Fri.Mar 04, 2022

article thumbnail

Samsung Encryption Flaw

Schneier on Security

Researchers have found a major encryption flaw in 100 million Samsung Galaxy phones. From the abstract: In this work, we expose the cryptographic design and implementation of Android’s Hardware-Backed Keystore in Samsung’s Galaxy S8, S9, S10, S20, and S21 flagship devices. We reversed-engineered and provide a detailed description of the cryptographic design and code structure, and we unveil severe design flaws.

article thumbnail

TechRepublic Premium editorial calendar: IT policies, checklists, toolkits, and research for download

Tech Republic Security

TechRepublic Premium content helps you solve your toughest IT issues and jumpstart your career or next project. The post TechRepublic Premium editorial calendar: IT policies, checklists, toolkits, and research for download appeared first on TechRepublic.

Big data 170
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

U.S. Security Agencies Release Network Security, Vulnerability Guidance

eSecurity Planet

The U.S. National Security Agency (NSA) released comprehensive network security guidance on March 3, on the same day that the Cybersecurity and Infrastructure Security Agency (CISA) released its longest-ever list of exploited vulnerabilities. With organizations around the world on heightened alert in the wake of Russia’s unprovoked war against Ukraine, government agencies have stepped up efforts too.

article thumbnail

New OpenSSF project may finally be doing security right

Tech Republic Security

Commentary: For years we’ve tried tackling security at the company or organizational level. The new Alpha-Omega Project seems to be taking a true industry-wide approach, and that’s promising. The post New OpenSSF project may finally be doing security right appeared first on TechRepublic.

166
166
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Why You Should Start Using Two-Factor Authentication Now

Heimadal Security

Two-factor authentication, also called multiple-factor or multiple-step verification, is an authentication mechanism used to double-check that your identity is legitimate. How Does Two-Factor Authentication Work? When you want to sign into your account, you are prompted to authenticate with a username and a password – that’s the first verification layer.

article thumbnail

Cyberattacks on SMBs are increasing, will your business be ready?

Tech Republic Security

Coro’s report details a growing number of attacks on mid-sized businesses and the steps that need to be taken in order to be prepared. The post Cyberattacks on SMBs are increasing, will your business be ready? appeared first on TechRepublic.

148
148

More Trending

article thumbnail

Go-to resources for safe, secure cloud storage

Tech Republic Security

The cloud is becoming the norm when it comes to data storage, but it's not without its challenges. The right policies and procedures can go a long way toward safely storing data in the cloud. The post Go-to resources for safe, secure cloud storage appeared first on TechRepublic.

126
126
article thumbnail

A Brief Introduction To The Security Guard Job Position

SecureBlitz

Ever thought of being a security guard, but you do not know what the exact requirements were? Well, if you live in Denver and you are looking to work as a guard at one of the Denver security guards service companies, you should read this article before applying. What Are Some Tasks Of A Security. The post A Brief Introduction To The Security Guard Job Position appeared first on SecureBlitz Cybersecurity.

article thumbnail

Picking up the phone still might be the best way to do business

Tech Republic Security

State of the Call report shows that voice calls remain preferred form of communication, despite spam risks. The post Picking up the phone still might be the best way to do business appeared first on TechRepublic.

Risk 123
article thumbnail

More Than 70% of SOC Analysts Experiencing Burnout

Dark Reading

Nearly 65% of security operations center (SOC) analysts are likely to change jobs in the next year, survey shows.

137
137
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

MacPaw’s ClearVPN enables secure connectivity, helps in supporting Ukrainian resistance

Tech Republic Security

Russia's invasion of Ukraine, and corresponding Western sanctions, make cybersecurity dangers an unprecedented critical risk. ClearVPN helps secure connections and support Ukrainian resistance. The post MacPaw’s ClearVPN enables secure connectivity, helps in supporting Ukrainian resistance appeared first on TechRepublic.

Risk 111
article thumbnail

Handling the Cybersecurity Effects of the War in Ukraine

Heimadal Security

The crisis between Russia and Ukraine is impacting the whole globe. Newsfeeds are being flooded with all kinds of information, and we might have no idea what is true and what is bogus, therefore, in these trying times, it’s more important than ever to safeguard our data, especially when there is also an increasing danger […]. The post Handling the Cybersecurity Effects of the War in Ukraine appeared first on Heimdal Security Blog.

article thumbnail

Facebook is vile, but banning it in Russia is wrong

Graham Cluley

Yes, having access to Facebook would leave ordinary Russians open to crazy QAnon theories, anti-vax propaganda, and a myriad of narrow echo chambers. But it would also give them a chance to seek out independent reporting on the horrific invasion of Ukraine by Russia.

108
108
article thumbnail

Unpacking MITRE’s new Engage cybersecurity framework

Security Boulevard

Mitre on Wednesday released a new communication and planning framework for cyber adversary engagement that focuses on deception and denial. The new framework called Engage, according to Mitre, will help CISOs and other cybersecurity leaders, vendors, defenders, and the cybersecurity community as a whole to implement comprehensive defense strategies to protect the digital assets under […].

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Tips to protect your data, security, and privacy from a hands-on expert

Malwarebytes

This post was authored by one of the most active helpers on the Malwarebytes forums who wishes to remain anonymous. Back in the early days of personal computing, perhaps one of the only real concerns was data loss from a drive failure. That risk still exists, but we all face many other threats today too. There are rootkits, Trojans, worms, viruses, ransomware, phishing, identity theft, and social engineering to worry about.

