Tue.Sep 28, 2021

article thumbnail

Apple AirTag Bug Enables ‘Good Samaritan’ Attack

Krebs on Security

The new $30 AirTag tracking device from Apple has a feature that allows anyone who finds one of these tiny location beacons to scan it with a mobile phone and discover its owner’s phone number if the AirTag has been set to lost mode. But according to new research, this same feature can be abused to redirect the Good Samaritan to an iCloud phishing page — or to any other malicious website.

Mobile 310
article thumbnail

Check What Information Your Browser Leaks

Schneier on Security

These two sites tell you what sorts of information you’re leaking from your browser.

287
287
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

3 tips to protect your users against credential phishing attacks

Tech Republic Security

A new phishing campaign spotted by Armorblox tried to steal user credentials by spoofing a message notification from a company that provides email encryption.

Phishing 184
article thumbnail

New Windows 11 install script bypasses TPM, system requirements

Bleeping Computer

A new script allows you to install Windows 11 on devices with incompatible hardware, such as missing TPM 2.0, incompatible CPUs, or the lack of Secure Boot. Even better, the script also works on virtual machines, allowing you to upgrade to the latest Windows Insider build. [.].

145
145
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

New Chrome feature can tell sites and webapps when you're idle

Tech Republic Security

The new Idle Detection API gives Chrome the ability to register whether a user is active, and has drawn concerns from privacy advocates. Here's how to disable it.

158
158
article thumbnail

Google wants you to follow these cybersecurity basics

CyberSecurity Insiders

As the world is turning completely digital, the need to be connected to the internet has become a necessity to everyone, rather than just a trend. However, not all seem to be merry for staying connected to the web 24×7. As hackers and cyber crooks are always on a prowl of vulnerable of those who can be targeted easily by email scams, messages, malware or phishing attacks.

More Trending

article thumbnail

How to choose an endpoint protection suite

CSO Magazine

Studies show that CSO readers are most likely to know that endpoint protection is the modern iteration of the antivirus tools of previous generations. Okay, I made that first part up, but the second part is, of course, true. Antivirus, more appropriately known as antimalware, has matured significantly since the days of dedicated antivirus servers, daily signature updates, and manually managed policies.

Antivirus 124
article thumbnail

Don't let cybercriminals ruin your merger or acquisition

Tech Republic Security

Companies are vulnerable to potential cyberthreats during mergers and acquisitions; learn from an expert why and how to reduce security risks during the transition.

Risk 131
article thumbnail

What The Worst Attacks Of 2021 Can Teach Us On The Future Of Ransomware

IT Security Central

Despite the steady drumbeat of hacks that are reported on a nearly weekly basis, it is safe to say that cybersecurity is still far from a “top of mind issue” for most people. Massive data breaches like Equifax, Marriott, and many, many more are chalked up to being yet another part of the modern life. […].

article thumbnail

Deepwatch announces managed detection and response solution for SMBs

Tech Republic Security

The fully-automated security operations center solution comes with 24/7 support and sets up in less than an hour.

143
143
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

How to secure cloud infrastructure across the development lifecycle

InfoWorld on Security

Cloud computing represents the most profound IT shift in decades, helping organizations across industries to transform every aspect of how they do business. But the cloud turned security on its head, creating entire new categories of risks and challenges that are straining security teams beyond their capacity. Organizations face a hard choice: Slow the pace of innovation in an increasingly competitive environment to allow security teams to keep up, or hire more security engineers at a time of bi

article thumbnail

OWASP updates top 10 list with decades old security risk in #1 spot

Tech Republic Security

2021 list shows how far application security has come and how much work is left to do.

Risk 154
article thumbnail

FinFisher malware hijacks Windows Boot Manager with UEFI bootkit

Bleeping Computer

Commercially developed FinFisher malware now can infect Windows devices using a UEFI bootkit that it injects in the Windows Boot Manager. [.].

Malware 132
article thumbnail

Simply Explained: Ransomware, Phishing, Zero Trust

Cisco Security

Cybersecurity affects all of us, but the industry uses complicated terms that make it hard to understand. For example, what is ransomware and how does it work? What does phishing mean? Or zero trust? Let’s discuss these cyber concepts in simple, everyday language. And let’s cover what the good guys are doing to make our online lives safer. What’s ransomware?

Phishing 116
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Working exploit released for VMware vCenter CVE-2021-22005 bug

Bleeping Computer

A complete exploit for the remote code execution vulnerability in VMware vCenter tracked as CVE-2021-22005 is now widely available, and threat actors are taking advantage of it. [.].

106
106
article thumbnail

Unquestionably Fascist: American GOP Today Sounds Like 1932 Mussolini

Security Boulevard

I’ve warned about this here since at least 2008. And if you look back at my tweets a decade after that in 2016 I’m not mincing any words. That crazy-sounding excerpt of text I’m tweeting out, in case it’s not clear, is literally a page from Mussolini’s infamous 1932 “The Doctrine of Fascism” (technically ghost … Continue reading Unquestionably Fascist: American GOP Today Sounds Like 1932 Mussolini ?.

110
110
article thumbnail

NSA, CISA share VPN security tips to defend against hackers (edited)

Bleeping Computer

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) have released guidance for hardening the security of virtual private network (VPN) solutions. [.].

