Fri.Dec 04, 2020

article thumbnail

Enigma Machine Recovered from the Baltic Sea

Schneier on Security

Neat story : German divers searching the Baltic Sea for discarded fishing nets have stumbled upon a rare Enigma cipher machine used by the Nazi military during World War Two which they believe was thrown overboard from a scuttled submarine. Thinking they had discovered a typewriter entangled in a net on the seabed of Gelting Bay, underwater archaeologist Florian Huber quickly realised the historical significance of the find.

274
274
article thumbnail

Weekly Update 220

Troy Hunt

It's a lighter weekly update this week, kinda feels like I'm still recovering from last week's epic IoT series TBH. It's also the last update from home before I go on my first decent trip since the whole pandemic thing started and as such, the next five updates will all come from other locations, some of them rather, uh, "remote". But there's still an hour of content today including the fact that it's HIBP's birthday ??

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The 2020 Workshop on Economics and Information Security (WEIS)

Schneier on Security

The workshop on Economics and Information Security is always an interesting conference. This year, it will be online. Here’s the program. Registration is free.

article thumbnail

Most used passwords for 2020: The internet's favorite curse word, name, food, and team

Tech Republic Security

CyberNews analyzed more than 15 billion passwords; if your favorite one is at the top of the list, it's time to change right now.

Passwords 187
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

My top 5 videos of the year

Javvad Malik

Following on from last weeks post in which I summed up my top 5 blogs of the year , the sequel that one person asked me for was, what were the most watched videos of mine during 2020? Well, wonder no more, as I give you the top 5 in reverse order, cue the Top of the Pops intro! 5: Social Distance Club. Nothing to do with security and all to do with staying safe during a pandemic. 4: 7 talks I’m planning once the pandemic is over.

article thumbnail

Is Your Cybersecurity Ready for the Holidays?

Adam Levin

Retailers around the world are anticipating less foot traffic in their shops this holiday season, with more than 75% of consumers expected to do most of their shopping online due to the pandemic. And if there was any doubt as to this proposition, Black Friday certainly proved the point. While that will certainly keep consumers safer when it comes to Covid-19 infections, it could make them more vulnerable to other ills like cybercrime.

More Trending

article thumbnail

Personal Info of Over 243 Million Brazilians Exposed Online

Adam Levin

The personal information of over 243 million Brazilians was left accessible online for at least six months. The data leak was discovered by the Brazilian newspaper Estadao and has been attributed to web developers leaving the password to a government database in the source code of a publicly accessible website. The potentially exposed data included full names, addresses, telephone numbers, and medical details of anyone who had registered with the country’s national health system, totaling roughl

Passwords 130
article thumbnail

Recently disclosed CVE-2020-4006 VMware zero-day was reported by NSA

Security Affairs

VMware addressed CVE-2020-4006 zero-day flaw in VMware Workspace One Access, Access Connector, Identity Manager, and Identity Manager Connector. VMware has finally released security updates to fix the CVE-2020-4006 zero-day flaw in VMware Workspace One Access, Access Connector, Identity Manager, and Identity Manager Connector. At the end of November, VMware only has released a workaround to address the critical zero-day vulnerability that affects multiple VMware Workspace One components.

Passwords 105
article thumbnail

Protect yourself from Fraudulent QR codes

Quick Heal Antivirus

A software engineer wanted to sell his washing machine. He placed an advertisement on an e-commerce website and. The post Protect yourself from Fraudulent QR codes appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

article thumbnail

Hundreds of millions of Android users exposed to hack due to CVE-2020-8913

Security Affairs

Hundreds of millions of Android users are potentially exposed to the risk of hack due to the use of Android Play Core Library versions vulnerable to CVE-2020-8913. The CVE-2020-8913 flaw is a local, arbitrary code execution vulnerability that resides exists in the SplitCompat.install endpoint in Android’s Play Core Library. The vulnerability is rated 8.8 out of 10.0 and impacts Android’s Play Core Library versions prior to 1.7.2.

Hacking 99
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Cybersecurity Advent calendar: Let Santa in, keep hackers out!

We Live Security

Santa will soon come down the chimney, but there are potential entry points into your home and digital life that you should never leave open. The post Cybersecurity Advent calendar: Let Santa in, keep hackers out! appeared first on WeLiveSecurity.

article thumbnail

Iranian hackers access unsecured HMI at Israeli Water Facility

Security Affairs

A group of Iranian hackers gained access to a un unprotected ICS at an Israeli Water Facility and posted a video as proof of the hack. Researchers from industrial cybersecurity firm OTORIO revealed that a group of Iranian hackers gained access to a un unprotected ICS at the Israeli Water Facility. The threat actors accessed a human-machine interface (HMI) system that was left unsecured online and published a video hack.

article thumbnail

9 Cybersecurity Skills to Improve in 2021

CompTIA on Cybersecurity

IT pros should always strive to improve their skills. Research shows that your employer thinks there are cybersecurity skills you should improve on too. Learn about the 9 skills you should improve on.

article thumbnail

Serious Privacy Podcast – RegTech: Using the Power of Technology for Good (with Shub Nandi)

TrustArc

Technology brings new demands for compliance, especially given the amount of personal data collected through various means and how it is both used and combined. However, technology can also be used to assist compliance professionals by providing the necessary information quickly. In most of the Serious Privacy episodes, co-hosts Paul Breibarth and K Royal have discussed one or more […].

