Tue.Mar 16, 2021

article thumbnail

Can We Stop Pretending SMS Is Secure Now?

Krebs on Security

SMS text messages were already the weakest link securing just about anything online, mainly because there are tens of thousands of employees at mobile stores who can be tricked or bribed into swapping control over a mobile phone number to someone else. Now we’re learning about an entire ecosystem of companies that anyone could use to silently intercept text messages intended for other mobile users.

article thumbnail

On the Insecurity of ES&S Voting Machines’ Hash Code

Schneier on Security

Andrew Appel and Susan Greenhalgh have a blog post on the insecurity of ES&S’s software authentication system: It turns out that ES&S has bugs in their hash-code checker: if the “reference hashcode” is completely missing, then it’ll say “yes, boss, everything is fine” instead of reporting an error. It’s simultaneously shocking and unsurprising that ES&S’s hashcode checker could contain such a blunder and that it would go unnoticed by

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why traditional malware detection can't stop the latest security threats

Tech Republic Security

Isolating your hardware and your applications is a more effective way to prevent malware from infecting your critical endpoints, says HP.

Malware 211
article thumbnail

FBI warns of escalating Pysa ransomware attacks on education orgs

Bleeping Computer

The Federal Bureau of Investigation (FBI) Cyber Division has warned system administrators and cybersecurity professionals of increased Pysa ransomware activity targeting educational institutions. [.].

Education 144
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

McAfee uncovers espionage campaign aimed at major telecommunication companies

Tech Republic Security

The security company said the attacks were attributed to RedDelta and Mustang Panda, both of which are allegedly based in China.

article thumbnail

Magecart Attackers Save Stolen Credit-Card Data in.JPG File

Threatpost

Researchers from Sucuri discovered the tactic, which creatively hides malicious activity until the info can be retrieved, during an investigation into a compromised Magento 2 e-commerce site.

Malware 140

More Trending

article thumbnail

What We Can Learn From the 2021 Microsoft Data Breach

Security Boulevard

In this blog, we’ll review the details of the most recent breach against the Microsoft Exchange Server. However, this blog’s point is that these forms of cyber attacks will continue and could likely accelerate. Trying to react after the fact is not the way to do business. If your toolsets or MSSP services don’t enable you to automatically detect and stop these types of sophisticated intrusion attacks, such as the recent Solarwinds attack, or whatever the next attack is—you have the wrong approac

article thumbnail

Bitwarden: How to enable biometric login

Tech Republic Security

If you'd rather not have to enter your password every time you open the Bitwarden password manager on your mobile device, Jack Wallen shows you how to enable biometric login.

article thumbnail

Half of Americans Experienced Identity Theft During COVID-19 Pandemic, New Study Shows

Hot for Security

A new report uncovers a striking pervasiveness of identity theft perpetrated against U.S. consumers where half of respondents surveyed experienced such an occurrence during the pandemic. Developed by Aite Group and underwritten by GIACT, the study found that 47% of U.S. consumers experienced identity theft between 2019 and 2020. And over the past two years, 37% of Americans experienced application fraud (i.e., the unauthorized use of one’s identity to apply for an account), and 38% experie

article thumbnail

Security firm releases free Purple Knight tool to spot weaknesses in Active Directory

Tech Republic Security

The AD report card scores the security of Group Policies, Kerberos security and AD infrastructure.

180
180
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Hackers hide credit card data from compromised stores in JPG file

Bleeping Computer

Hackers have come up with a sneaky method to steal payment card data from compromised online stores that reduces the suspicious traffic footprint and helps them evade detection. [.].

136
136
article thumbnail

Hacker Site Hacked: WeLeakInfo Leaks Info

Security Boulevard

A hacker is selling a database of personal information: Nothing unusual there. But these 24,000 records are the identifiable info of other hackers. The post Hacker Site Hacked: WeLeakInfo Leaks Info appeared first on Security Boulevard.

Hacking 134
article thumbnail

Ransomware attack forces college to tell students to stay at home

Graham Cluley

A UK college says it has closed its campus buildings for one week, and advised students that all lessons and lectures will be taking place online, following a ransomware attack.

article thumbnail

Microsoft explains the cause of yesterday's massive service outage

Bleeping Computer

Microsoft has shed some light on the root cause behind yesterday's massive Azure authentication outage that affected multiple Microsoft services and blocked users from logging into their accounts. [.].

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

7 critical IT policies you should have in place

CSO Magazine

Editor's note: This article, originally published on May 26, 2016, has been updated to more accurately reflect recent trends. To say the world has changed a lot over the past year would be a bit of an understatement. From a cybersecurity standpoint, the changes have been significant—in large part because many people continue to work from remote locations or alternate between home offices and corporate facilities.

eCommerce 129
article thumbnail

The Microsoft Exchange hacks: How they started and where we are

Bleeping Computer

The emergency patches for the recently disclosed critical vulnerabilities in Microsoft Exchange email server did not come soon enough and organizations had little time to prepare before en masse exploitation began. [.].

