Mon.Aug 24, 2020

article thumbnail

Microsoft says the pandemic has changed the future of cybersecurity in these five ways

Tech Republic Security

A new report from Microsoft suggests that cloud-based technologies and Zero Trust architecture will become mainstays of businesses' cybersecurity investments going forward.

article thumbnail

GUEST ESSAY: Skeptical about buying life insurance online? Here’s how to do it — securely

The Last Watchdog

Purchasing life insurance once meant going to an insurer’s office or booking an appointment with an insurance agent. Then, in most cases, you’d have to undergo a medical examination and wait a few weeks to get approved and complete the whole process. But this scenario doesn’t seem to fit the fast-paced world we live in anymore. Today’s generation is used to getting everything done fast and easy, so life insurance providers had to get with the times and cover all customers’ needs and requirements

Insurance 156
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 5 programming languages for security admins to learn

Tech Republic Security

SecAdmins working to protect infrastructure, whether in a defensively or offensively, may find these programming languages helpful in safeguarding apps, systems, and hardware from threats.

207
207
article thumbnail

Elevation of Privilege In The Time of Cholera

Adam Shostack

The Elevation of Privilege game has had way more staying power than I would have expected. But the online experience in this time of global pandemic has left out some of the magic that made it work. So I was really skeptical when Simon Gibbs from Agile Stationery mailed me about an approach to playing remotely. But when I look at it, and I look at the logic behind it, I find myself intrigued: The player receives the (physical) deck and looks it over The player receives his hand from the Games Ma

100
100
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Extra security or extra risk? Pros and cons of password managers

Tech Republic Security

Tech consultants and journalists have their own conflicting opinions about the best way to manage access in a world full of security risks.

article thumbnail

Why Should Physical Security Professionals Learn Cybersecurity Skills?

Dark Reading

In the first of a series of columns set to be hosted exclusively on IFSEC Global, Sarb Sembhi, CISM, CTO & CISO, Virtually Informed outlines why physical security professionals should be investing in their cyber security skillset.

CISO 116

More Trending

article thumbnail

Canadian delivery company Canpar Express suffered a ransomware attack

Security Affairs

A ransomware attack hit TFI International’s four Canadian courier divisions last week, Canpar Express, ICS Courier, Loomis Express and TForce Integrated Solutions. A couple of days after the transportation and logistics TFI International company raised millions of dollars in a share offering, the news of a ransomware attack against its four Canadian courier divisions (Canpar Express, ICS Courier, Loomis Express and TForce Integrated Solutions) made the headlines.

article thumbnail

Large Ad Network Collects Private Activity Data, Reroutes Clicks

Dark Reading

A Chinese mobile advertising firm has modified code in the software development kit included in more than 1,200 apps, maliciously collecting user activity and performing ad fraud, says Snyk, a software security firm.

Mobile 137
article thumbnail

Dark web Empire Market still down after 3 days. DDoS attack or exit scam?

Security Affairs

The dark web marketplace Empire Market has been down for at least 3 days, two of the possible reasons, an exit scam or a prolonged DDoS attack. The popular dark web site Empire Market has been down for at least 60 hours, it hasn’t been down for so long since 2019. The cause is still unclear, someone blames a prolonged denial-of-service (DDoS) attack, while some users suspect an exit scam.

DDOS 114
article thumbnail

Probing Attempts on Home Routers Increase in 1H 2020

Trend Micro

The current reality of having many connected devices in the home has given rise to incidents of potential home network intrusions. In the first half of 2020, we detected over 10.6 billion suspicious connection attempts on routers' unavailable TCP ports.

IoT 98
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Iran-Linked ‘Newbie’ Hackers Spread Dharma Ransomware Via RDP Ports

Threatpost

The recent Dharma campaign by Iran-linked script kiddies shows that the ransomware is being spread not just by sophisticated, state-sponsored actors anymore.

article thumbnail

MITRE Releases 'Shield' Active Defense Framework

Dark Reading

Free knowledge base offers techniques and tactics for engaging with and better defending against network intruders.

