Thu.Mar 18, 2021

article thumbnail

Exploiting Spectre Over the Internet

Schneier on Security

Google has demonstrated exploiting the Spectre CPU attack remotely over the web: Today, we’re sharing proof-of-concept (PoC) code that confirms the practicality of Spectre exploits against JavaScript engines. We use Google Chrome to demonstrate our attack, but these issues are not specific to Chrome, and we expect that other modern browsers are similarly vulnerable to this exploitation vector.

Internet 265
article thumbnail

How cybercriminals are targeting US taxpayers as tax season approaches

Tech Republic Security

The latest scams use phishing emails to deliver remote access trojans to control a victim's computer and steal sensitive data, says Cybereason.

Scams 173
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How and why deepfake videos work — and what is at risk

CSO Magazine

Editor's note: This article, originally published in July, 2018, has been updated to more accurately reflect recent trends. Deepfake definition. Deepfakes are fake videos or audio recordings that look and sound just like the real thing. Once the bailiwick of Hollywood special effects studios and intelligence agencies producing propaganda, like the CIA or GCHQ's JTRIG directorate, today anyone can download deepfake software and create convincing fake videos in their spare time.

Risk 145
article thumbnail

Beware Android trojan posing as Clubhouse app

We Live Security

The malware can grab login credentials for more than 450 apps and bypass SMS-based two-factor authentication. The post Beware Android trojan posing as Clubhouse app appeared first on WeLiveSecurity.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

FBI: Over $4.2 billion officially lost to cybercrime in 2020

Bleeping Computer

The Federal Bureau of Investigation has published its annual report on cybercrime affecting victims in the U.S., noting a record number of complaints and financial losses in 2020 compared to the previous year. [.].

article thumbnail

Vodafone faces $9.7m data protection penalty in Spain

CyberSecurity Insiders

Spanish Data Protection Agency aka Agencia Espanola De Protection De Datos (AEPD) has penalized Vodafone Spain for failing to protect the data of its customers and for indulging in fraudulent telemarketing tactics. The amount pronounced by AEPD against Vodafone is $9.72m is highest fine ever witnessed in a country against a multinational firm. The telecommunication company will face a collective penalty because of 4 separate discrepancies in following rules – Two fines counting to $7.16m f

More Trending

article thumbnail

Google Cloud announces $300,000+ prize money to winners

CyberSecurity Insiders

Google has announced prize money of $313,337 to be distributed among six security researchers who won the bug bounty program of 2020 Google Cloud Platform (GCP). Thus, with the latest announcement, the tech giant has kept its word for rewarding security researchers who found exceptional vulnerabilities on its GCP. The first among the recipients to receive the money will be a researcher named Ezequiel Pereira, a University Student and security enthusiast who found susceptibility in the remote exe

article thumbnail

NFTs explained: daylight robbery on the blockchain

Malwarebytes

Did you hear about the JPG file that sold for $69 million? I’ll give you some more detail, the JPG file is a piece of digital art made by Mike Winkelmann, the artist known as Beeple. The file was sold on Thursday by Christie’s in an online auction for $69.3 million. This set a record for artwork that exists only digitally. Which for many people raised the question: what’s to stop me from copying it and becoming an owner as well?

article thumbnail

5 tips for a successful penetration testing program

CSO Magazine

With the rise in enterprise data breaches and ransomware cyberattacks making headlines, conducting thorough security assessments has become an inevitable part of running a business operation that handles customer data. The data protection requirements brought forth by compliance bills , both in the US and around the world have further put onus on organizations to improve security controls and harden the systems handling proprietary information.

article thumbnail

Google Reveals What Personal Data Chrome and It's Apps Collect On You

The Hacker News

Privacy-focused search engine DuckDuckGo called out rival Google for "spying" on users after the search giant updated its flagship app to spell out the exact kinds of information it collects for personalization and marketing purposes. "After months of stalling, Google finally revealed how much personal data they collect in Chrome and the Google app.

Marketing 140
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Mysterious bug is deleting Microsoft Teams, SharePoint files

Bleeping Computer

Microsoft SharePoint and Microsoft Teams users report files are missing or moved to the Recycle Bin after the recent Azure Active Directory outage this week. [.].

145
145
article thumbnail

Mother charged with using deepfakes to shame daughter’s cheerleading rivals

Malwarebytes

A Pennsylvania woman reportedly sent doctored photos and videos of her daughter’s cheerleader rivals to their coaches, in an attempt to embarrass them and get them kicked off the team. She’s alleged to have used deepfake technology to create photo and video depictions of the girls naked, drinking, and vaping, law enforcement officials said.

Media 138
article thumbnail

FBI: Cybercrime losses topped US$4.2 billion in 2020

We Live Security

The Bureau received over 28,000 reports of COVID-19-themed scams last year. The post FBI: Cybercrime losses topped US$4.2 billion in 2020 appeared first on WeLiveSecurity.

article thumbnail

The Internet of Things Is Everywhere. Are You Secure?

Security Boulevard

From smart homes that enable you to control your thermostat from a distance to sensors on oil rigs that help predict maintenance to autonomous vehicles to GPS sensors implanted in the horns of endangered black rhinos , the internet of things is all around you. The internet of things (IoT) describes the network of interconnected devices embedded with sensors, software, or other technology that exchange data with other devices and systems over the Internet. .

