Mon.Nov 09, 2020

article thumbnail

MY TAKE: Why companies and consumers must collaborate to stop the plundering of IoT systems

The Last Watchdog

The Internet of Things (IoT) has come a long, long way since precocious students at Carnegie Melon University installed micro-switches inside of a Coca-Cola vending machine so they could remotely check on the temperature and availability of their favorite beverages. Related: Companies sustain damage from IoT attacks That was back in 1982. Since then, IoT devices have become widely and deeply integrated into our homes, businesses, utilities and transportations systems.

IoT 277
article thumbnail

How to securely donate old Windows 10 PCs

Tech Republic Security

Many are looking to donate their spare computing devices to people who need them but can't afford to get them on their own. There is a safe and data-secure way to make your donation.

178
178
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Compal, the Taiwanese giant laptop manufacturer hit by ransomware

Security Affairs

The Taiwanese electronics manufacture Compal suffered a ransomware attack over the weekend, media blames the DoppelPaymer ransomware gang. Compal Electronics is a Taiwanese original design manufacturer (ODM), handling the production of notebook computers, monitors, tablets and televisions for a variety of clients around the world, including Apple Inc., Acer, Lenovo, Dell, Toshiba, Hewlett-Packard and Fujitsu.

article thumbnail

Top 5 things to do with old gadgets

Tech Republic Security

If you're wondering what to do with devices you don't use anymore, Tom Merritt offers five suggestions for how to deal with them.

209
209
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Millions of Hotel Guests Worldwide Caught Up in Mass Data Leak

Threatpost

A cloud misconfiguration affecting users of a popular reservation platform threatens travelers with identity theft, scams, credit-card fraud and vacation-stealing.

article thumbnail

E-commerce platform X-Cart hit by a ransomware attack

Security Affairs

The e-commerce software platform X-Cart suffered a ransomware attack at the end of October, e-stores hosted by the company went down. At the end of October, the e-commerce software platform X-Cart suffered a ransomware attack, the infection brought down customers’ e-stores hosted by the company on its platform. The software and services company X-Cart was recently acquired by Seller Labs, the premier software and services provider for Amazon sellers and brands.

More Trending

article thumbnail

Tianfu Cup 2020 – 5 minutes to hack Windows 10, Ubuntu iOS, VMWare EXSi, and others

Security Affairs

Many popular OS and applications have been hacked during this year’s edition of the Tianfu Cup hacking competition. This year’s edition of the Tianfu Cup hacking competition was very prolific, bug bounty hackers have discovered multiple vulnerabilities in multiple software and applications. The Tianfu Cup is the most important hacking contest held in China, the total bonus of the contest this year was up to 1 million US dollars.

Hacking 132
article thumbnail

From No Technical Experience to Information Security Analyst: Adrian Villegas’ Story

USD on Cyber Security

If you’re considering a career in cybersecurity but don’t have a technical background, you’ll want to meet Adrian Villegas, a recent graduate of our online Master of Science in Cyber Security Operations and Leadership program. ‘Looking for Something More Challenging’ Adrian, who had earned a bachelor’s degree in criminal justice, had been working in security […].

article thumbnail

FBI warns of attacks on unsecured SonarQube used by US govt agencies and businesses

Security Affairs

The FBI warns that threat actors are abusing misconfigured SonarQube applications to steal source code from US government agencies and businesses. The Federal Bureau of Investigation has issued an alert warning that threat actors are abusing misconfigured SonarQube applications to access and steal source code repositories from US government agencies and businesses.

article thumbnail

Data Privacy Gets Solid Upgrade With Early Adopters

Dark Reading

The United Kingdom and the regional government of Flanders kick off four pilots of the Solid data-privacy technology from World Wide Web inventor Tim Berners-Lee, which gives users more control of their data.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

xHunt hackers hit Microsoft Exchange with two news backdoors

Security Affairs

While investigating a cyber attack on the Microsoft Exchange server of an organization in Kuwait, experts found two new Powershell backdoors. Security experts from Palo Alto Networks have spotted two never-before-detected Powershell backdoors while investigating an attack on Microsoft Exchange servers at an organization in Kuwait. Experts attribute the attack to a known threat actor tracked as xHunt , aka Hive0081, which was first discovered in 2018.

