Mon.Oct 26, 2020

article thumbnail

Google Mending Another Crack in Widevine

Krebs on Security

For the second time in as many years, Google is working to fix a weakness in its Widevine digital rights management (DRM) technology used by online streaming sites like Disney , Hulu and Netflix to prevent their content from being pirated. The latest cracks in Widevine concern the encryption technology’s protection for L3 streams, which is used for low-quality video and audio streams only.

Software 261
article thumbnail

Enterprises confident Chief Sustainability Officer (CSO) will improve cybersecurity

Tech Republic Security

98% of enterprises want CSOs, but 56% of industrial businesses don't have plans to introduce one to their company, according to a new Kaspersky report.

CSO 149
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

COVID-19 vaccine manufacturer suffers a data breach

Security Affairs

Dr. Reddy’s, the Indian contractor for Russia’s “Sputinik V” COVID-19 vaccine was hit with a cyber-attack that forced the company to close its plants. Indian COVID-19 vaccine manufacturer Dr. Reddy’s Laboratories was hit with a cyber attack that forced it to shut down its plants in Brazil, India, Russia, the U.K., and the U.S. According to The Economic Times the company suffered a data breach.

article thumbnail

The future often looks silly

Javvad Malik

I just took a photo of my scribblings on my whiteboard. The automation workflow will trigger that photo to be uploaded with that relevant project. Technology is but a mere extension of me. As I sit down, I recall a time, probably around 2006 because it was before the iPhone came out and only important people had Blackberry’s which they could use to send and receive emails on.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Ransomware attack disabled Georgia County Election database

Security Affairs

A ransomware attack recently hit Georgia county government and reportedly disabled a database used to verify voter signatures. A ransomware attack hit a Georgia county government early this month and disabled a database used to verify voter signatures in the authentication of absentee ballots. It is a common process to validate absentee ballots sent by mail by analyzing signatures.

article thumbnail

Cybercriminals Extort Psychotherapy Patients Following Vastaamo Breach

Dark Reading

An attacker is running a Tor site to leak the session notes of 300 patients at Vastaamo, a Finnish psychotherapy facility.

140
140

More Trending

article thumbnail

Microsoft's Kubernetes Threat Matrix: Here's What's Missing

Dark Reading

With a fuller picture of the Kubernetes threat matrix, security teams can begin to implement mitigation strategies to protect their cluster from threats.

122
122
article thumbnail

Nitro PDF data breach might impact major companies, including Microsoft, Google, and Apple

Security Affairs

Nitro PDF suffered a massive data breach that impacts many major organizations, including Apple, Chase, Citibank, Google, and Microsoft. A massive data breach suffered by the Nitro PDF might have a severe impact on well-known organizations, including Google, Apple, Microsoft, Chase, and Citibank. Nitro Software , Inc. develops commercial software used to create, edit, sign, and secure Portable Document Format (PDF) files and digital documents.

article thumbnail

Teach Your Employees Well: How to Spot Smishing & Vishing Scams

Dark Reading

One of the best ways to keep employees from falling victim to these social-engineering attacks is to teach them the signs.

article thumbnail

Microsoft IE Browser Death March Hastens

Threatpost

Internet Explorer redirects more traffic to Edge Chromium browser as Microsoft warns of the upcoming demise of the once dominant browser.

Internet 107
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Neural Networks Help Users Pick More-Secure Passwords

Dark Reading

Typically, blocklists are used to prevent users from picking easily guessable patterns, but a small neural network can do the same job and suggests that complex password requirements are not necessary.

Passwords 122
article thumbnail

Nando’s Hackers Feast on Customer Accounts

Threatpost

Multiple chicken diners said their usernames and passwords were stolen and the accounts used to place high-volume orders.

article thumbnail

Trend Micro HouseCall for Home Networks

Trend Micro

Remember when only desktop computers in our homes had connections to the internet? Thanks to the latest developments in smart device technology, almost everything now can be connected— security cameras, smart TVs, gaming consoles, and network storage, to name just a few.

article thumbnail

The Story of McAfee: How the Security Giant Arrived at a Second IPO

Dark Reading

Industry watchers explore the story of McAfee, from its founding in 1987, to its spinoff from Intel, to how it's keeping up with competitors.

