Sun.May 09, 2021

article thumbnail

Weekly Update 242

Troy Hunt

A fairly hectic week this one, in a large part due to chasing down really flakey network issues that are causing devices (namely Shelly relays) to be inaccessible. I suspect it's ARP related and as of now, it's still not fully resolved. You know how much s**t breaks in a connected house when devices become inaccessible? Lots. But hey, at least I've finally automated my aircon!

article thumbnail

WhatsApp to restrict features if you refuse Facebook data sharing

Bleeping Computer

WhatsApp says that it will not delete or deactivate the accounts of users who oppose its latest privacy policy update that requires sharing data with Facebook companies. [.].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Using the new Plot Javascript Exploratory Visualization Library Sans-Observable

Security Boulevard

The fine folks over at @ObservableHQ released a new javascript exploratory visualization library called Plot last week with great fanfare. It was primarily designed to be used in Observable notebooks and I quickly tested it out there (you can find them at my Observable landing page: [link] {Plot} doesn’t require Observable, however, and I threw. Continue reading ?.

135
135
article thumbnail

Why Most Employees Fail at Basic Cybersecurity

CyberSecurity Insiders

More company leaders now understand that cybersecurity training is essential for keeping their businesses safer from attacks. However, a recent study suggests that providing such education for workers may not be sufficient. Among the main findings was that 69% of people polled said they received cybersecurity training from their workplaces. However, 61% of those respondents failed a basic security quiz.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Google Chrome's new privacy feature restricts online user tracking

Bleeping Computer

In the latest move to improve the privacy of the Chrome browser, Google is adding support for a new HTML tag that prevents user tracking by isolating embedded content from the page embedding it. [.].

Software 124
article thumbnail

TsuNAME flaw exposes DNS servers to DDoS attacks

Security Affairs

A flaw in some DNS resolvers, tracked as TsuNAME, can allow attackers to launch DDoS attacks against authoritative DNS servers. Researchers at SIDN Labs (the R&D team of the registry for.nl domains), InternetNZ (the registry for.nz domains), and the Information Science Institute at the University of Southern California has discovered a vulnerability, named TsuNAME, in some DNS resolvers.

DNS 123

More Trending

article thumbnail

CISA MAR report provides technical details of FiveHands Ransomware

Security Affairs

U.S. CISA has published an analysis of the FiveHands ransomware, the same malware that was analyzed a few days ago by researchers from FireEye’s Mandiant experts. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published an analysis of the FiveHands ransomware that was recently detailed by FireEye’s Mandiant. At the end of April, researchers from FireEye’s Mandiant revealed that a sophisticated cybercrime gang tracked as UNC2447 has exploited a zero-day issue ( CVE-2021-2001

article thumbnail

Protecting Collaboration Channels for Remote Work

Security Boulevard

In a recent article for Security Boulevard, Ossi Tiainen identified 15 high-potential companies in the cybersecurity space…and Ermetic is included! Ossi posits that securing collaboration and communication apps is more important than ever because of the recent huge shift to remote work. Even before 2020 and the age of COVID-19, enterprises had shifted from email […].

article thumbnail

Ransomware Cyber Attack Forced the Largest U.S. Fuel Pipeline to Shut Down

The Hacker News

Colonial Pipeline, which carries 45% of the fuel consumed on the U.S. East Coast, on Saturday said it halted operations due to a ransomware attack, once again demonstrating how infrastructure is vulnerable to cyberattacks. "On May 7, the Colonial Pipeline Company learned it was the victim of a cybersecurity attack," the company said in a statement posted on its website.

article thumbnail

CPDP 2021 – Moderator: Robin Pierce ‘Privacy In Automated And Connected Vehicles’

Security Boulevard

Speakers: Ian Oliver, Gergely Biczok, Juha Röning, Jean-Loup Dépinay, Florian Stahl. Our sincere thanks to CPDP 2021 - Computers, Privacy & Data Protection Conference for publishing their well-crafted videos on the organization's YouTube channel. Enjoy! Permalink. The post CPDP 2021 – Moderator: Robin Pierce ‘Privacy In Automated And Connected Vehicles’ appeared first on Security Boulevard.

