Thu.Nov 12, 2020

article thumbnail

“Privacy Nutrition Labels” in Apple’s App Store

Schneier on Security

Apple will start requiring standardized privacy labels for apps in its app store, starting in December: Apple allows data disclosure to be optional if all of the following conditions apply: if it’s not used for tracking, advertising or marketing; if it’s not shared with a data broker; if collection is infrequent, unrelated to the app’s primary function, and optional; and if the user chooses to provide the data in conjunction with clear disclosure, the user’s name or accou

article thumbnail

How to combat the latest and most aggressive botnets and malware

Tech Republic Security

Launching more sophisticated botnets, malware, and other threats, cybercriminals are getting more ruthless, says Nuspire.

Malware 206
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The NEW CompTIA Security+: Your Questions Answered

CompTIA on Cybersecurity

CompTIA Security+ got a big upgrade to reflect the changes in cybersecurity. If you're pursuing a career in cybersecurity, we have answers to some of the biggest questions about the new CompTIA Security+.

article thumbnail

New survey details IT challenges, shadow IT risks, 2021 outlook, and more

Tech Republic Security

The report also illustrates a shift in the way workers perceive IT. Half of the respondent employees said they "had more empathy, had more respect or were more grateful for IT.

Risk 155
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

New modular ModPipe POS Malware targets restaurants and hospitality sectors

Security Affairs

Cybersecurity researchers spotted a new modular PoS malware, dubbed ModPipe, that targets PoS restaurant management software from Oracle. ESET researchers discovered a new modular backdoor, dubbed ModPipe, that was designed to target PoS systems running ORACLE MICROS Restaurant Enterprise Series (RES) 3700 , which is a management suite widely used in restaurant and hospitality sectors.

Malware 131
article thumbnail

How and when to change your Google password

Tech Republic Security

If you've ever been tempted to change your Google account password, but weren't sure how, don't let that confusion stop you. Jack Wallen walks you through the process.

Passwords 150

More Trending

article thumbnail

Hackers for hire target victims with cyber espionage campaign

Tech Republic Security

The victims reside in the US and several other countries, while many of the targeted organizations are financial institutions, says BlackBerry.

149
149
article thumbnail

46M accounts were impacted in the data breach of children’s online playground Animal Jam

Security Affairs

The popular children’s online playground Animal Jam has suffered a data breach that affected more than 46 million accounts. Animal Jam is a safe, award-winning online playground for kids created by WildWorks. Kids aging 7 through 11 can play games, personalize their favorite animal, learn fun facts, and so much more. Animal Jam currently has over 130 million registered players and 3.3 million monthly active users.

article thumbnail

Animal Jam Hacked, 46M Records Roam the Dark Web

Threatpost

Animal Jam, just the latest in a string of attacks on gaming apps, has adopted a transparent communications strategy after stolen data turned up on a criminal forum.

Hacking 124
article thumbnail

Google addresses two new Chrome zero-day flaws

Security Affairs

Google has released Chrome version 86.0.4240.198 that addresses two additional zero-day vulnerabilities that were exploited in the wild. Google has addressed two zero-day vulnerabilities, actively exploited in the wild, with the release of Chrome version 86.0.4240.198. The IT giant has fixed a total of five Chrome zero-day vulnerabilities in only three weeks.

Hacking 121
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

These are the 15 Top Cyber Threats Now

SecureWorld News

Sometimes when you are down in the cyber attack trees defending your organization, it can be tough to see the cyber threat forest. Understanding how things are shifting in the forest, or overall threat landscape, can help us categorize, strategize, and prioritize our resources. And now we have brand new research coming from the EU which unpacks the top cyber threats as they stand now.

article thumbnail

Swedish court suspended the ban on Huawei equipment

Security Affairs

A Swedish administrative court has suspended the ban on Huawei equipment from the national 5G network. A Swedish administrative court ins Stockholm has suspended the decision to ban Huawei equipment from the country’s 5G network. In October, Sweden announced the ban of Chinese tech companies Huawei and ZTE from building its 5G network infrastructure.

