January, 2015

article thumbnail

19.5% of https sites trigger browser warning as they use sha-1 signed certificates

Elie

19.5% of HTTPS-enabled sites in Alexa's Top 1 Million trigger or will soon trigger a Chrome security warning because they are using the now deprecated SHA-1 signature algorithm to sign their HTTPS certificate. Soon those sites will be flagged by all major browsers as insecure.

62
article thumbnail

MSIL/Agent.PYO: Have botnet, will travel

We Live Security

ESET's researchers recently encountered a piece of malware targeting the filling of the forms belonging to the Consulate of Poland. To understand why it is first necessary to have a brief look at the application process for visas.

Malware 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Linux Ghost Vulnerability: A GHOST in the….Linux….Wires

NopSec

Our partner Qualys discovered a new vulnerability nick-named “GHOST” (called as such because it can be triggered by the GetHOST functions) and worked with most of the Linux operating system distributions to patch it as of January 27th 2015. The GHOST vulnerability is a serious weakness in the Linux glibc library. It allows attackers to remotely take complete control of the victim system without having any prior knowledge of system credentials.

DNS 52
article thumbnail

Freedom of Expression and Privacy in Labour Disputes: Amendments to Alberta’s Personal Information Protection Act in Force

Privacy and Cybersecurity Law

Alberta’s Personal Information Protection Act (PIPA) entered 2015 with a (slightly) new look. Amendments set out in Bill 3, the […].

52
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Minding the Data Protection for Individuals

Spinone

Since we live in a digital world, we are so familiar with all privacy laws and its boundaries. All the news are full of caution not to be hacked, not to put easy passwords, and so on. Definitely, security is the top priority for brand companies to defend their critical data and reputation. Yet, we are more curious about if it’s important at all for individual users to care about hackers, or any other way of their data loss.

Backups 40
article thumbnail

Blackhat: Lessons from the Michael Mann, Chris Hemsworth movie?

We Live Security

Blackhat, the hacker movie directed by Michael Mann and starring Chris Hemsworth, could spread awareness of digital threats. If it is a learning opportunity, what are the lessons?

LifeWorks

More Trending

article thumbnail

Facebook will highlight hoaxes in users' newsfeeds

We Live Security

Facebook has announced plans to crack down on spam and hoaxes in the newsfeed, with a note highlighting 'false information' when enough people flag the link as a hoax.

Media 52
article thumbnail

1800 Minecraft logins leak online

We Live Security

More than 1,800 Minecraft login details have been leaked online, German news site Heise.de has revealed.

52
article thumbnail

How can businesses save money on internet security in 2015?

We Live Security

A recent report from Piper Jaffray found that 75% of companies expected to increase their IT security spending in 2015, following a year of high-profile hacks and data breaches in 2014.

article thumbnail

Cybercrime deterrence: 6 important steps

We Live Security

Cybercrime: there's too much of it, and we need to do more to deter it. With the President of the United States now making frequent references to "doing more about cybercrime" now is a good time to look at what steps must be taken.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Lizard Squad DDoS-for-hire service hacked - users' details revealed

We Live Security

Lizard Squad failed to encrypt its database of LizardStresser's registered users - storing details of their usernames and passwords in plaintext. A schoolboy error if ever I heard one.

DDOS 52
article thumbnail

Do you really need antivirus software for Linux desktops?

We Live Security

It started, innocently enough, as a question asked in the ESET Security Forum titled "Eset Do I Really Need Antivirus On My Linux Distros?" However, the answer to that seemingly simple question on Linux antivirus is more complex than a simple yes-or-no response.

article thumbnail

Facebook privacy - why statements about copyright don't do anything

We Live Security

Facebook users around the world have reported the return of the networks longer-lasting hoaxes - a legal disclaimer which allows users to regain copyright over their images and other content. Here's why it doesn't work.

52
article thumbnail

Phish Allergy – Recognizing Phishing Messages

We Live Security

While phishing-related malware is still mostly Windows targeting, attacks that rely purely on social engineering and fake web sites might be delivered by any platform, including smartphones and tablets. The more cautious you are, the better informed you are, and the more you think before you click, the more chance you have of leaving phishing craft stranded.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Windows exploitation in 2014

We Live Security

Today, we published our research about Windows exploitation in 2014. This report contains interesting information about vulnerabilities in Microsoft Windows and Office patched over the course of the year, drive-by download attacks and mitigation techniques.