120
120
article thumbnail

APIs Are the Next Frontier in Cybercrime

Threatpost

APIs make your systems easier to run -- and make it easier for hackers, too.

article thumbnail

Cybercriminal greeners from Iran attack companies worldwide for financial gain

Security Affairs

Group-IB has detected financially motivated attacks carried out in June by newbie threat actors from Iran. The attackers used Dharma ransomware and a mix of publicly available tools to target companies in Russia, Japan, China, and India. All the affected organizations had hosts with Internet-facing RDP and weak credentials. The hackers typically demanded a ransom between 1-5 BTC.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Google Fixes High-Severity Chrome Browser Code Execution Bug

Threatpost

The high-severity flaw, which was patched in the latest version of Google's Chrome browser, could allow code execution.

113
113
article thumbnail

SourMint SDK used by 1200 iOS apps shows malicious behavior

Security Affairs

Experts at security firm Snyk discovered a malicious behavior in an advertising SDK that is used in more than 1,200 iOS apps available in the Apple App Store. Experts at security firm Snyk discovered a malicious behavior in the advertising SDK SourMint developed by Mintegral, a China-based mobile advertising platform provider. The Mintegral SDK is advertised as a tool to help app developers and advertisers to build monetized ad-based marketing. .

article thumbnail

DeathStalker APT Targets SMBs with Cyber Espionage

Dark Reading

The hacker-for-hire group, operating since at least 2012, primarily targets financial firms.

107
107
article thumbnail

Why Endpoint Security Is Important for Protecting Your Business Against the Latest Malware

SecureWorld News

The COVID-19 pandemic has brought about a number of changes across the workplace—and some are likely to be more permanent than others. It has been suggested that the coronavirus outbreak and subsequent lockdown has created a watershed moment for remote working with employers and employees alike seeing the benefits of individuals doing their work from home.

Malware 52
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Attackers Use Unicode & HTML to Bypass Email Security Tools

Dark Reading

Researchers spot cybercriminals using new techniques to help malicious phishing emails slip past detection tools.

Phishing 101
article thumbnail

Removing Open Source Visibility Challenges for Security Operations Teams

Trend Micro

Trend Micro and Snyk, a specialist in developer-first open source security, have extended their partnership with a new joint solution designed to help security teams manage the risk of open source vulnerabilities from the moment code is introduced, without interrupting the software delivery process.

article thumbnail

New Cybersecurity Code of Practice for Installers Unveiled by BSIA

Dark Reading

The British Security Industry Association's (BSIA) cybersecurity group has released a new code of practice for installers responsible for safety and security systems.

article thumbnail

DiceKeys

Schneier on Security

DiceKeys is a physical mechanism for creating and storing a 192-bit key. The idea is that you roll a special set of twenty-five dice, put them into a plastic jig, and then use an app to convert those dice into a key. You can then use that key for a variety of purposes, and regenerate it from the dice if you need to. This week Stuart Schechter, a computer scientist at the University of California, Berkeley, is launching DiceKeys, a simple kit for physically generating a single super-secure key th

Passwords 274
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Huawei Role in UK 5G Network Set to Be Removed

Dark Reading

The Digital Secretary for the UK, Oliver Dowden, has told the House of Commons that Huawei is set to be stripped of its role in the county's 5G network due to security concerns.

68
article thumbnail

Grandoreiro campaign impersonates Spanish Agencia Tributaria

Security Affairs

Operators of Grandoreiro Latin American banking trojan have launched a new campaign using emails posing as the Agencia Tributaria in order to infect new victims. Operators behind the Grandoreiro banking trojan, which is popular in Latin America, have been using emails posing as the Agencia Tributaria to trick victims into installing the malware. The campaign began on August 11 th , 2020, when many many Spanish people receiving messages claiming to be from the Agencia Tributaria.

Banking 79
article thumbnail

Dark Reading Launches New Section on Physical Security

Dark Reading

Partnership with IFSEC enables Dark Reading to cover new areas of security and expand its audience.

87
article thumbnail

Will President Trump Pardon Edward Snowden?

SecureWorld News

Will Trump pardon Snowden? And why is this question suddenly coming up now? The issue popped up as Marcel Kolaja and more than two dozen members of the EU Parliament sent an open letter to President Trump, asking him to consider Snowden a whistleblower who deserves protection instead of a criminal who deserves prosecution. I am sending an open letter signed by 26 Members of the European Parliament from 4 political groups to @realDonaldTrump supporting a pardon to @Snowden.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Average Cost of a Data Breach in 2020: $3.86M

Dark Reading

When companies defend themselves against cyberattacks, time is money.

article thumbnail

CISA Releases 5G Security Guidelines

Dark Reading

The new document defines lines of effort for developing security for the growing 5G network.

86