Backups 103
article thumbnail

Can I Make Six Figures Working in Tech? Here Are the Best Tech Jobs for 2022

CompTIA on Cybersecurity

Did you know you can make a six figure salary working in tech? Learn how the right training and experience can put that paycheck within your reach.

112
112
article thumbnail

Both Sides in Russia-Ukraine War Heavily Using Telegram for Disinformation and Hacktivism

The Hacker News

Cyber criminals and hacktivist groups are increasingly using the Telegram messaging app for their activities, as the Russia-Ukraine conflict enters its eighth day. A new analysis by Israeli cybersecurity company Check Point Research has found that "user volume grew a hundred folds daily on Telegram related groups, peaking at 200,000 per group.

article thumbnail

Ukraine to join NATO intel-sharing cyberdefense hub

Bleeping Computer

While Ukraine is yet to become a member of the North Atlantic Treaty Organization (NATO), the country has been accepted as a contributing participant to the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE). [.].

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Emergency preparedness: How to disaster?proof your tech

We Live Security

Here are a few tips that will help you get your ‘go bag’ ready if you have to leave at a moment’s notice and need your communications and data to survive. The post Emergency preparedness: How to disaster‑proof your tech appeared first on WeLiveSecurity.

98
article thumbnail

Hackers leak 190GB of alleged Samsung data, source code

Bleeping Computer

The Lapsus$ data extortion group leaked today a huge collection of confidential data they claim to be from Samsung Electronics, the South Korean giant consumer electronics company. [.].

98
article thumbnail

Danger in the Skies: Software Driving Our FlightsInterview with Aviation and Cybersecurity Expert, Barbara Filkins

Security Boulevard

Embedded software is increasingly responsible for plane safety in the air and on the landing strip. But as we’ve learned from the issues of the Boeing 737 Max 8 , engineers can sometimes overlook interdependencies between operations, which can lead to catastrophic results. In the Boeing cases, the angle-of-attack (AoA) sensor and other instrument failures were tied to a design flaw involving the Maneuvering Characteristics Augmentation System (MCAS) of the 737 MAX series.

article thumbnail

CISA warns organizations to patch 95 actively exploited bugs

Bleeping Computer

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added 95 vulnerabilities to its list of actively exploited security issues, the largest number since issuing the binding operational directive (BOD) last year. [.].

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

CISA Adds Another 95 Flaws to its Actively Exploited Vulnerabilities Catalog

The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) this week added 95 more security flaws to its Known Exploited Vulnerabilities Catalog, taking the total number of actively exploited vulnerabilities to 478.

Risk 98
article thumbnail

Social media phishing attacks are at an all time high

Bleeping Computer

Phishing campaigns continue to focus on social media, ramping up efforts to target users for the third consecutive year as the medium becomes increasingly used worldwide for communication, news, and entertainment. [.].

Media 98
article thumbnail

Victims of the T-Mobile 2021 Data Leak Are in Danger of Identity Theft

Heimadal Security

On August 14, 2021, a database holding the data of 30 million consumers was put up for sale on a hacker site for six bitcoins ($280K). The threat actors had targeted T-Mobile servers involved in development, staging, and production. To prove the authenticity of the T-Mobile data breach, threat actors shared a print screen of […]. The post Victims of the T-Mobile 2021 Data Leak Are in Danger of Identity Theft appeared first on Heimdal Security Blog.

article thumbnail

Concentric Adds Intelligence Exchange Service for AI Platform

Security Boulevard

Concentric Inc. this week launched a service that makes it simpler to translate data and risk insights surfaced by the Semantic Intelligence data access governance platform into specific remediation, monitoring and privacy management tasks. Karthik Krishnan, Concentric CEO, said Concentric Exchange is the first anonymous sharing service that both simplifies and improves data security and.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Amazon: Charities, aid orgs in Ukraine attacked with malware

Bleeping Computer

Charities and non-governmental organizations (NGOs) providing critical support in Ukraine are targeted in malware attacks aiming to disrupt their operations and relief efforts seeking to assist those affected by Russia's war. [.].

Malware 97
article thumbnail

Imperva Thwarts 2.5 Million RPS Ransom DDoS Extortion Attacks

The Hacker News

Cybersecurity company Imperva on Friday said it recently mitigated a ransom distributed denial-of-service (DDoS) attack targeting an unnamed website that peaked at 2.5 million requests per second (RPS). "While ransom DDoS attacks are not new, they appear to be evolving and becoming more interesting with time and with each new phase," Nelli Klepfish, security analyst at Imperva, said.

DDOS 98
article thumbnail

Log4j Forced a Cybersecurity Wake-Up Call

Security Boulevard

It’s been nearly four months since Alibaba Cloud’s security team first reported a remote code execution (RCE) vulnerability within Apache Log4j (also known as Log4Shell). Due to the popularity and widespread use of this application, it very quickly became a top priority for security operatives and administrators around the world. Within weeks, Apache issued a.

article thumbnail

Experts urge EU not to force insecure certificates in web browsers

Bleeping Computer

A group of 38 cybersecurity professors and IT experts worldwide, together with the Electronic Frontier Foundation (EFF), have cosigned a letter to EU regulators that warns of a proposal that could expose internet users to cybercrime. [.].

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.