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Vancouver Metro Disrupted by Egregor Ransomware

Threatpost

The attack, which prevented Translink users from using their metro cards or buying tickets at kiosks, is the second from the prolific threat group just this week.

article thumbnail

BECs and EACs: What's the Difference?

Dark Reading

Email accounts are common targets for attack. Understanding how attack types differ is critical for successful defense.

article thumbnail

VMware Rolls a Fix for Formerly Critical Zero-Day Bug

Threatpost

VMware has issued a full patch and revised the severity level of the NSA-reported vulnerability to "important.".

article thumbnail

Fostering research on new web security threats

Google Security

Posted by Artur Janc and terjanq, Information Security Engineers The web is an ecosystem built on openness and composability. It is an excellent platform for building capable applications, and it powers thousands of services created and maintained by engineers at Google that are depended on by billions of users. However, the web's open design also allows unrelated applications to sometimes interact with each other in ways which may undermine the platform's security guarantees.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Making Sense of the Security Sensor Landscape

Threatpost

Chris Calvert of Respond Software (now part of FireEye) outlines the challenges that reduce the efficacy of network security sensors.

article thumbnail

Flash Dies but Warning Signs Persist: A Eulogy for Tech's Terrible Security Precedent

Dark Reading

Flash will be gone by the end of the year, but the ecosystem that allowed it to become a software security serial killer is ready to let it happen again.

Software 106
article thumbnail

High-Severity Chrome Bugs Allow Browser Hacks

Threatpost

Desktop versions of the browser received a total of eight fixes, half rated high-severity.

Hacking 108
article thumbnail

Microsoft Cloud Security Exec Talks New Tech, WFH, Gamification

Dark Reading

Gunter Ollman explains the benefits of CPSM technology, how IT security teams have evolved, and how the pandemic has shaped security.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Novel Online Shopping Malware Hides in Social-Media Buttons

Threatpost

The skimmer steals credit-card data, using steganography to hide in plain sight in seemingly benign images.

Media 94
article thumbnail

Egregor ransomware attack paralyzed for 3 days payment systems at Metro Vancouver’s transportation agency TransLink

Security Affairs

The Egregor ransomware operators hit Metro Vancouver’s transportation agency TransLink disrupting services and payment systems. Egregor ransomware operators made the headlines again, this time they hit Metro Vancouver’s transportation agency TransLink causing the disruption of its services and payment systems. The news was also confirmed by Global News which has obtained the ransom letter sent to TransLink after the company announced to have detected “suspicious network activity” this week that

article thumbnail

Applying Math to Solve Risk-Based Vulnerability Management

Security Weekly

The post Applying Math to Solve Risk-Based Vulnerability Management appeared first on Security Weekly.

Risk 91
article thumbnail

Islamic imprisoned hacker Ardit Ferizi ordered to be deported

Security Affairs

The Islamic hacker Ardit Ferizi, who is serving 20 years for giving his support to Islamic State group has been granted compassionate release. Ardit Ferizi , aka Th3Dir3ctorY, is the hacker that supported the ISIS organization by handing over data for 1,351 US government and military personnel. Ferizi is the first man charged with cyber terrorism that was extradited to the US early this year.

Hacking 65
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Intel Doubles Down on Emerging Technologies for Sharing and Using Data Securely

Dark Reading

Homomorphic encryption and federated learning could allow groups to share data and analysis while protecting the actual information.

article thumbnail

Week in security with Tony Anscombe

We Live Security

ESET researchers analyze Turla Crutch, Cybersecurity Trends 2021 report is out and how to stay safe when paying with your phone. The post Week in security with Tony Anscombe appeared first on WeLiveSecurity.

article thumbnail

Building A Truly Unified Endpoint Data Platform

Security Weekly

The post Building A Truly Unified Endpoint Data Platform appeared first on Security Weekly.

83
article thumbnail

Lessons from 2020, and What to Expect in 2021: An Evolutionary Time in Cyber and Privacy

SecureWorld News

Looking back, it has certainly been a wild ride in 2020. And, candidly, all of my predictions at the beginning of the year did not even come close to being accurate. Well, actually, one did: technology, cyber, and privacy are still on the rise and influencing businesses across a wide variety of industries. But, as we head into the final month of 2020, and look forward to hopefully a calmer and safer 2021, it is a good opportunity to take stock of where things stand, and what we can expect around

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.