96
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Finnish psychotherapy center Vastaamo suffered a shocking security breach

Security Affairs

Private Finnish psychotherapy center Vastaamo suffered a security breach, hackers are now demanding ransom to avoid the leak of sensitive data they have stolen. Finland’s interior minister summoned an emergency meeting Sunday after the private Finnish psychotherapy center Vastaamo suffered a security breach that caused the exposure of patient records.

article thumbnail

A Hacker Is Threatening to Leak Patients' Therapy Notes

WIRED Threat Level

An extortionist has turned a breach of Finland's Vastaamo mental health services provider into a nightmare for victims.

102
102
article thumbnail

Vastaamo Breach: Hackers Blackmailing Psychotherapy Patients

Threatpost

Cybercriminals have already reportedly posted the details of 300 Vastaamo patients - and are threatening to release the data of others unless a ransom is paid.

article thumbnail

The Russian Hackers Playing 'Chekhov's Gun' With US Targets

WIRED Threat Level

Berserk Bear has had plenty of opportunity to cause serious trouble. So why hasn't it yet?

102
102
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

‘Among Us’ Mobile Game Under Siege by Attackers

Threatpost

Ongoing attacks on the wildly popular game Among Us are testing developers’ ability to keep up.

Mobile 107
article thumbnail

Your Next Move: Network Security Operations

CompTIA on Cybersecurity

If you like to collaborate with others and work with diverse technologies and products, then network security operations may be a good next step.

article thumbnail

New Report Links Cybersecurity and Sustainability

Dark Reading

Some have also created the role of chief sustainability officer, according to Kaspersky.

article thumbnail

Containerd Bug Exposes Cloud Account Credentials

Threatpost

The flaw (CVE-2020-15157) is located in the container image-pulling process.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Essential Cybersecurity for the Hotel Tech Community

NSTIC

In recent years criminals and other attackers have compromised the networks of several major hospitality companies, exposing the information of hundreds of millions of guests.[1] A hotel property management system (PMS) is a prime target for attackers – it serves as the information technology operations and data management hub of a hotel and could give a criminal access to a trove of valuable data.

article thumbnail

How to Successfully Transition to a Hybrid Workforce

IT Security Central

Many companies will need to learn to support on-site, remote and distributed staff. In 2020, agility is making a comeback. After running its course as a business buzzword, it has become an operational necessity for companies in every sector due to the novel coronavirus pandemic’s repercussions. Most prominently, this reality manifests in our workplace arrangements, as companies grapple […].

40
article thumbnail

IMSI-Catchers from Canada

Schneier on Security

Gizmodo is reporting that Harris Corp. is no longer selling Stingray IMSI-catchers (and, presumably, its follow-on models Hailstorm and Crossbow) to local governments: L3Harris Technologies, formerly known as the Harris Corporation, notified police agencies last year that it planned to discontinue sales of its surveillance boxes at the local level, according to government records.

article thumbnail

Identity Thieves Targeting Gen Z – Third Certainty #31

Adam Levin

Gen Z has seen an uptick in identity-related crimes in the wake of Covid-19. In the latest Third Certainty, Adam Levin discusses how convenience should never trump security, no matter your age. The post Identity Thieves Targeting Gen Z – Third Certainty #31 appeared first on Adam Levin.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Wave of Cyberattacks in France: What We Know

SecureWorld News

Cyberattacks surge and malware infections spike in relation to hot geopolitical situations. And we're watching this scenario play out again on the world stage. This time it is happening in France. On Sunday the French cybersecurity agency, called Cybermalveillance, issued this #alerte tweet: ??[ #ALERTE #Cybersécurité ] Vague de #cyberattaques en #défiguration en cours ciblant de nombreux sites Internet Français.

Malware 101