52
article thumbnail

Unpatched security hole has left millions of Moonpig customers at risk for 17 months

We Live Security

Moonpig, the online personalised card company, has been accused of a shockingly sloppy attitude to security, after apparently leaving a serious hole in its security unpatched.

Risk 52
article thumbnail

Detecting the GHOST glibc Vulnerability with Unified VRM

NopSec

In the previous blog post here, we described the GHOST Linux glibc vulnerability in details and its repercussions to the affected systems in terms of risk. NopSec Unified VRM helps identify the Linux GHOST glibc vulnerabilities in various flavors of Linux, performing authenticated scans. Furthermore, Linux authenticated scan can be performed using SSH through username / password and certificate as well.

article thumbnail

Taylor Swift hacked, but denies naked pictures will be leaked

We Live Security

Singer Taylor Swift has had her Twitter and Instagram accounts hacked, but laughed off claims that the hackers will release nude photographs of her.

Hacking 40
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Android Wi-Fi Direct bug means hackers can reboot your device

We Live Security

A vulnerability in Android's Wi-Fi Direct functionality has been uncovered by security researchers.

Mobile 40
article thumbnail

6 WhatsApp Security Tips

We Live Security

Even though WhatsApp now encrypts all of its messages and data, it pays to be secure with your chats. Here are our top WhatsApp security tips.

article thumbnail

Google reveals trio of security vulnerabilities in OS X

We Live Security

Google's Project Zero has released information on three as yet unpatched vulnerabilities in Apple's OS X operating system, reports Ars Technica.

40
article thumbnail

Canadian Privacy Compliance: Time for your Online Checkup

Privacy and Cybersecurity Law

In a previous post on online behavioural advertising (OBA), we wrote about the Office of the Privacy Commissioner’s “call to action” to stakeholders in […].

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

The Worst Passwords of 2014

Spinone

It’s time to analyze last year’s mistakes. Let’s start with redefining our privacy and security. Here is the annual list of the 25 most frequently passwords found on the Internet appearing to be the Worst Passwords, that will expose anybody to being hacked or having their identities stolen. SplashData has released its annual list of the most common passwords compiled from more than 3.3 million leaked passwords during the year of 2014.

article thumbnail

Customer Experience Case Study for Vulnerability Management

NopSec

If you haven’t read the book or watched the movie Fight Club , you may not understand this reference. “1st RULE: You do not talk about FIGHT CLUB.” One of the interesting things about working in the IT security business is that customers are very secretive about projects and generally are reluctant to publicly acknowledge any work. At NopSec we certainly can understand the need for discretion.

article thumbnail

Swiss bank data released by hackers

We Live Security

The Swiss state owned Banque Cantonale de Geneve has confirmed that hackers have released confidential customer correspondences after the bank refused to pay the ransom demanded by the attackers

Banking 40
article thumbnail

Obama to propose legislation that protects firms sharing cyberthreat data

We Live Security

President Barack Obama is planning to push legislation which would protect companies from lawsuits for sharing cyberthreat data with the government, reports the Washington Post.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

British Prime Minister wants access to messaging apps

We Live Security

British Prime Minister David Cameron has stated his belief that encrypted messaging services must have backdoor access to government agencies

article thumbnail

Hacked routers used for paid DDoS attacks

We Live Security

The rent-a-DDoS service that knocked out Xbox Live and Playstation Network is powered by thousands of hacked residential internet routers.

DDOS 40
article thumbnail

'Critical Security Updates' cancelled for 939 million Android users

We Live Security

Google has revealed that Android smartphones and tablets running versions of the software released before 4.

article thumbnail

Digital Invasion: 3 things we learned from CES 2015

We Live Security

Ever lost a kid somewhere? Not anymore if the gadget vendors have anything to say about it. Now you can digitally strap your kid to your tablet and keep track of them. Kids not running enough to stay trim? Theres an app for that that works the same way. Got high blood sugar? You can keep track of that too using the sensor-du-jour highlighted at CES 2015 in Las Vegas.

40
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.