Sun.Oct 10, 2021

Data Breach Numbers, Costs and Impacts All Rise in 2021

Lohrman on Security

By almost any measure, the breadth, depth and impact of data breaches have dramatically increased during the COVID-19 pandemic. Here’s a roundup of the numbers

Patrol Robots in Singapore trigger privacy concerns

CyberSecurity Insiders

Government of Singapore has hired a bunch of patrolling robots to put the public on surveillance and see that they do not indulge in any undesirable social behavior such as hugging, kissing, and standing too close to each other, and such.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Medtronic recalls some controllers used with some of its insulin pumps over cyberattack risks

Security Affairs

Medical device maker Medtronic recalled the remote controllers used with some of its insulin pumps because of dangerous vulnerabilities.

6 Takeaways From the Changes in OWASP’s Top 10 Vulnerability Ranking

CyberSecurity Insiders

The last update to the OWASP Top 10 Vulnerability Ranking was in late 2017. Much has changed in the cyber threat landscape since then. A fresh round of updates to reflect the kind of risks and new cyber attacks organizations are dealing with appears to be in order.

How to Avoid the Pain and Cost of PCI Compliance While Optimizing Payments

Speaker: P. Andrew Sjogren, Sr. Product Marketing Manager at Very Good Security, Matt Doka, Co-Founder and CTO of Fivestars, and Steve Andrews, President & CEO of the Western Bankers Association 

In this webinar, we have a great set of panelists who will take you through how Zero Data strategies can be used as part of a well-rounded compliance and security approach, and get you to market much sooner by also allowing for payment optimization. They’ll share how to grow your business faster and minimize costs for both security and compliance

100 terabyte home NAS

Security Boulevard

So, as a nerd, let's say you need 100 terabytes of home storage. What do you do? My solution would be a commercial NAS RAID, like from Synology , QNAP , or Asustor. I'm a nerd, and I have setup my own Linux systems with RAID, but I'd rather get a commercial product.

Take Back Control of Digital Commerce

CyberSecurity Insiders

Increasing the value of payment streams might be simpler than you think. By Matthew Meehan, chief operating officer at TokenEx. It’s no surprise that digital transactions are a major focal point for those within the payments space.

More Trending

Episode 227: What’s Fueling Cyber Attacks on Agriculture ?

The Security Ledger

In this episode of the podcast (#227) we speak with Allan Liska, the head of the CSIRT at the firm Recorded Future. about the spate of attacks in recent months targeting food processing plants, grain cooperatives and other agriculture sector targets.

SecTor Episode MMXXI: Return of The Hack Lab

Security Boulevard

I’m happy to announce that arrangements have now been finalized for the Tripwire team to return for the Tripwire VERT Hack Lab at the MTCC! We will be bringing some new hardware devices as well as a new virtualized hack target.

Previously undetected FontOnLake Linux malware used in targeted attacks

Security Affairs

ESET researchers spotted a previously unknown, modular Linux malware, dubbed FontOnLake, that has been employed in targeted attacks. ESET researchers spotted a previously unknown, modular Linux malware, dubbed FontOnLake, that was employed in targeted attacks on organizations in Southeast Asia.

Amnesty International links cybersecurity firm to spyware operation

Bleeping Computer

A report by Amnesty International links an Indian cybersecurity company to an Android spyware program used to target prominent activists. [.]. Security Government

Back to the Office: Privacy and Security Solutions to Compliance Issues for 2021 and Beyond

Speaker: Mike Cramer, Director of HIPAA & Data Security at The Word & Brown Companies

Now that companies are slowly allowing employees to return to work at the office, it's time to re-evaluate your company’s posture towards privacy and security. Join Mike Cramer, Director of HIPAA & Data Security at The Word & Brown Companies, for a discussion that will focus on compliance and the types of privacy and security measures your company should be aware of, as well as tips and methods for implementing these measures.

Apple’s new CarPlay tech leads to more data security concerns

CyberSecurity Insiders

Apple Inc has announced that it intends to improve the work functions of its CarPlay feature by offering sophistication to access car climate control abilities, changing radio stations, changing seat settings, speedometer and other such crucial vehicle data in near-time. The aim behind the newly developing tech is to make the life simple of iPhone users by having the ability to remotely control the functions of their car through CarPlay.

