trust, auto-remediation artificial intelligence, and content filter with multi-factor authentication aligning with your CASB deployment add in open-source technology, unpatched critical infrastructure, is your organization’s cybersecurity risks and compliance mandates protected?

article thumbnail

Malicious Android app found powering account creation service

Bleeping Computer

?A fake Android SMS application, with 100,000 downloads on the Google Play store, has been discovered to secretly act as an SMS relay for an account creation service for sites like Microsoft, Google, Instagram, Telegram, and Facebook [.].

article thumbnail

Computer Repair Technicians Are Stealing Your Data

Security Boulevard

Laptop technicians routinely violate the privacy of the people whose computers they repair: Researchers at University of Guelph in Ontario, Canada, recovered logs from laptops after receiving overnight repairs from 12 commercial shops. The logs showed that technicians from six of the locations had accessed personal data and that two of those shops also copied data onto a personal device.

98
article thumbnail

Meta fined €265M for not protecting Facebook users' data from scrapers

Bleeping Computer

Meta has been fined €265 million ($275.5 million) by the Irish data protection commission (DPC) for a massive 2021 Facebook data leak exposing the information of hundreds of million users worldwide. [.].

98
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

FIFA Football lovers should know the latest cyber scam

CyberSecurity Insiders

This post relates to all FIFA World Cup Football lovers who are eager to gain a Hayya card to enter the stadium venues. For the past few days, some telegram channels are actively selling fake Hayya Cards for $50 to $150. And information is out that innocent game lovers are being trapped in this scam that might eventually land them in deep trouble and, in some situations, in jail.

Scams 97
article thumbnail

FC Barcelona’s Website Used by Scammers for Fraud

Heimadal Security

Top European football club, FC Barcelona, recently has its official website used by scammers in a sophisticated third-party fraud campaign. According to Adex, an ad fraud monitoring platform, the threat actors used the website of the Catalonian club to increase traffic to a likely fraudulent iGaming website. FC Barcelona’s website is visited monthly by 5.4 […].

article thumbnail

Is MFA the Vegetable of Cybersecurity?

Dark Reading

Don’t fuss now — just another spoonful of multifactor authentication to keep the organization strong and the data safer.

article thumbnail

Acer fixes UEFI bugs that can be used to disable Secure Boot

Bleeping Computer

Acer has fixed a high-severity vulnerability affecting multiple laptop models that could enable local attackers to deactivate UEFI Secure Boot on targeted systems. [.].

91
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.