Tue.Dec 22, 2020

article thumbnail

Eavesdropping on Phone Taps from Voice Assistants

Schneier on Security

The microphones on voice assistants are very sensitive, and can snoop on all sorts of data : In Hey Alexa what did I just type? we show that when sitting up to half a meter away, a voice assistant can still hear the taps you make on your phone, even in presence of noise. Modern voice assistants have two to seven microphones, so they can do directional localisation, just as human ears do, but with greater sensitivity.

Risk 327
article thumbnail

New Paper: “Future of the SOC: SOC People?—?Skills, Not Tiers”

Anton on Security

New Paper: “Future of the SOC: SOC People?—?Skills, Not Tiers” Back in August , we released our first Google/Chronicle?—?Deloitte Security Operations Center (SOC) paper titled “Future of the SOC: Forces shaping modern security operations” ( launch blog , paper PDF ) and promised a series of three more papers covering SOC people, process and technology.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Don't let a data breach sink your business: Here's what you need to know

Tech Republic Security

Experts offer insights about the legal and financial hits, as well as the devastating loss of reputation, your business might suffer if it is the victim of a data breach.

article thumbnail

SolarWinds Orion Hack…A Cybersecurity Wake-Up Call

CompTIA on Cybersecurity

As the dust settles on the Solar Winds Orion cyberattack, it's clear that the IT industry needs to take the next step and band together, sharing threat intelligence and cyber best practices to avoid similar hacks in the future.

Hacking 137
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

UK lawmakers propose law banning retail bots after PS5 fiasco

Tech Republic Security

The legislation would both ban the resale of goods acquired using bots and the resale of tech products above the manufacturers' price.

Retail 186
article thumbnail

Cross-Border Data Privacy and Security Concerns in the Dawn of Quantum Computing

Thales Cloud Protection & Licensing

Cross-Border Data Privacy and Security Concerns in the Dawn of Quantum Computing. sparsh. Tue, 12/22/2020 - 10:08. New EU restrictions could force companies to change data transfer practices and adopt more advanced data encryption methods. Traditionally, privacy has taken the form of a policy document created, housed, and referenced by the offices of general counsel and compliance at most organizations.

More Trending

article thumbnail

Bulletproof VPN services took down in a global police operation

Security Affairs

A joint operation conducted by law European enforcement agencies resulted in the seizure of the infrastructure of three bulletproof VPN services. A joint operation conducted by law enforcement agencies from the US, Germany, France, Switzerland, and the Netherlands resulted in the seizure of the infrastructure used by three VPN bulletproof services. VPN bulletproof services are widely adopted by cybercrime organizations to carry out malicious activities, including ransomware and malware attacks,

VPN 126
article thumbnail

How to combat future cyberattacks following the SolarWinds breach

Tech Republic Security

How can and should governments respond to and better protect themselves from serious cyberattacks from hostile nations?

article thumbnail

5 Email Threat Predictions for 2021

Dark Reading

As domains get cheaper, account takeovers get easier, and cloud computing usage expands, email-borne attacks will take advantage.

article thumbnail

How to address security fatigue and stop cybercriminals from winning

Tech Republic Security

Security fatigue and negative social influences give digital bad guys the advantage. Experts offer tips on how to solve this cybersecurity issue.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Holiday Puppy Swindle Has Consumers Howling

Threatpost

Those buying German Shepherd puppies for Bitcoin online are in for a ruff ride.

Scams 133
article thumbnail

JARM: A Solid Fingerprinting Tool for Detecting Malicious Servers

SecurityTrails

Learn what is JARM, its main benefits, and how can it help to detect malicious servers.

124
124
article thumbnail

SolarWinds Campaign Focuses Attention on 'Golden SAML' Attack Vector

Dark Reading

Adversaries that successfully execute attack can achieve persistent anytime, anywhere access to a victim network, security researchers say.

article thumbnail

Tech Giants Lend WhatsApp Support in Spyware Case Against NSO Group

Threatpost

Google, Microsoft, Cisco Systems and others want appeals court to deny immunity to Israeli company for its alleged distribution of spyware and illegal cyber-surveillance activities.

Spyware 86
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Emotet Campaign Restarts After Seven-Week Hiatus

Dark Reading

Multiple security researchers note the return of an email campaign attempting to spread the malware, which is often used to drop the Ryuk ransomware and Trickbot banking Trojan.

Banking 88
article thumbnail

Patrick Wardle on Hackers Leveraging ‘Powerful’ iOS Bugs in High-Level Attacks

Threatpost

Noted Apple security expert Patrick Wardle discusses how cybercriminals are stepping up their game in targeting Apple users with new techniques and cyberattacks.

