Mon.Dec 07, 2020

article thumbnail

Hiding Malware in Social Media Buttons

Schneier on Security

Clever tactic : This new malware was discovered by researchers at Dutch cyber-security company Sansec that focuses on defending e-commerce websites from digital skimming (also known as Magecart) attacks. The payment skimmer malware pulls its sleight of hand trick with the help of a double payload structure where the source code of the skimmer script that steals customers’ credit cards will be concealed in a social sharing icon loaded as an HTML ‘svg’ element with a ‘path&

Media 275
article thumbnail

Top 5 reasons not to use SMS for multi-factor authentication

Tech Republic Security

Using SMS as an additional means to authenticate your password is better than nothing, but it's not the most reliable. Tom Merritt lists five reasons why SMS should not be used for MFA.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

We Need a Discipline of Cybersecurity Public Health

Adam Shostack

A few weeks back, I mentioned the Distinguished Lecture I gave at Ruhr University Bochum. I’m happy to say that the video is now online, and I also want to share the references.

article thumbnail

How cybercrime will cost the world $1 trillion this year

Tech Republic Security

Including both financial losses and cybersecurity spending, the $1 trillion in costs will represent a 50% increase over 2018, says McAfee.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

A ransomware attack hit the Greater Baltimore Medical Center

Security Affairs

The Greater Baltimore Medical Center, Maryland, was hit by a ransomware attack that impacted computer systems and operations. The Greater Baltimore Medical Center in Towson, Maryland was a victim of a ransomware attack that impacted its IT systems. At the time of this writing, it is not clear the family of ransomware that hit the healthcare providers, it only confirmed that the security breach forced some procedures scheduled for Monday to be canceled. “On the morning of Sunday, December 6

article thumbnail

Experian predicts 5 key data breach targets for 2021

Tech Republic Security

The pandemic warfare will shift to vaccine supply chains, home networks, and data from telemedicine visits in the new year.

More Trending

article thumbnail

Multi-factor authentication: 5 reasons not to use SMS

Tech Republic Security

Using SMS as an additional means to authenticate your password is better than nothing, but it's not the most reliable. Tom Merritt lists five reasons why SMS should not be used for MFA.

article thumbnail

Takeaways from Trend Micro's 2021 Security Predictions

Trend Micro

The onset of the new decade has challenged the cybersecurity sector — and industries as a whole. What will change? We identify some of the drivers that will underpin organizations’ priorities in 2021.

article thumbnail

Malwarebytes: Schools still struggling with connectivity and using last year's antivirus software

Tech Republic Security

About half of IT decision makers in a new survey say they have not added any cybersecurity training for teachers and students since remote learning started.

Antivirus 127
article thumbnail

Nature vs. Nurture Tip 2: Scan Frequently and Consistently

Veracode Security

In our first blog in this series, Nature vs. Nurture Tip 1: Use??SAST With DAST , we discussed how this year???s State of Software Security (SOSS) report looked at how both ???nature??? and ???nurture??? contribute to the time it takes to close out a security flaw. We found that the ???nature??? of applications ??? like size or age ??? can have a negative effect on how long it takes to remediate a security flaw.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

The NSA Warns That Russia Is Attacking Remote Work Platforms

WIRED Threat Level

A vulnerability in VMWare has prompted a warning that companies—and government agencies—need to patch as soon as possible.

article thumbnail

Russia-linked hackers actively exploit CVE-2020-4006 VMware flaw, NSA warns

Security Affairs

The National Security Agency (NSA) warns that Russia-linked hackers are exploiting a recently patched VMware flaw in a cyberespionage campaign. The US National Security Agency has published a security alert warning that Russian state-sponsored hackers are exploiting the recently patched CVE-2020-4006 VMware flaw to steal sensitive information from their targets.

article thumbnail

Critical Flaws in Millions of IoT Devices May Never Get Fixed

WIRED Threat Level

Amnesia:33 is the latest in a long line of vulnerabilities that affect countless embedded devices.

IoT 123
article thumbnail

Phishing Campaign Targets 200M Microsoft 365 Accounts

Dark Reading

A well-organized email spoofing campaign has been seen targeting financial services, insurance, healthcare, manufacturing, utilities, and telecom.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Rana Android Malware Updates Allow WhatsApp, Telegram IM Snooping

Threatpost

The developers behind the Android malware have a new variant that spies on instant messages in WhatsApp, Telegram, Skype and more.

