Tue.Aug 31, 2021

article thumbnail

A passwordless future isn't close: It's here

Tech Republic Security

Authentication sans password is already possible and solutions are on the market from companies like Ping Identity. With passwords passé, it's time to make the leap to better security.

Passwords 208
article thumbnail

More Military Cryptanalytics, Part III

Schneier on Security

Late last year, the NSA declassified and released a redacted version of Lambros D. Callimahos’s Military Cryptanalytics, Part III. We just got most of the index. It’s hard to believe that there are any real secrets left in this 44-year-old volume.

182
182
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Don't forget to evaluate soft skills when hiring for cybersecurity positions

Tech Republic Security

Soft skills are just as important, if not more so, than technical skills in cybersecurity professionals. People with soft skills can be trained in tech skills, expert says.

article thumbnail

Windows 11 Security Scare—MS Nixes Fixes on Older PCs

Security Boulevard

Microsoft Windows 11 won’t auto-update on slightly old PCs. It appears this includes security updates. The post Windows 11 Security Scare—MS Nixes Fixes on Older PCs appeared first on Security Boulevard.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Docker launches new business plan with changes to the Docker Desktop license

Tech Republic Security

Docker announced a new subscription plan for enterprises and free access to Docker Desktop for personal use, educational institutions, non-commercial open-source projects and small businesses.

article thumbnail

FBI, CISA: Ransomware attack risk increases on holidays, weekends

Bleeping Computer

The FBI and CISA urged organizations not to let down their defenses against ransomware attacks during weekends or holidays to released a joint cybersecurity advisory issued earlier today. [.].

More Trending

article thumbnail

Flaw in the Quebec vaccine passport: analysis

We Live Security

ESET's cybersecurity expert Marc-Étienne Léveillé analyses in-depth the Quebec's vaccine proof apps VaxiCode and VaxiCode Verif. The post Flaw in the Quebec vaccine passport: analysis appeared first on WeLiveSecurity.

article thumbnail

Cybercriminals are holding schools ransom for billions and some are paying up

Tech Republic Security

A new report highlights the financial costs of school ransomware, days lost to downtime and the number of students impacted, as these incidents become a steady source of criminal income.

article thumbnail

Cybercriminal sells tool to hide malware in AMD, NVIDIA GPUs

Bleeping Computer

Cybercriminals are making strides towards attacks with malware that executes code from the graphics processing unit (GPU) of a compromised system. [.].

Malware 145
article thumbnail

Delta variant: Is your IT department ready to go fully remote again due to COVID-19?

Tech Republic Security

The delta variant is delaying office reentry plans. For companies going fully remote again, team cohesion, cloud investments and reducing IT burden could be key, according to tech experts.

127
127
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

How ransomware runs the underground economy

CSO Magazine

The unwanted attention attracted by ransomware attacks recently have caused several of the top cybercrime forums to ban ransomware discussions and transactions on their platforms earlier this year. While some hoped this might have a significant impact on the ability of ransomware groups to organize themselves, the bans only pushed their activity further underground, making it harder for security researchers and companies to monitor it.

article thumbnail

Data privacy, governance and insights are all important obligations for businesses

Tech Republic Security

Expert: Information management can also lead to a massive value proposition in being able to tap into governed data for business insights.

article thumbnail

LockFile Ransomware Uses Never-Before Seen Encryption to Avoid Detection

Threatpost

Researchers from Sophos discovered the emerging threat in July, which exploits the ProxyShell vulnerabilities in Microsoft Exchange servers to attack systems.

article thumbnail

How behavioral biometrics can stop social engineering and malware scams dead in their tracks

Security Boulevard

Human fraud: how behavioral biometrics can stop social engineering and malware scams that traditional fraud tools miss. The post How behavioral biometrics can stop social engineering and malware scams dead in their tracks appeared first on NuData Security. The post How behavioral biometrics can stop social engineering and malware scams dead in their tracks appeared first on Security Boulevard.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Vaccine passports: Is your personal data in safe hands?

We Live Security

Vaccination passports may facilitate the return to normalcy, but there are also concerns about what kinds of personal data they collect and how well they protect it. Here’s what you should know. The post Vaccine passports: Is your personal data in safe hands? appeared first on WeLiveSecurity.

