Wed.Oct 14, 2020

article thumbnail

Upcoming Speaking Engagements

Schneier on Security

This is a current list of where and when I am scheduled to speak: I’ll be speaking at Cyber Week Online , October 19-21, 2020. I’ll be speaking at the IEEE Symposium on Technology and Society virtual conference, November 12-15, 2020. I’ll be keynoting the 2020 Conference on Cyber Norms on November 12, 2020. I’m speaking at the (ISC)² Security Congress 2020 , November 16, 2020.

article thumbnail

IoT security: University creates new labels for devices to increase awareness for consumers

Tech Republic Security

What if you could compare security on IoT devices, similar to nutrition labels, before you buy them? One organization is trying to make that happen.

IoT 196
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2020 Workshop on Economics of Information Security

Schneier on Security

The Workshop on Economics of Information Security will be online this year. Register here.

article thumbnail

Survey finds that IT departments victimized by ransomware forever changed

Tech Republic Security

IT managers at organizations hit by ransomware are nearly three times as likely to feel "significantly behind" when it comes to understanding cyberthreats, compared to their peers that have never been hit.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Google researcher found BleedingTooth flaws in Linux Bluetooth

Security Affairs

Google security researcher discovered Bluetooth vulnerabilities (BleedingTooth) in the Linux kernel that could allow zero-click attacks. Andy Nguyen, a Google security researcher, has found Bluetooth vulnerabilities, referred to as BleedingTooth, in the Linux kernel that could be exploited by attackers to run arbitrary code or access sensitive information.

article thumbnail

Zoom announces end-to-end encryption, customizable SDKs and more at Zoomtopia

Tech Republic Security

Zoom's two-day online conference kicked off with a bevy of new product announcements around security and developer enhancements.

More Trending

article thumbnail

The Important Difference Between Cybersecurity And Cyber Resilience (And Why You Need Both)

CTOVision Cybersecurity

Read Bernard Marr explain the difference between cybersecurity and cyber resilience on Forbes: Cyber threats like hacking, phishing, ransomware, and distributed denial-of-service (DDoS) attacks have the potential to cause enormous […].

DDOS 109
article thumbnail

German authorities raid the offices of the FinFisher surveillance firm

Security Affairs

Earlier this month, German authorities have raided the offices of FinFisher, the German surveillance software firm, accused of providing its software to oppressive regimes. German authorities have raided the offices of FinFisher , the popular German surveillance firm as part of an investigation into the alleged sale of their software to oppressive regimes.

article thumbnail

What's Really Happening in Infosec Hiring Now?

Dark Reading

As the pandemic continues, security teams still need help they can't get. But the "skills shortage" is only part of the story.

InfoSec 125
article thumbnail

Talos experts disclosed unpatched DoS flaws in Allen-Bradley adapter

Security Affairs

Cisco Talos found several remotely exploitable denial-of-service (DoS) vulnerabilities in a Rockwell Automation industrial automation product. A researcher from Cisco Talos released technical details of several remotely exploitable denial-of-service (DoS) vulnerabilities in an industrial automation product made by Rockwell Automation. The product affected by the flaw is the Allen-Bradley 1794-AENT Flex I/O series B adapter, the issue resides in the Ethernet/IP request path port/data/logical segm

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Digital Shadows Analysis of Europol’s Cybercrime Report

Digital Shadows

In early October 2020, Europol released their Internet Organized Crime Threat Assessment (IOCTA) 2020, detailing the latest trends and impacts. The post Digital Shadows Analysis of Europol’s Cybercrime Report first appeared on Digital Shadows.

article thumbnail

Hot off the Press: Veracode Named a 2020 Gartner Peer Insights Customers’ Choice for AST

Veracode Security

Veracode has been officially recognized by Gartner Peer Insights as a 2020 Customers??? Choice for Application Security Testing. The report includes Veracode???s aggregate score of 4.6 out of 5 stars out of 95 independent customer reviews (as of July 31, 2020), and of the reviewers, 92 percent said that they would recommend Veracode???s AST solutions.

article thumbnail

Travelex, Other Orgs Face DDoS Threats as Extortion Campaign Rages On

Threatpost

Organizations worldwide – including Travelex – have been sent letters threatening to launch DDoS attacks on their network unless a $230K ransom is paid.