DNS 114
article thumbnail

Microsoft Exchange Attack Exposes New xHunt Backdoors

Threatpost

An attack on the Microsoft Exchange server of an organization in Kuwait revealed two never-before-seen Powershell backdoors.

Malware 109
article thumbnail

Preventing and Mitigating DDoS Attacks: It's Elementary

Dark Reading

Following a spate of cyberattacks nationwide, school IT teams need to act now to ensure their security solution makes the grade.

DDOS 108
article thumbnail

Cyberattack on UVM Health Network Impedes Chemotherapy Appointments

Threatpost

The cyberattack has halted chemotherapy, mammogram and screening appointments, and led to 300 staff being furloughed or reassigned.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

How the FBI Used a 'Cyber Intrusion Defense' to Keep Something Secret

SecureWorld News

If you apply for a U.S. government job that requires an FBI background check, should you be able to ask for the results? Not just yes, you passed or sorry, you failed , but specifically, what information did the FBI uncover about you? The FBI just made the case in court that you do not have the right to see this information. And the agency built its case around what you can call a very interesting "Cyber Intrusion Defense.".

article thumbnail

Ultimate Member Plugin for WordPress Allows Site Takeover

Threatpost

Three critical security bugs allow for easy privilege escalation to an administrator role.

111
111
article thumbnail

Insecure APIs a Growing Risk for Organizations

Dark Reading

Security models for application programming interfaces haven't kept pace with requirements of a non-perimeter world, Forrester says.

Risk 92
article thumbnail

Unravel the XDR Noise and Recognize a Proactive Approach

McAfee

Cybersecurity professional s know this drill well all too well. Making sense of lot s of information and noise to access what really matters. XDR (Extended Detection & Response) has been a technical acronym throw n around in the cybersecurity industry with many notations and promises. This can be intriguing and nagging for cybersecurity professionals who are heads down defending against the persistent adversaries.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

7 Online Shopping Tips for the Holidays

Dark Reading

The holidays are right around the corner, and that means plenty of online shopping. These tips will help keep you safe.

90
article thumbnail

Hacking Technique Predictions for 2021: The Top Threats to Watch

Mitnick Security

Here at Mitnick Security, we pride ourselves on our passion for cybersecurity, keeping a close eye and ear on new threats and vulnerabilities— every. day.

Hacking 52
article thumbnail

Hotels.com & Expedia Provider Exposes Millions of Guests' Data

Dark Reading

Hotel reservation platform Prestige Software compromised personal data belonging to millions of travelers through a misconfigured AWS S3 bucket.

article thumbnail

Phishing: The Gift that Keeps on Giving

Security Weekly

The post Phishing: The Gift that Keeps on Giving appeared first on Security Weekly.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

FTC Announces Consent Agreement With Zoom

Dark Reading

The agreement covers Zoom's misleading statements on security for its audio and video calling.

83
article thumbnail

Duo Security and Datto: More Than Just Another MSP Integration

Duo's Security Blog

Let’s face it, these days the information we keep online is too important to safeguard with a username and password — especially with target credential attacks becoming inherently more common. In fact, according to Verizon’s 2020 Data Breach Investigations Report , 80% of security breaches involve compromised passwords. That's why earlier this year, Datto, the world's leading innovator of MSP delivered IT solutions, partnered with Duo Security’s Managed Service Provider (MSP) Program to implemen

article thumbnail

New Brazilian Banking Trojan Targets Mobile Users in Multiple Countries

Dark Reading

Ghimob is a full-fledged spy in your pocket, Kaspersky says.

Banking 94
article thumbnail

IAM 101: Terms you Need to Know

Thales Cloud Protection & Licensing

IAM 101: Terms you Need to Know. sparsh. Tue, 11/10/2020 - 05:27. As cyber security awareness evolves, large-scale breaches including thefts of personal identifiable information (PII) tends to hit the news. Identity and access management (IAM) solutions play a key role in preventing data breaches by securing apps and services at the access point. To help you better understand the definition and purposes of IAM, we’ve summarized its key terms.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Trump Site Alleging AZ Election Fraud Exposes Voter Data

Threatpost

Slapdash setup of Trump website collecting reports of Maricopa County in-person vote irregularities exposed 163,000 voter data records to fraud, via SQL injection.