Fri.Jan 22, 2021

article thumbnail

5 cybersecurity preparedness tips from two attorneys

Tech Republic Security

Cybersecurity bad actors are taking advantage of the COVID-19 pandemic and attacking businesses. Follow these best practices for protecting your organization before a security attack.

article thumbnail

Weekly Update 227

Troy Hunt

I'm back into a normal home routine and it's business as usual again. You know, stuff like data breaches, new tech toys and having your genitalia locked in an vulnerable IoT device and held for ransom. Just normal stuff like that ?? References Turing Tumble is a really neat game for kids (it's a "marble powered computer") I bought a LaMetric display (I'll probably plug that into an API to track HIBP subscriber signups) Imagine an IoT chastity belt. with a security vulnerability. that locks your

IoT 182
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Bosses are using monitoring software to keep tabs on working at home. Privacy rules aren't keeping up

Tech Republic Security

Worker's union Prospect warned that the UK was at risk of 'sleepwalking into a world of surveillance' as more businesses turn to digital tools to keep tabs on remote workers.

article thumbnail

The IoT Cybersecurity Act of 2020: Implications for Devices

eSecurity Planet

A universe of devices and technology has fallen into our laps at a speed that organizations struggle to manage effectively. And that boom in devices shows no signs of stopping. In 2019, there were an estimated 9.9 billion Internet of Things (IoT) devices. By 2025, we expect 21.5 billion. As more information about IoT device vulnerabilities is published, the pressure on industry and government authorities to enhance security standards might be reaching a tipping point.

IoT 144
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Looking for cybersecurity experts? Consider hiring veterans

Tech Republic Security

Veteran Michael Kassner says former military personnel might know more about cybersecurity than employers think. Read about some of the skills veterans could bring to a cybersecurity job.

article thumbnail

From Google Cloud Blog: “New whitepaper: Designing and deploying a data security strategy with…

Anton on Security

From Google Cloud Blog: “New whitepaper: Designing and deploying a data security strategy with Google Cloud” Here is another very fun resource we created (jointly with Andrew Lance from Sidechain ), a paper on designing and running data security strategy on Google Cloud. Read our launch blog here ?—?a long excerpt is quoted below. Read Sidechain blog here ?

More Trending

article thumbnail

Why do we fall for SMS phishing scams so easily?

We Live Security

Here’s how to spot scams where criminals use deceptive text messages to hook and reel in their marks. The post Why do we fall for SMS phishing scams so easily? appeared first on WeLiveSecurity.

Scams 142
article thumbnail

The new Microsoft Edge browser will warn you if your password has been leaked online

Tech Republic Security

The new Edge 88 browser includes tough new security features, including a password generator and a tool for monitoring whether your login details have been exposed to the dark web.

Passwords 166
article thumbnail

4 ways security has failed to become a boardroom issue

CSO Magazine

Somewhere around 2015, the security industry adopted a new mantra, “cybersecurity is a boardroom issue.” This statement was supported by lots of independent research, business press articles, webinars, local events, and even sessions at RSA and Black Hat crowing about the burgeoning relationship between CISOs, business executives, and corporate boards.

CISO 135
article thumbnail

Cybersecurity: Blaming users is not the answer

Tech Republic Security

A punitive approach toward employees reporting data breaches intensifies problems.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Abusing Windows RDP servers to amplify DDoS attacks

Security Affairs

Threat actors are abusing Windows Remote Desktop Protocol (RDP) servers to amplify Distributed Denial of Service (DDoS) attacks. Attackers are abusing Windows Remote Desktop Protocol (RDP) servers to amplify Distributed Denial of Service (DDoS) attacks. The Microsoft Remote Desktop Protocol (RDP) is a built-in service in Microsoft Windows operating systems that provides authenticated remote virtual desktop infrastructure (VDI) access to Windows-based workstations and servers.

DDOS 135
article thumbnail

Microsoft President urges tech leaders to follow lessons from Apollo missions and "War Games"

Tech Republic Security

President Brad Smith said that national security is threatened by the industry's inability to learn lessons from the past.

170
170
article thumbnail

Top IT Skills in Demand in 2021

CompTIA on Cybersecurity

2021 will be a challenging but exciting year for IT pros. Here are the top skills in demand they will need in order to gain ground in their career.

143
143
article thumbnail

KindleDrip exploit – Hacking a Kindle device with a simple email

Security Affairs

KindleDrip : Amazon addressed a number of flaws affecting the Kindle e-reader that could have allowed an attacker to take control of victims’ devices. Security experts at Realmode Labs discovered multiple vulnerabilities in the Kindle e-reader that could have allowed an attacker to take over victims’ devices. The researchers noticed that the “Send to Kindle” feature allows Kindle users to send e-books to their devices as email attachments, a behavior that could be potentially explo

Hacking 129
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Stay Alert, Joker still making its way on Google Play Store!

