Tue.Sep 22, 2020

article thumbnail

Amazon Delivery Drivers Hacking Scheduling System

Schneier on Security

Amazon drivers — all gig workers who don’t work for the company — are hanging cell phones in trees near Amazon delivery stations, fooling the system into thinking that they are closer than they actually are: The phones in trees seem to serve as master devices that dispatch routes to multiple nearby drivers in on the plot, according to drivers who have observed the process.

Hacking 269
article thumbnail

Data of 540,000 Sports Referees, League Officials Compromised

Adam Levin

The personal information of 540,000 sports referees, league officials, and school representatives has been compromised following a ransomware attack targeting a software vendor for the athletics industry. ArbiterSports, a software provider for several sports leagues including the NCAA, announced that it had averted a ransomware attack in July 2020, but despite blocking the attempt to encrypt their systems, the company discovered that a database backup had been accessed prior to the attack.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Interview with the Author of the 2000 Love Bug Virus

Schneier on Security

No real surprises, but we finally have the story. The story he went on to tell is strikingly straightforward. De Guzman was poor, and internet access was expensive. He felt that getting online was almost akin to a human right (a view that was ahead of its time). Getting access required a password, so his solution was to steal the passwords from those who’d paid for them.

Passwords 266
article thumbnail

Four ways CISOs can move enterprise security into the new normal

Tech Republic Security

Security is changing rapidly, and the COVID-19 pandemic hasn't helped. A Cisco roundtable of chief information security officer advisers plotted the course for a secure future.

CISO 215
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Can Schools Pass Their Biggest Cybersecurity Test Yet?

Dark Reading

Understaffed, underfunded, and underequipped, IT teams in the K-12 sector face a slew of challenges amid remote and hybrid learning models. Here's where they can begin to protect their schools against cyberattacks.

article thumbnail

How to create a secure username

Tech Republic Security

Passwords are the most important factor for securing your accounts. But you need to pay attention to your usernames as well, says NordPass.

Passwords 210

More Trending

article thumbnail

Tech jobs: These are the skills most in demand as companies change their priorities

Tech Republic Security

Keeping the hackers out remains a top priority but firms are also looking at new areas of investment.

217
217
article thumbnail

179 Arrested in Massive Global Dark Web Takedown

WIRED Threat Level

Operation Disruptor is an unprecedented international law enforcement effort, stemming from last year’s seizure of a popular underground bazaar called Wall Street Market.

Marketing 139
article thumbnail

75% of AppSec practitioners see a growing cultural divide between AppSec and developers

Tech Republic Security

Thirty-nine percent of developers said the security team is responsible for securing apps, while 67% of AppSec practitioners said their teams are responsible, according to a new study.

139
139
article thumbnail

Operation DisrupTor: police arrested 179 vendors engaged in the sale of illicit good

Security Affairs

A global police sting dubbed Operation DisrupTor targeted vendors and buyers of illicit goods on the dark web, Europol announced. A coordinated operation conducted by law enforcement agencies across the world, dubbed Operation DisrupTor, targeted vendors and buyers of illicit goods on the dark web. The operation, led by the German federal criminal police, saw the participation of law agencies from Austria, Britain, Germany, the Netherlands, Sweden, and the United States.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

The Evolution of Malicious Shell Scripts

Trend Micro

We take note of the ways shell scripts have changed in the hands of cybercriminals and how it can be employed in the development of malware payloads in malicious routines.

Malware 98
article thumbnail

A member The Dark Overlord group sentenced to 5 years in prison

Security Affairs

A United Kingdom national, member of ‘The Dark Overlord’ hacking group was sentenced to five years in federal prison, announced the US DoJ. The United Kingdom national Nathan Wyatt (39), a member of ‘The Dark Overlord’ hacking group, was extradited to the United States in December 2019. The man was charged by U.S. authorities on six counts of aggravated identity theft, threatening to damage a protected computer, and conspiracy.

article thumbnail

Attackers Target Small Manufacturing Firms

Dark Reading

The most common tactics include credential stuffing using valid accounts, various forms of deception, and vulnerabilities in third-party software, Rapid7 says in its latest quarterly threat report.