124
124
article thumbnail

Code Red: Hospitals Are Facing a Major Ransomware Threat

CyberSecurity Insiders

As the U.S. healthcare system struggles to cope with the COVID-19 pandemic, it has been fighting another major battle – ransomware. Nearly half (48%) of hospitals, according to a new study , have had to disconnect their networks in the past six months because of ransomware. Midsize hospitals are especially at risk, according to the study, Perspectives in Healthcare Security , conducted by Ipsos for CyberMDX and Philips.

article thumbnail

Faille dans la preuve vaccinale Québécoise?: analyse

We Live Security

Les chercheurs d’ESET expliquent les détails d’une faille découverte dans VaxiCode Vérif, l’application mobile permettant la vérification des preuves vaccinales québécoise. The post Faille dans la preuve vaccinale Québécoise?: analyse appeared first on WeLiveSecurity.

Mobile 122
article thumbnail

Android 12 adds AI and machine learning with Private Compute Core but keeps your data secure

Tech Republic Security

Android 12 is bringing a new feature to strengthen the security of data used by machine learning. Jack Wallen explains Private Compute Core.

123
123
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Palo Alto Networks Adds Cloud Misconfiguration Tool

Security Boulevard

Palo Alto Networks today revealed that its Bridgecrew by Prisma Cloud offering has been extended using another tool that now makes it possible to also detect configuration drifts across multiple clouds. Bridgecrew Drift Detection is based on an open source Yor project that automatically tags IaC templates with attribution and ownership details as well as.

article thumbnail

Cybercriminals buy up admin credentials to sharpen attacks on cloud deployments

Tech Republic Security

Lacework analysis finds that SSH, SQL, Docker and Redis were the most common targets over the last three months.

139
139
article thumbnail

Why the World Needs Proactive Cybersecurity

Security Boulevard

Computing is now in a ubiquitous state with users able to connect to a dizzying number of services and applications. Companies have networked together everything to reduce costs, increase automation, and achieve digital transformation to make employees more productive. This ease of access and interconnectedness also leads to grave security threats and the urgent need for proactive cybersecurity.

article thumbnail

Data compliance: "The world is still waking up to the challenges ahead," expert says

Tech Republic Security

Bringing together siloed data from all parts of the business is a huge challenge to IT departments when meeting compliance requirements.

123
123
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Microsoft announces Visual Studio Code for the Web public preview

Bleeping Computer

Microsoft has announced the public preview launch of Visual Studio Code for the Web, a browser-based version of its free and cross-platform VS Code integrated development environment (IDE). [.].

107
107
article thumbnail

Don’t use single?factor authentication, warns CISA

We Live Security

The federal agency urges organizations to ditch the bad practice and instead use multi-factor authentication methods. The post Don’t use single‑factor authentication, warns CISA appeared first on WeLiveSecurity.

article thumbnail

Coinbase seeds panic among users with erroneous 2FA change alerts

Bleeping Computer

Coinbase, the world's second largest cryptocurrency exchange with approximately 68 million users from over 100 countries, has scared a significant amount of its users with erroneous 2FA warnings. [.].

article thumbnail

Top 5 autonomous car roadblocks

Tech Republic Security

Tom Merritt tells us the things that are getting in the way of autonomous car adoption.

147
147
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

API-Driven Data Automation—The Secret Weapon for Successful Digital Transformation

Security Boulevard

API-Driven Data Automation—The Secret Weapon for Successful Digital Transformation. michelle. Tue, 08/31/2021 - 08:13. Despite it never being far from the boardroom agenda, research shows that 70 percent of digital transformation initiatives fail to reach their stated goals. Dan Graves. Aug 25, 2021. This article was first published in ITProPortal. .

article thumbnail

Security engineer job requirements, certifications, and salary

CSO Magazine

What is a security engineer? A security engineer is a cybersecurity professional who helps develop and implement strategies and systems to protect their organization's infrastructure from cyberattacks. This is a role in an organization for someone with enough knowledge and experience to understand both the systems they're defending and the attacks they'll face, and they usually spend more time creating secure systems and networks than they do reacting to threats.

article thumbnail

Threats Grow as Digital Wallets Gain Popularity

Security Boulevard

The pandemic, as well as users’ personal preferences, have helped enable the rapid emergence of digital payment applications and digital wallets, which compete with credit cards and cash as preferred payment options. The growing popularity of digital wallets such as Google Pay, Samsung Pay and Apple Pay is making them a bigger target for malicious.

article thumbnail

Back-to-Basics: Think Before You Click

PCI perspectives

As small and medium businesses begin to re-open following the pandemic, it’s important to do so securely in order to protect customer’s payment card data. Too often, data breaches happen as a result of vulnerabilities that are entirely preventable. The PCI Security Standards Council (PCI SSC) has developed a set of payment protection resources for small businesses.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.