Quick Heal Antivirus

We recently came across 2 malicious Joker family malware applications on Google Play Store — the company was. The post Stay Alert, Joker still making its way on Google Play Store! appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Malware 127
article thumbnail

These Microsoft tools help you reduce, remove or lock down admin access to improve security

Tech Republic Security

The SolarWinds compromise means you can no longer put off privileged account management.

article thumbnail

Drupal fixed a new flaw related PEAR Archive_Tar library

Security Affairs

Drupal development team released security updates to address a vulnerability that resides in the PEAR Archive_Tar third-party library. The Drupal development team has released security updates to address the CVE-2020-36193 vulnerability in the PEAR Archive_Tar third-party library. The PEAR Archive_Tar class provides handling of tar files in PHP. It supports creating, listing, extracting, and adding to tar files.

Hacking 112
article thumbnail

Cybersecurity pros can't handle all the threat tasks alone, expert says

Tech Republic Security

Having an AI tool to help can ease the burden on cybersecurity teams, which are struggling to keep up with constant and more serious threats.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Threat Actors Can Exploit Windows RDP Servers to Amplify DDoS Attacks

Threatpost

Netscout researchers identify more than 14,000 existing servers that can be abused by ‘the general attack population’ to flood organizations’ networks with traffic.

DDOS 115
article thumbnail

MITRE ATT&CK: The Magic of Segmentation

Cisco Security

In cybersecurity, nation states, cyber criminals, hacktivists, and rogue employees are the usual suspects. They fit nicely into categories like external attackers or insider threats. But what about our essential suppliers, partners, and service providers? We rely on them, sometimes inviting them in to help manage our networks and internal systems. It’s easy to overlook them as possible pathways for cyberattacks.

article thumbnail

BrandPost: Network Security and the Heart of a Zero Trust Architecture

CSO Magazine

As part of a Zero Trust approach to cybersecurity, network flows should be authenticated before being processed and access determined by dynamic policy. A network that is intended to never trust, and to always verify all connections, requires technology that can determine confidence and authorize connections and provide that future transactions remain valid.

article thumbnail

Automate your way to success with Cisco SecureX

Cisco Security

Take back control with an integrated security platform. In a makeshift SOC in the corner of his home , Matt starts his day wi th an alarm going off on his computer. There are four monitors ganged together, multiple consoles on each one of them, and numerous empty coffee mug s. Th is probably draws a snapshot of what’s been real for many of us.

Phishing 100
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Friday Five 1/22

Digital Guardian

Copycats, searchable phishing campaigns, and cybersecurity policy in the new administration - catch up on all of the week's infosec news with the Friday Five!

InfoSec 105
article thumbnail

Here's How SolarWinds Hackers Stayed Undetected for Long Enough

The Hacker News

Microsoft on Wednesday shared more specifics about the tactics, techniques, and procedures (TTPs) adopted by the attackers behind the SolarWinds hack to stay under the radar and avoid detection, as cybersecurity companies work towards getting a "clearer picture" of one of the most sophisticated attacks in recent history.

Hacking 98
article thumbnail

ADT Tech Hacks Home-Security Cameras to Spy on Women

Threatpost

A former ADT employee pleads guilty of accessing customers’ cameras so he could spy on them.

Hacking 136
article thumbnail

Sharing eBook With Your Kindle Could Have Let Hackers Hijack Your Account

The Hacker News

Amazon has addressed a number of flaws in its Kindle e-reader platform that could have allowed an attacker to take control of victims' devices by simply sending them a malicious e-book.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Belgian Hospital Reroutes Critical Patients after Cyberattack

Hot for Security

On Sunday evening, the CHwapi hospital in Belgium suffered a cyberattack that prompted the facility to redirect emergency patients to other hospitals and delay surgical procedures. As reported by local media group L’Avenir , 80 of the hospital center’s 300 servers were affected by the attack, forcing staff and nurses to abandon digital entries and turn to pen and paper for patient assessments.

article thumbnail

Cybersecurity News Round-Up: Week of January 18, 2020

GlobalSign

Miraculously, we’ve made it through one whole week without a large-scale ransomware attack. How refreshing! Naturally, there are a few smaller-scale events being reported. Here's a run-down.

article thumbnail

How Cybersecurity Newbs Can Start Out on the Right Foot

Dark Reading

Cybersecurity experts share their savvy tips and useful resources for infosec hopefuls.

InfoSec 135
article thumbnail

Microsoft Edge, Google Chrome Roll Out Password Protection Tools

Threatpost

The new tools on Chrome and Edge will make it easier for browser users to discover - and change - compromised passwords.

Passwords 117
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.