Internet 136
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

CISA releases new SolarWinds malicious activity detection tool

Bleeping Computer

The Cybersecurity and Infrastructure Security Agency (CISA) has released a new tool to detect post-compromise malicious activity associated with the SolarWinds hackers in on-premises enterprise environments. [.].

article thumbnail

How to Successfully Pursue a Career in Malware Analysis

The Hacker News

Are you looking to becoming a malware analyst? Then continue reading to discover how to gain the training you need and start a career in malware analysis career.Did you know that new malware is released every seven seconds? As more and more systems become reliant on the internet, the proliferation of malware becomes increasingly destructive.

Malware 136
article thumbnail

FBI IC3 2020: Cybercrime Causes $4.1 Billion in Losses

Digital Shadows

On March 17th, the Federal Bureau of Investigation (FBI) published its 2020 Internet Crimes Complaint Center (IC3) report. This report. The post FBI IC3 2020: Cybercrime Causes $4.1 Billion in Losses first appeared on Digital Shadows.

article thumbnail

Microsoft warns of more printing issues caused by March updates

Bleeping Computer

Microsoft says that customers might experience additional printing issues besides blue screen crashes after installing Windows 10 updates released earlier this month. [.].

134
134
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

5 tips for a successful penetration testing program

CSO Magazine

With the rise in enterprise data breaches and ransomware cyberattacks making headlines, conducting thorough security assessments has become an inevitable part of running a business operation that handles customer data. The data protection requirements brought forth by compliance bills , both in the US and around the world have further put onus on organizations to improve security controls and harden the systems handling proprietary information.

article thumbnail

Security Researcher Hides ZIP, MP3 Files Inside PNG Files on Twitter

Threatpost

The newly discovered steganography method could be exploited by threat actors to obscure nefarious activity inside photos hosted on the social-media platform.

Media 135
article thumbnail

Convuster: macOS adware now in Rust

SecureList

Introduction. Traditionally, most malicious objects detected on the macOS platform are adware: besides the already familiar Shlayer family , the TOP 10 includes Bnodlero, Cimpli, Adload and Pirrit adware. As a rule, most tend to be written in C, Objective-C or Swift. Recently, however, cybercriminals have been paying increased attention to new programming languages, seemingly in the hope that such code will be more opaque to virus analysts who have little or no experience with the newer language

Adware 127
article thumbnail

64 times worse than ransomware? FBI statistics underline the horrific cost of business email compromise

The State of Security

The FBI is reminding organisations of the serious threat posed by business email compromise (BEC) scams, declaring that it caused over $1.8 billion worth of losses to businesses last year. The newly-published annual cybercrime report from the FBI’s Internet Crime Complaint Center (IC3) reveals that it had received a record number of complaints and claims […]… Read More.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Data of 21 Million VPN users breached

Quick Heal Antivirus

VPN is a prominent tool for enhanced online life. VPN consists of a tunnel that your encrypted data. The post Data of 21 Million VPN users breached appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

VPN 125
article thumbnail

Chinese nation state hackers linked to Finnish Parliament hack

Bleeping Computer

Chinese nation-state hackers have been linked to an attack on the Parliament of Finland that took place last year and led to the compromise of some parliament email accounts. [.].

Hacking 122
article thumbnail

Expert found a 1-Click RCE in the TikTok App for Android

Security Affairs

Egyptian security researcher Sayed Abdelhafiz discovered multiple bugs in TikTok Android Application that can be chained to achieve Remote code execution. Egyptian security researcher Sayed Abdelhafiz discovered multiple vulnerabilities in the TikTok Android Application that can be chained to achieve Remote code execution. “While testing TikTok for Android Application, I identified multiple bugs that can be chained to achieve Remote code execution that can be triaged through multiple dange

Hacking 122
article thumbnail

TrickBot Operators Now Use ‘Traffic Violations’ to Spear-Phish Unsuspecting Victims

Hot for Security

The Cybersecurity & Infrastructure Security Agency (CISA) and the FBI have released a Joint Cybersecurity Advisory on TrickBot warning that a sophisticated group of cyber actors are sending phishing emails claiming to contain proof of traffic violations to lure victims into downloading the insidious malware. TrickBot is a modular, multi-stage Trojan that packs a full array of tools to wage cyber-attacks.

Phishing 119
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

When are Privacy Violations Sufficient to Sue?

Security Boulevard

In order to get into court – particularly federal court – a party has to demonstrate that they have “standing” to sue — that is, that they have personally suffered some kind of concrete and demonstrable harm as a result of someone else’s conduct that gives rise to a right to seek damages or injunctive. The post When are Privacy Violations Sufficient to Sue?

article thumbnail

Digital Guardian Gives Customers Control Over Collaboration Software

Digital Guardian

Four new policy packs can help customers better control file movement across popular collaboration software like Microsoft Teams, Slack, Zoom, and Skype.

Software 126
article thumbnail

The Microsoft Breach Helps Us Explain Our Risk-Based Approach to Cybersecurity

Security Boulevard

Cybersecurity Programs Benefit from a Risk-Based Mindset Earlier in the year, we released a series of blog posts about understanding the relationship between cybersecurity and insurance. Covid-19 was the best biological example for the necessity to prepare for low probability but high impact events. Our blog series used this parallel to draw attention to the.

Risk 117
article thumbnail

Facebook's ‘Red Team X’ Hunts Bugs Outside the Social Network

WIRED Threat Level

The internal hacking team has spent the last year looking for vulnerabilities in the products the company uses, which could in turn make the whole internet safer.

Internet 117
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.