article thumbnail

German investigators blame Russian DoppelPaymer gang for deadly hospital attack

Security Affairs

The investigation of German authorities on the recent attack on the Dusseldorf hospital reveals the possible involvement of Russian hackers. Last week, German authorities revealed that a cyber attack hit a major hospital in Duesseldorf, the Duesseldorf University Clinic, and a woman who needed urgent admission died after she had to be taken to another city for treatment.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Nearly 70% of IT & Security Pros Hone Their Cyber Skills Outside of Work

Dark Reading

New research shows how security skills are lacking across multiple IT disciplines as well - including network engineers, sys admins, and cloud developers.

article thumbnail

Google Cloud Buckets Exposed in Rampant Misconfiguration

Threatpost

A too-large percentage of cloud databases containing highly sensitive information are publicly available, an analysis shows.

article thumbnail

Vulnerability Disclosure Programs See Signups & Payouts Surge

Dark Reading

More than $44.75 million in rewards were paid to hackers over the past year, driving total payouts beyond $100 million.

107
107
article thumbnail

Google Chrome Bugs Open Browsers to Attack

Threatpost

Google's new release of Chrome 85.0.4183.121 for Windows, Mac, and Linux fixes 10 security flaws.

120
120
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Microsoft Extends Data Loss Prevention to Cloud App Security

Dark Reading

The update, one of several announced today, is intended to help employees remain compliant when handling data across cloud applications.

93
article thumbnail

Microsoft Overhauls Patch Tuesday Security Update Guide

Threatpost

Microsoft announced a new Security Guide to help cybersecurity professionals more quickly untangle relevant bugs in its monthly security bulletins.

article thumbnail

Permission Management & the Goldilocks Conundrum

Dark Reading

In today's COVID-19 era, managing access has become even more difficult, especially for large organizations. Here's how to get it "just right.

84
article thumbnail

Firefox 81 Release Kills High-Severity Code-Execution Bugs

Threatpost

Mozilla has fixed three high-severity flaws with the release of Firefox 81 and Firefox ESR 78.3.

113
113
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

CISA’s advisory warns of notable increase in LokiBot malware

Security Affairs

US Cybersecurity and Infrastructure Security Agency (CISA) is warning of a notable increase in the use of LokiBot malware by threat actors since July 2020. The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a new security advisory warning federal agencies and the private sector of a surge in the attacks employing the LokiBot malware since July 2020.

Malware 65
article thumbnail

Known Citrix Workspace Bug Open to New Attack Vector

Threatpost

Windows MSI files provide an opening for attackers even though the bug was mostly patched in July.

86
article thumbnail

Startup Aims to Map and Track All the IT and Security Things

Dark Reading

Security service JupiterOne spins off from a healthcare service provider's homegrown technology.

article thumbnail

Activision Refutes Claims of 500K-Account Hack

Threatpost

The Call of Duty behemoth said that the reports of widespread hacks are false.

Hacking 89
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Your AST Guide for the Disenchanted: Part 3

ForAllSecure

In our previous post, we discussed that the key ingredient to a true DevSecOps process is accurate testing. In this post, we’ll share how to implement an accurate application security testing program that effectively manages risk, while protecting developer productivity. Two of Each is All You Need. There are many different types of application security testing tools you can choose from.

Risk 52
article thumbnail

Lockscreen and Authentication Improvements in Android 11

Google Security

Posted by Haining Chen, Vishwath Mohan, Kevin Chyn and Liz Louis, Android Security Team [Cross-posted from the Android Developers Blog ] As phones become faster and smarter, they play increasingly important roles in our lives, functioning as our extended memory, our connection to the world at large, and often the primary interface for communication with friends, family, and wider communities.

article thumbnail

Your AST Guide for the Disenchanted: Part 3

ForAllSecure

In our previous post, we discussed that the key ingredient to a true DevSecOps process is accurate testing. In this post, we’ll share how to implement an accurate application security testing program that effectively manages risk, while protecting developer productivity. Two of Each is All You Need. There are many different types of application security testing tools you can choose from.

Risk 40
article thumbnail

New Google Search Hacks Push Viruses & Porn

Dark Reading

Three incidents demonstrate how cybercriminals leverage the scourge of black-hat search engine optimization to manipulate search results.

Hacking 98
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.