Adware 85
article thumbnail

Law Enforcement Disrupts VPN Services Enabling Cybercrime

Dark Reading

The United States and international partners shut down three bulletproof hosting services used to facilitate criminal activity.

VPN 99
article thumbnail

Joker’s Stash Carding Site Taken Down

Threatpost

The underground payment-card data broker saw its blockchain DNS sites taken offline after an apparent law-enforcement effort.

DNS 92
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Prepare to Fight Upcoming Cyber-Threat Innovations

Dark Reading

Cybercriminals are preparing to use computing performance innovations to launch new types of attacks.

article thumbnail

How to Build Successful Security Awareness Training Programs in 2021 and Beyond

Webroot

Security awareness training is one of the most straightforward ways to improve a business’ overall resilience against cyberattacks. That is, when you get it just right. Thanks to the disruptions to “normal” work routines that COVID-19 has brought, launching a company-wide training program to teach end users how to avoid phishing scams and online risks is a big challenge.

article thumbnail

Security as Code: How Repeatable Policy-Driven Deployment Improves Security

Dark Reading

The SaC approach lets users codify and enforce a secure state of application configuration deployment that limits risk.

Risk 102
article thumbnail

DOJ Shuts Down Websites That Spoofed Regeneron and Moderna

SecureWorld News

As vaccines for COVID-19 are being distributed around the world, it appears the end of this global pandemic is on the horizon. But cybercriminals are still taking advantage of every moment they can. The U.S. Attorney's Office for the District of Maryland seized two domain names, 'modernatx.com' and ' regeneronmedicals.com,' for spoofing and imitating websites of real biotechnology companies that developed vaccines.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Update: DHS Looking Into Cyber Risk from TCL Smart TVs

The Security Ledger

The acting head of the U.S. Department of Homeland Security said the agency was assessing the cyber risk of smart TVs sold by the Chinese electronics giant TCL, following reports that the devices may give the company "back door" access to deployed sets. The post Update: DHS Looking Into Cyber Risk from TCL Smart TVs appeared first on The Security. Read the whole entry. » Related Stories Episode 195: Cyber Monday Super Deals Carry Cyber Risk TV Maker TCL Denies Back Door, Promises Better Pro

article thumbnail

Microsoft Ups Security of Azure AD, Identity

Dark Reading

A roundup of Microsoft's recent security news and updates that focus on protecting identity.

81
article thumbnail

DHS Looking Into Cyber Risk from TCL Smart TVs

The Security Ledger

The acting head of the U.S. Department of Homeland Security said the agency was assessing the cyber risk of smart TVs sold by the Chinese electronics giant TCL, following reports that the devices may give the company "back door" access to deployed sets. The post DHS Looking Into Cyber Risk from TCL Smart TVs appeared first on The Security Ledger. Related Stories Episode 195: Cyber Monday Super Deals Carry Cyber Risk TV Maker TCL Denies Back Door, Promises Better Process Security Holes Opened Bac

article thumbnail

Researchers shared the lists of victims of SolarWinds hack

Security Affairs

Security experts shared lists of organizations that were infected with the SolarWinds Sunburst backdoor after decoding the DGA mechanism. Security experts started analyzing the DGA mechanism used by threat actors behind the SolarWinds hack to control the Sunburst / Solarigate backdoor and published the list of targeted organizations. Researchers from multiple cybersecurity firms published a list that contains major companies, including Cisco , Deloitte, Intel, Mediatek, and Nvidia.

Hacking 138
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

FireEye/SolarWinds/SUNBURST Hack – What You Need to Know

Vipre

What Happened. FireEye discovered in early December that their network had been compromised, and that attackers stole some “Red Team” tools – tools that are used in penetration testing exercises with large clients; not actually zero-day threats but useful reconnaissance frameworks for attackers nonetheless. To help prevent malicious use of these tools, FireEye has released the source code of these tools on GitHub so that defenders can understand how they work and monitor for activity gener

Hacking 75
article thumbnail

Research: nearly all of your messaging apps are secure

Security Affairs

CyberNews Investigation team analyzed the 13 most popular messaging apps to see if the apps are really safe. Source: [link]. In recent research, the CyberNews Investigation team discovered that a chat service, most likely based in China, had leaked more than 130,000 extremely NSFW images, video and audio recordings of their users. While this messaging service was connected to a company that offered a “private social network,” and therefore with a small user base, we wanted to see the security fe