Malware 103
article thumbnail

Chart: Cyberthreats Follow Workers Home

Dark Reading

The COVID-19 crisis has raised the level of cyber-risk significantly over previous Dark Reading Strategic Security surveys.

article thumbnail

Google patches four high?severity flaws in Chrome

We Live Security

The new release patches a total of eight vulnerabilities affecting the desktop versions of the popular browser. The post Google patches four high‑severity flaws in Chrome appeared first on WeLiveSecurity.

83
article thumbnail

Europol Warns COVID-19 Vaccine Rollout Vulnerable to Fraud, Theft

Threatpost

With the promise of a widely available COVID-19 vaccine on the horizon, Europol, the European Union’s law-enforcement agency, has issued a warning about the rise of vaccine-related Dark Web activity. The agency joins a chorus of security professionals that have concerns about widespread attacks on the COVID-19 vaccine rollout. The warning comes after Europol discovered […].

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

How to use an SSH config file on macOS for easier connections to your data center servers

Tech Republic Security

Jack Wallen shows you how to make SSH connections even easier from your macOS machine.

105
105
article thumbnail

NSA Warns: Patched VMware Bug Under Active Attack

Threatpost

Feds are warning that adversaries are exploiting a weeks-old bug in VMware’s Workspace One Access and VMware Identity Manager products.

95
article thumbnail

Avoiding a 1984-Like Future

Dark Reading

We must not simply trust technology to be safe. Technology providers and users should agree on severe security practices, and these standards must be implemented wherever data goes.

article thumbnail

What Is Zero-Party Data and Why Is It Essential for Marketers Today?

GlobalSign

The data landscape now is completely shaken as browsers have made third-party cookies obsolete. Apple, too, has given its users the option to opt-out of sharing IDFDs or IDs for advertising. So, where can CMOs and CIOs get data to make campaign decisions?

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

As DNA Synthesis Evolves, Cyber-Physical Attack Worries Grow

Dark Reading

Israeli scientists warn that cybersecurity around DNA synthesis devices needs improvement -- or else the industry risks harmful DNA produced through cyber means.

Risk 116
article thumbnail

‘Free’ Cyberpunk 2077 Downloads Lead to Data Harvesting

Threatpost

The hotly anticipated game -- featuring a digital Keanu Reeves as a major character -- is being used as a lure for cyberattacks.

Scams 91
article thumbnail

DoppelPaymer ransomware gang hit Foxconn electronics giant

Security Affairs

Electronics contract manufacturer Foxconn is the last victim of the DoppelPaymer ransomware operators that hit a Mexican facility. DoppelPaymer ransomware operators infected the systems at a Mexican facility of Foxconn electronics giant over the Thanksgiving weekend. The plan is located in Ciudad Juárez, Chihuahua, Mexico. The hackers also claim to have stolen unencrypted files before encrypting the targeted systems.

article thumbnail

Improving open source security during the Google summer internship program

Google Security

Posted by the Information Security Engineering team at Google Every summer, Google’s Information Security Engineering (ISE) team hosts a number of interns who work on impactful projects to help improve security at Google. This year was no different—well, actually it was a little bit different because internships went virtual. But our dedication to security was still front and center as our intern team worked on improvements in open source software.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Cisco fixes exploitable RCEs in Cisco Security Manager

Security Affairs

Cisco released security updates to fix multiple pre-authentication RCE flaws with public exploits affecting Cisco Security Manager. Cisco has released security updates to address multiple pre-authentication remote code execution vulnerabilities with public exploits affecting Cisco Security Manager (CSM). CSM provides a comprehensive management solution for CISCO devices, including intrusion prevention systems and firewalls (i.e.

article thumbnail

OpenTitan at One Year: the Open Source Journey to Secure Silicon

Google Security

Posted by Dominic Rizzo, OpenTitan Lead, Google During the past year, OpenTitan has grown tremendously as an open source project and is on track to provide transparent, trustworthy, and cost-free security to the broader silicon ecosystem. OpenTitan, the industry’s first open source silicon root of trust, has rapidly increased engineering contributions, added critical new partners, selected our first tapeout target, and published a comprehensive logical security model for the OpenTitan silicon, a

article thumbnail

Healthcare in Crisis: Diagnosing Cybersecurity Shortcomings in Unprecedented Times

Threatpost

In the early fog of the COVID-19 pandemic, cybersecurity took a back seat to keeping patients alive. Lost in the chaos was IT security.

article thumbnail

Name That Toon: Winter Forecast

Dark Reading

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

78
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.