Education 111
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Ep. 145 – Baking a Human Behavior Cake with Jack Schafer

Security Through Education

In this episode, Chris Hadnagy and Maxie Reynolds are joined by industry professional Jack Schafer, PhD. Dr. Schafer is a psychologist, professor, intelligence consultant, and former FBI Special Agent. Dr. Schafer spent fifteen years conducting counter-intelligence and counterterrorism investigations, and seven years as a behavioral analyst for the FBI’s National Security Division’s Behavioral Analysis Program.

article thumbnail

CPDP 2021 – Moderator: Pieter Van Cleynenbreugel ‘Automated Decision-Making: Towards Effective Remedies In A Changing World?’

Security Boulevard

Speakers: Sarah Eskens, Hans Ingels, Julia Reda, Alexandre Biard. Our sincere thanks to CPDP 2021 - Computers, Privacy & Data Protection Conference for publishing their well-crafted videos on the organization's YouTube channel. Enjoy! Permalink. The post CPDP 2021 – Moderator: Pieter Van Cleynenbreugel ‘Automated Decision-Making: Towards Effective Remedies In A Changing World?

article thumbnail

Ep. 145 – Baking a Human Behavior Cake with Jack Schafer

Security Through Education

In this episode, Chris Hadnagy and Maxie Reynolds are joined by industry professional Jack Schafer, PhD. Dr. Schafer is a psychologist, professor, intelligence consultant, and former FBI Special Agent. Dr. Schafer spent fifteen years conducting counter-intelligence and counterterrorism investigations, and seven years as a behavioral analyst for the FBI’s National Security Division’s Behavioral Analysis Program.

article thumbnail

Windows 10 Notepad will warn when you're running an old version

Bleeping Computer

The Windows 10 Notepad will soon include a built-in notification that alerts users when a new version is available. [.].

117
117
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Google Gets Serious About Two-Factor Authentication. Good!

WIRED Threat Level

The tech giant wants to push its billions of users—and the rest of the industry—to enable multifactor authentication by default.

article thumbnail

Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 328’

Security Boulevard

via the respected security expertise of Robert M. Lee and the superlative illustration talents of Jeff Haas at Little Bobby Comics. Permalink. The post Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 328’ appeared first on Security Boulevard.

88
article thumbnail

Security Affairs newsletter Round 313

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box. Cloud hosting provider Swiss Cloud suffered a ransomware attack Hacking a Tesla Model X with a DJI Mavic 2 drone equipped with a WIFI dongle WeSteal, a shameless commodity cryptocurrency stealer available for sale Experian API exposed credit scores of tens of millions of Americans Expert released PoC exploit for Microsoft Exchange flaw Most Com

article thumbnail

What's Google Floc? And How Does It Affect Your Privacy?

WIRED Threat Level

There's a battle raging over how advertisers can target us on the web—or whether they should be able to target us at all.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

How To Secure Your Instagram Page

SecureBlitz

I will show you how to secure your Instagram page in this post. Instagram is one of the most popular social media platforms with over a billion users worldwide. Marketers and Influencers use Instagram to reach out to audiences worldwide and gather free Instagram followers to gain popularity or build a strong brand name for. The post How To Secure Your Instagram Page appeared first on SecureBlitz Cybersecurity.

Media 59
article thumbnail

What is a Personal Firewall?

ZoneAlarm

Firewalls are a term many know as protective of their computers from cyberattacks, but not many know what they do and why they need it (if at all). In this article, we will explore the Firewall, its use, importance, the differences between a personal Firewall and one used for enterprises and large organizations, and what … The post What is a Personal Firewall?

article thumbnail

SQL injection issue in Anti-Spam WordPress Plugin exposes User Data

Security Affairs

‘Spam protection, AntiSpam, FireWall by CleanTalk’ anti-spam WordPress plugin could expose user sensitive data to an unauthenticated attacker. A Time-Based Blind SQL Injection in ‘ Spam protection, AntiSpam, FireWall by CleanTalk ’ WordPress plugin, tracked as CVE-2021-24295, could be exploited by an unauthenticated attacker to access user data. The flaw could be exploited by an attack to access user emails, passwords, credit card data, and other sensitive information.

article thumbnail

Ransomware Attack Shuts Down Fuel Pipeline Supplying the East Coast

Security Boulevard

Colonial Pipeline reported a cyber-attack that resulted in a halting of their fuel pipeline operations to the East Coast per sources including this Bloomberg article originally posted on May 8, 2021. Just days before the U.S. National Security Agency (NSA) called for a review of operational technology (OT) security in U.S. critical infrastructure operations.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

The Broadening of American Infrastructure — Or Not

Lohrman on Security

The Biden administration has proposed a bold new infrastructure plan that includes road, bridges, airports, broadband, people and more. What’s in the plan — and what’s next?

158
158