FontOnLake malware infects Linux systems via trojanized utilities

Bleeping Computer

A newly discovered malware family has been infecting Linux systems concealed in legitimate binaries. Dubbed FontOnLake, the threat delivers backdoor and rootkit components. [.]. Security

CommitStrip ‘The Future Of Videoconferencing’

Security Boulevard

via the textual amusements of Thomas Gx , along with the Illustration talents of Etienne Issartia and superb translation skillset of Mark Nightingale - the creators of CommitStrip ! Permalink. The post CommitStrip ‘The Future Of Videoconferencing’ appeared first on Security Boulevard.

67

Customize your Windows 11 experience with these free apps

Bleeping Computer

Windows 11 is now available for devices with supported hardware features. If you've already upgraded to Windows 11 and you're looking for some great apps for your Windows 11 device, here's a list of the interesting open-source and free apps currently available in the marketplace. [.].

How Quantum Computers Can Impact Security

Trend Micro

While it might be too early to completely overhaul security protocols to prepare for quantum computing — not to mention that there is currently no post-quantum cryptographic standard existing at the moment — it would be a good idea for organizations to start planning for the future.

Risk 88

The Changing Role of the CISO

Security Boulevard

Back in the early days of networking, many companies assigned all of the responsibilities to anyone who showed any aptitude towards operating a computer. In many companies, this was an accountant or someone else who also managed sensitive financial information.

CISO 60

Security Affairs newsletter Round 335

Security Affairs

A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box. If you want to also receive for free the international press subscribe here.

Data Breach Numbers, Costs and Impacts All Rise in 2021

Security Boulevard

By almost any measure, the breadth, depth and impact of data breaches have dramatically increased during the COVID-19 pandemic. Here’s a roundup of the numbers. The post Data Breach Numbers, Costs and Impacts All Rise in 2021 appeared first on Security Boulevard. Security Bloggers Network

October is Cybersecurity Awareness Month: Here Are 4 Cybersecurity Tips to Keep Protected

Identity IQ

October is Cybersecurity Awareness Month and the theme for 2021 is “Do Your Part. BeCyberSmart.”. There’s never been a better time than right now to review the processes you have in place to avoid the latest cybersecurity risks lurking in the corners of our everyday digital lives.

DEF CON 29 ICS Village – Panel – Moderator: Jamil Jaffer, Panelists: Ernie Bio, David Etue, Jennifer DeTrani’s ‘Protecting Critical Infrastructure from Ransomware’

Security Boulevard

Our thanks to DEFCON for publishing their outstanding DEFCON 29 ICS Village videos on the organizations’ YouTube channel. Permalink.

100 terabyte home NAS

Errata Security

So, as a nerd, let's say you need 100 terabytes of home storage. What do you do? My solution would be a commercial NAS RAID, like from Synology , QNAP , or Asustor. I'm a nerd, and I have setup my own Linux systems with RAID, but I'd rather get a commercial product. When a disk fails, and a disk will always eventually fail, then I want something that will loudly beep at me and make it easy to replace the drive and repair the RAID.

Expanded Cloud Misconfiguration & IaaS Security

Trend Micro

Cloud One – Conformity has expanded its support for multi-clouds and Terraform users to add even more configuration checks so cloud projects are built on a foundation of best practice security and compliance.

Risk 60

DEF CON 29 ICS Village – Lauren Zabierek’s ‘Collaborative Cyber Defense & Enhanced Threat Intel’

Security Boulevard

Our thanks to DEFCON for publishing their outstanding DEFCON 29 ICS Village videos on the organizations’ YouTube channel. Permalink. The post DEF CON 29 ICS Village – Lauren Zabierek’s ‘Collaborative Cyber Defense & Enhanced Threat Intel’ appeared first on Security Boulevard.

ISO/IEC 27002's overall and topic-specific information security policies 0/11

Notice Bored

Clause 5.1 of the forthcoming new 3rd edition of ISO/IEC 27002 recommends two complementary types of information security policies.

Honda to Start Selling Smart Car Data

Trend Micro

The auto giant is just one of many auto companies monetizing smart car data, creating a new industry set to be worth $400 billion by 2030.

Risk 53