Wireless 113
article thumbnail

To MSP or Not to MSP? Hacks, Ransomware Make the Acronym a Challenge for Tech Companies

CompTIA on Cybersecurity

As MSPs increasingly become the focus of hackers and ransomware attacks, some are finding that even being associated as an MSP doesn’t carry the same cachet it once did. So they're forging new identities.

article thumbnail

Manufacturing Sees Rising Ransomware Threat

Dark Reading

Crypto-ransomware groups are increasingly adopting malware and tools that can probe and attack operational technology, such as industrial control systems, according to an assessment of current threats.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

2 More Google Chrome Zero-Days Under Active Exploitation

Threatpost

Browser users are once again being asked to patch severe vulnerabilities that can lead to remote code execution.

119
119
article thumbnail

'Pay2Key' Could Become Next Big Ransomware Threat

Dark Reading

Researchers from Check Point say an Iranian-based threat actor has successfully attacked multiple Israeli companies could soon go global.

article thumbnail

From Triton to Stuxnet: Preparing for OT Incident Response

Threatpost

Lesley Carhart, with Dragos, gives Threatpost a behind-the-scenes look at how industrial companies are faring during the COVID-19 pandemic - and how they can prepare for future threats.

article thumbnail

DARPA and Academia Jumpstart 5G IoT Security Efforts

Dark Reading

With 5G IoT devices projected to hit 49 million units by 2023, researchers launch programs to keep IoT from becoming a blackhole of exfiltration.

IoT 101
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Bugs in Critical Infrastructure Gear Allow Sophisticated Cyberattacks

Threatpost

Security problems in Schneider Electric programmable logic controllers allow compromise of the hardware, responsible for physical plant operations.

article thumbnail

New 'CostaRicto' Hack-for-Hire Group Targets Global Businesses

Dark Reading

The group of APT mercenaries uses bespoke malware and strong operation security to target a range of organizations, located primarily in Southeast Asia.

Hacking 91
article thumbnail

Digging into the Dark Web: How Security Researchers Learn to Think Like the Bad Guys

Threatpost

Hacker forums are a rich source of threat intelligence.

InfoSec 115
article thumbnail

5 Steps Every Company Should Take to Avoid Data Theft Risk

Dark Reading

It's never been easier for employees to download company data and take it with them to their next gig.

Risk 100
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Cyberattackers Serve Up Custom Backdoor for Oracle Restaurant Software

Threatpost

The modular malware is highly sophisticated but may not be able to capture credit-card info.

article thumbnail

Like the Energizer Bunny, Trickbot Goes On and On

Dark Reading

Recent efforts to take down the virulent botnet have been largely -- but not entirely -- successful.

98
article thumbnail

Are You Prepared for Cybersecurity in the Boardroom?

McAfee

Corporate boards have many dimensions of responsibility. Cybersecurity can be one of the most nuanced and important areas of focus for a board, but not all board members are well versed in why and what they need to care about related to cybersecurity. Cybersecurity is a board level topic for three main reasons: Cybersecurity breaches are a serious matter for any company.

article thumbnail

An Engineer Gets 9 Years for Stealing $10M From Microsoft

WIRED Threat Level

The defendant tried—and failed—to use bitcoin to cover his tracks.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Credential Stuffing Fills E-commerce Pipeline in 2020

Dark Reading

There were 1.3 billion attacks in the third quarter alone, according to new analysis from Arkose Labs.

79
article thumbnail

What if the Bible got Deleted?!? Welcome to Digital Transformation

SecureWorld News

The Vatican Apostolic Library is home to more than 80,000 irreplaceable documents, as well as the oldest copy of the Bible in the world. To preserve and protect their artifacts, which include drawings and writings from the likes of Michelangelo and Galileo, the library is making the transition to digitize anything of importance. This move began in 2012 and is still an ongoing process.

article thumbnail

Social Engineering: Definition, Types, Detection & Prevention

Spinone

What is social engineering? Social engineering is a manipulative technique used by criminals to elicit specific actions in their victims. These actions usually include revealing sensitive data or giving access to protected systems. Social engineering is seldom a stand-alone operation. It is usually a step in various fraud schemes. This technique is especially efficient in cyberattacks.

article thumbnail

To Code or Not to Code? Cybercriminals and the world of programming

Digital Shadows

If you keep a pulse on the technology sector or have take note of billboard ads in any urban area. The post To Code or Not to Code? Cybercriminals and the world of programming first appeared on Digital Shadows.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.