VPN 112
article thumbnail

Facebook, Instagram Threaten Kids’ Digital Privacy

Security Boulevard

Social media has changed how we communicate, but it has also transformed the meaning of digital privacy. Because of social media, internet users today have more ways than ever to present themselves online. But at the same time, their personal information is almost constantly tracked, collected, packaged and sold by social media companies. Earlier this.

Media 109
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

A Custom Malware Is Used by Nobelium APT to Backdoor Windows Domains

Heimadal Security

The Nobelium hacking group is using a new malware to deploy additional payloads and steal sensitive info from the Active Directory Federation Services (AD FS) servers. Cozy Bear is a Cybercriminal organization suspected to be linked to one or more Russian intelligence services. It is classified as an advanced persistent threat APT29 by the US […].

Malware 110
article thumbnail

Domain Risk Management – Discovering the threats

Security Boulevard

Part 2 of our 3-part blog series outlining the practice of effective and scalable domain risk management - Part 2: Tools. The post Domain Risk Management – Discovering the threats appeared first on Security Boulevard.

Risk 109
article thumbnail

CISA's Cloud Security Technical Reference Architecture: Where it succeeds and where it falls short

CSO Magazine

President Biden’s Executive Order 14028 “Improving the Nation’s Cybersecurity” directed the Cybersecurity and Infrastructure Security Agency (CISA) to create a cloud-security technical reference architecture (RA ) in coordination with the Office of Management and Budget (OMB) and the Federal Risk and Authorization Management Program ( FedRAMP ). The intent of the RA is to provide recommendations for cloud migration and data protection for agencies as the federal government continues its Cloud Sm

article thumbnail

Paving the Way: Inspiring Women in Payments - A Podcast Featuring Agnes Ng

PCI perspectives

Sometimes, being a woman brings in a more human touch when navigating through challenging security issues. This sensitivity to customer concerns is exactly what has helped Agnes Ng achieve success as a female entrepreneur in the Singapore payment industry. In this edition of our podcast, Agnes explains that despite a lack of women taking technology courses as part of their education in Singapore, she believes that more doors will be opened to women in technology as part of the government’s initi

Education 109
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Serious Security: Let’s Encrypt gets ready to go it alone (in a good way!)

Naked Security

Let's Encrypt is set to become a mainstream, self-certifying web certificate authority - here's why it took so many years.

article thumbnail

Bandwidth.com Became the Victim of DDoS Attacks

Heimadal Security

Bandwidth.com is a VoIP services company that is providing voice telephony over the Internet to businesses and resellers. VoIP (Voice over Internet Protocol) is a technology that turns a human’s voice into an electrical signal, enabling calls from a computer, a VoIP phone, or other data-driven devices. To put it another way, VoIP represents phone services […].

DDOS 106
article thumbnail

Control Across Your Hybrid Environments Using Cisco Secure Workload 3.6

Cisco Security

Business needs are driving significant changes in today’s datacenters. Enterprises are not only migrating applications to the cloud from on-premises data centers, but they are developing multicloud strategies that take advantage of availability, global footprint, and cost saving structures. In fact, IDC has predicted that more than 90% of IT organizations will commit to multicloud architectures by 2022.

Firewall 105
article thumbnail

Phone screenshots accidentally leaked online by stalkerware-type company

Malwarebytes

pcTattleTale hasn’t been very careful about securing the screenshots it sneakily takes from its victims’ phones. pcTattleTale markets itself as “employee and child monitoring software” that is undetectable by the device user, but it can also be used to spy on spouses and partners. It allows its clients to view real-time screenshots of phones of people they’re monitoring by visiting a certain URL.

Marketing 105
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

New BloodyStealer Trojan Steals Gamers' Epic Games and Steam Accounts

The Hacker News

A new advanced trojan sold on Russian-speaking underground forums comes with capabilities to steal users' accounts on popular online video game distribution services, including Steam, Epic Games Store, and EA Origin, underscoring a growing threat to the lucrative gaming market.

article thumbnail

How Fraudsters Blur the Line between Suspicious and Legitimate Traffic

Security Boulevard

Two of the biggest challenges we face as a web security vendor is gaining a good understanding of the Internet ecosystem and finding the right balance between false positives (when the system incorrectly classifies a legitimate session as suspicious) and false negatives (when the system incorrectly classifies suspicious traffic as legitimate). Fraudsters are incredibly innovative when […].

Internet 103
article thumbnail

FormBook Adds Latest Office 365 0-Day Vulnerability (CVE-2021-40444) to Its Arsenal

Trend Micro

Trend Micro detected a new campaign using a recent version of the known FormBook infostealer. Newer FormBook variants used the recent Office 365 zero-day vulnerability, CVE-2021-40444.

104
104
article thumbnail

BloodyStealer Malware Wreaks Havoc on the Gaming Platforms

Heimadal Security

Malware attacks go on with one more hit. This time, targets are gaming platforms. This new malware is for sale on dark web forums now. Cybercriminals make use of the so-called BloodyStealer malware and perform their malicious actions by engaging in stealing accounts for gaming platforms such as EA Origin, Epic Games Store, Steam, and […]. The post BloodyStealer Malware Wreaks Havoc on the Gaming Platforms appeared first on Heimdal Security Blog.

Malware 102
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.