Hacking 126
article thumbnail

Google fixes Chrome zero?day bug exploited in the wild

We Live Security

The latest update patches a total of five vulnerabilities affecting the browser’s desktop versions. The post Google fixes Chrome zero‑day bug exploited in the wild appeared first on WeLiveSecurity.

136
136
article thumbnail

Teen hacker agrees to 3 years in prison for Twitter Bitcoin scam

Bleeping Computer

A Florida teenager has pleaded guilty to fraud charges after coordinating the hack of high-profile Twitter accounts to run a cryptocurrency scam that collected roughly $120,000 worth of bitcoins. [.].

Scams 124
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

The Microsoft Exchange hack: The risks and rewards of sharing bug intel

SC Magazine

A Microsoft R&D campus building in Hyderabad, India. (prashanth dara, CC BY-SA 3.0 [link] via Wikimedia Commons). Microsoft is reportedly investigating whether hackers who have been abusing a series of Microsoft Exchange bugs managed to obtain sensitive information about the vulnerabilities after Microsoft privately shared certain details, including proof-of-concept exploit code, with various security partners.

Risk 123
article thumbnail

Sky Global’s Criminal Secure Network Taken Down; Arrest Warrant Issued for CEO

Hot for Security

The CEO of Sky Global and one of his associates received indictments and were charged with conspiracy to violate the federal Racketeer Influenced and Corrupt Organizations Act (RICO). Sky Global is the developer of sophisticated encryption and messaging software explicitly designed to prevent law enforcement from intercepting communication and retrieving data from criminals’ phones if they get caught.

article thumbnail

New botnet targets network security devices with critical exploits

Bleeping Computer

Authors of a new botnet are targeting connected devices affected by critical-level vulnerabilities, some of them impacting network security devices. [.].

article thumbnail

AT&T Cybersecurity announces 2021 ‘Partners of the Year Awards’ Winners

CyberSecurity Insiders

It is with great pleasure we announce today Softcat as AT&T Cybersecurity’s ‘2021 Global Partner of the Year’ Softcat are among seven other category winners who have achieved exceptional growth in 2020, demonstrating great dedication and collaboration to the AT&T Cybersecurity Partner Program. It is a honor to work with such a resilient and hardworking partner community, who throughout one of our most turbulent years in our lifetime, have continued to perform at an exce

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

New Mirai variant appears in the threat landscape

Security Affairs

Palo Alto researchers uncovered a series of ongoing attacks to spread a variant of the infamous Mirai bot exploiting multiple vulnerabilities. Security experts at Palo Alto Networks disclosed a series of attacks aimed at delivering a Mirai variant leveraging multiple vulnerabilities. Below the list of vulnerabilities exploited in the attacks, three of which were unknown issues: ID Vulnerability Description Severity 1 VisualDoor SonicWall SSL-VPN Remote Command Injection Vulnerability Critical 2

Wireless 117
article thumbnail

How to ensure security and trust in connected cars

CyberSecurity Insiders

The cars we drive today have become truly connected objects, capable of a variety of functionalities that both users and manufacturers could have only dreamed of in past decades. Whether it is detecting tiredness, alerting the driver of potential dangers or in-car entertainment systems , the level of innovation that is found in modern vehicles is nothing short of staggering.

article thumbnail

It’s official… SMS is not a security tool

Security Boulevard

Using SMS as a second factor for authentication has always been a bit iffy, due to the risk of “SIM swapping” attacks. However, many people. The post It’s official… SMS is not a security tool appeared first on Security Boulevard.

article thumbnail

What Program, Released In 2013, Is an Example of Ransomware?

Hacker Combat

What Program, Released In 2013, Is an Example of Ransomware? The answer is a crypto locker. Ransomware is malevolent programming that scrambles documents on a contaminated PC, in this manner keeping the proprietor from getting to them. The proprietor is approached to pay cash as a trade-off for the decoding tool to be utilized to open their records.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Four Trends Shaping the Future of Access Management

Security Boulevard

From a remote employee using a personal device for work, to a marketing consultant logging into a shared social media account, to a customer authenticating to use a SaaS app, someone is accessing your organization’s. The post Four Trends Shaping the Future of Access Management appeared first on Security Boulevard.

Marketing 113
article thumbnail

Exchange Cyberattacks Escalate as Microsoft Rolls One-Click Fix

Threatpost

Public proof-of-concept (PoC) exploits for ProxyLogon could be fanning a feeding frenzy of attacks even as patching makes progress.

Hacking 133
article thumbnail

Mamma Mia! Compromised passwords are filled with popular music artists

Tech Republic Security

All apologies, but if you use your favorite band as part of your password it's time to turn around and try something else.

Passwords 121
article thumbnail

Winning the Cybersecurity Contest

Security Boulevard

Cybersecurity is a competitive endeavor. This contest is framed as ‘us versus them,’ attackers versus defenders, and good guys versus bad guys. Analogies to sporting contests are common, thus resulting in similar descriptive language. Given this view, it is natural to wonder who is winning the contest. The large number of organizations impacted by the.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.