Wed.Dec 30, 2020

article thumbnail

Hacked IoT Devices Livestreaming Swatting Attacks: FBI

Adam Levin

Hackers are using internet-connected home devices to livestream “swatting” attacks, according to the FBI. Swatting is a dangerous prank where emergency services are called to respond to a life threatening situation that requires immediate intervention by police and/or S.W.A.T. teams. In a public service announcement issued December 29, the FBI warned that “offenders have been using stolen e-mail passwords to access smart devices with cameras and voice capabilities and carry out swatting attacks.

IoT 300
article thumbnail

On the Evolution of Ransomware

Schneier on Security

Good article on the evolution of ransomware : Though some researchers say that the scale and severity of ransomware attacks crossed a bright line in 2020, others describe this year as simply the next step in a gradual and, unfortunately, predictable devolution. After years spent honing their techniques, attackers are growing bolder. They’ve begun to incorporate other types of extortion like blackmail into their arsenals, by exfiltrating an organization’s data and then threatening to

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity: 4 key areas that IT leaders need to address

Tech Republic Security

Collaboration between organizations and even countries might be the only way to have a positive impact on cybercrime, according to one expert.

article thumbnail

The Most Dangerous People on the Internet in 2020

WIRED Threat Level

This year saw plenty of destructive hacking and disinformation campaigns—but amid a pandemic and a historic election, the consequences have never been graver.

Internet 145
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

T-Mobile data breach: CPNI (Customer Proprietary Network Information) exposed

Security Affairs

T-Mobile has disclosed a data breach that exposed customers’ network information (CPNI), including phone numbers and calls records. T-Mobile has disclosed a data breach exposing customers’ account’s information. The T-Mobile security staff discovered “malicious, unauthorized access” to their systems. “We are reaching out to let you know about a security incident we recently identified and quickly shut down that may have impacted some of your T-Mobile account i

article thumbnail

FBI Warn Hackers are Using Hijacked Home Security Devices for ‘Swatting’

Threatpost

Stolen email credentials are being used to hijack home surveillance devices, such as Ring, to call police with a fake emergency, then watch the chaos unfold.

More Trending

article thumbnail

The 5 Most-Wanted Threatpost Stories of 2020

Threatpost

A look back at what was hot with readers -- offering a snapshot of the security stories that were most top-of-mind for security professionals and consumers throughout the year.

Phishing 102
article thumbnail

Change your macOS power settings to prevent disconnecting from VPN/Wi-Fi when the computer is locked

Tech Republic Security

You should always lock your computer when you walk away. But sometimes, that becomes a hassle. Here's one way to make it easier.

VPN 130
article thumbnail

CISA demands US govt agencies to update SolarWinds Orion software

Security Affairs

US Cybersecurity and Infrastructure Security Agency (CISA) urges US federal agencies to update the SolarWinds Orion software by the end of the year. The US Cybersecurity and Infrastructure Security Agency (CISA) has updated its official guidance to order US federal agencies to update the SolarWinds Orion platforms by the end of the year. According to the CISA’s Supplemental Guidance to Emergency Directive 21-01, all US government agencies running the SolarWinds Orion app must update to the

article thumbnail

New warning issued over COVID?19 vaccine fraud, cyberattacks

We Live Security

Cybercriminals look to cash in on the vaccine rollout, including by falsely offering to help people jump the line. The post New warning issued over COVID‑19 vaccine fraud, cyberattacks appeared first on WeLiveSecurity.

88
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Google Docs bug could have allowed hackers to hijack screenshots

Security Affairs

Google has addressed a bug in its feedback tool incorporated across its services that could have allowed attackers to view users’ private docs. Google has addressed a flaw in its feedback tool that is part of multiple of its services that could be exploited by attackers to take screenshots of sensitive Google Docs documents by embedding them in a malicious website.

Hacking 91
article thumbnail

DDoS Attacks Spiked, Became More Complex in 2020

Dark Reading

Global pandemic and the easy availability of for-hire services and inexpensive tool sets gave adversaries more opportunities to attack.

DDOS 127
article thumbnail

Taking a Neighborhood Watch Approach to Retail Cybersecurity

Threatpost

Bugcrowd CTO Casey Ellis covers new cybersecurity challenges for online retailers.

Retail 108
article thumbnail

Mobile Endpoint Security: Still the Crack in the Enterprise's Cyber Armor

Dark Reading

A combination of best practices and best-in-class technology will help keep your enterprise from falling victim to ever-growing threats.

Mobile 118
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

How to Prevent Malware From Infecting Your Website

SiteLock

Malware is a type of malicious software designed to gain unauthorized access to your website—and attacks are more common than you might think. Malware attacks stem from bots scanning websites for exploitable vulnerabilities. Websites endure an estimated 94 attacks per day averaging out to one attack per 15 minutes. About 12.8 million sites worldwide are […].

Malware 75
article thumbnail

Top 10 of 2020: Our Favorite Pieces from a Weird Year

Thales Cloud Protection & Licensing

Top 10 of 2020: Our Favorite Pieces from a Weird Year. sparsh. Thu, 12/31/2020 - 05:26. 2020 has certainly been an unusual year. We never imagined a year of working from home at this level, and I’m sure I’m not the only one eager for casual social interaction once again. Even in the midst of all the uncertainty, everyone loves a good end of year list.

article thumbnail

Acceso Remoto Seguro: Por que es importante y por que hay que hacerlo bien

The State of Security

Con la llegada de COVID-19 las organizaciones de todo el mundo fueron obligadas a hacer la transición de sus empleados a trabajar desde casa, en un momento en que la infraestructura de red de las organizaciones es más compleja que nunca. Esta complejidad no es única de los entornos de IT. De hecho, las máquinas […]… Read More. The post Acceso Remoto Seguro: Por que es importante y por que hay que hacerlo bien appeared first on The State of Security.

article thumbnail

Cloud-based security: SECaaS

eSecurity Planet

Irrespective of your organization’s size or complexity, a robust cybersecurity infrastructure is the key to protecting your network and data. But common problems prevail for IT staff monitoring or managing potential threats: a constant triage of alerts, dispersed information challenging to gather, and lack of time, tools, or resources to effectively protect your organization.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.