DDOS 106
article thumbnail

Introducing Veracode’s New Partner Training and Certification Paths

Veracode Security

We are excited to announce the launch of our new partner training and certification paths, open to all authorized Veracode partners. Based on partner feedback, we have designed these paths to provide a deeper understanding of the Veracode story and technical details around application security (AppSec). By enlisting in our training and certification paths, we enable partners to expand their business and support customers in developing a comprehensive AppSec program.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

NIST Quantum Cryptography Program Nears Completion

Dark Reading

The National Institute of Standards and Technology's first post-quantum cryptography standard will address key issues, approaches, an arms race, and the technology's uncertain future.

article thumbnail

Critical SonicWall VPN Portal Bug Allows DoS, Worming RCE

Threatpost

The CVE-2020-5135 stack-based buffer overflow security vulnerability is trivial to exploit, without logging in.

VPN 122
article thumbnail

The Deepfakes Lab: Detecting & Defending Against Deepfakes with Advanced AI

McAfee

Detrimental lies are not new. Even misleading headlines and text can fool a reader. However, the ability to alter reality has taken a leap forward with “deepfake” technology which allows for the creation of images and videos of real people saying and doing things they never said or did. Deep learning techniques are escalating the technology’s finesse, producing even more realistic content that is increasingly difficult to detect.

Media 88
article thumbnail

BEC Attacks: Nigeria No Longer the Epicenter as Losses Top $26B

Threatpost

BEC fraudsters now have bases of operation across at least 39 counties and are responsible for $26 billion in losses annually -- and growing.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

IoT privacy risks: How security labels can help inform consumers

Tech Republic Security

When buying Internet of Things devices, consumers should understand the risks to their privacy. Here's one way to advise them.

Risk 93
article thumbnail

Intel Adds Memory Encryption, Firmware Security to Ice Lake Chips

Threatpost

Intel's addition of memory encryption to its upcoming 3rd generation Xeon Scalable processors matches AMD's Secure Memory Encryption (SME) feature.

article thumbnail

Assuring Business Continuity by Reducing Malware Dwell Time

Dark Reading

Here's how CISOs and IT security operations teams can best address key challenges to network monitoring that could increase malware dwell time.

Malware 104
article thumbnail

Cybercriminals Steal Nearly 1TB of Data from Miami-Based International Tech Firm

Threatpost

Databases of sensitive, financial and personally identifiable info and documents from Intcomex were leaked on Russian-language hacker forum after a ransomware attack.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

London Borough of Hackney Investigates 'Serious' Cyberattack

Dark Reading

London's Hackney Council says some services may be slow or unavailable as it looks into a cyberattack affecting services and IT systems.

104
104
article thumbnail

A Trickbot Assault Shows US Military Hackers' Growing Reach

WIRED Threat Level

Despite the operation's short-term effects, it sets new precedents for the scope of Cyber Command's mission.

Hacking 106
article thumbnail

Intel's Ice Lake Beefs Up CPU Security for Cloud Workloads

Dark Reading

The third-generation Xeon processors build in hardware security features to provide extra protection to data in transit, at rest, and in use.

126
126
article thumbnail

Silent Librarian Goes Back to School with Global Research-Stealing Effort

Threatpost

The Iranian hacker group is targeting universities in 12 countries.

Phishing 119
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Type Of Malware That Collects Bits Of Data

SiteLock

A type of malware that collects bits of data from a site can be hard to find. SiteLock can pinpoint that type of malware that spreads without human interaction. The post Type Of Malware That Collects Bits Of Data appeared first on The SiteLock Blog.

Malware 75
article thumbnail

Google, Intel Warn on ‘Zero-Click’ Kernel Bug in Linux-Based IoT Devices

Threatpost

Intel and Google are urging users to update the Linux kernel to version 5.9 or later.

IoT 107
article thumbnail

Zoom Announces Rollout of End-to-End Encryption

Dark Reading

Phase 1 removes Zoom servers from the key generation and distribution processes.

article thumbnail

Remote, Hybrid Work Need Better Data Security

IT Security Central

2020 is a uniquely transformative year. Prompted by a global pandemic, we’ve been forced to change many things about how we live, work and relate. For most businesses, this means a rapid and comprehensive shift toward remote work. While more than half of all employees participated in a rapid transition to remote work, it’s clear […].

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.