Sat.Dec 30, 2017 - Fri.Jan 05, 2018

article thumbnail

2018 Cause Awareness & Giving Day Calendar

Troy Hunt

Cause awareness and giving days can be very powerful themes upon which to launch online fundraising campaigns. The real-time, in-the-moment nature of cause awareness and giving days can inspire donors to give provided that your nonprofit knows how to promote the days effectively. The first step is to decide which days to build a campaign upon and add them to your 2018 editorial calendar.

Internet 276
article thumbnail

Spectre and Meltdown Attacks Against Microprocessors

Schneier on Security

The security of pretty much every computer on the planet has just gotten a lot worse, and the only real solution -- which of course is not a solution -- is to throw them all away and buy new ones. On Wednesday, researchers just announced a series of major security vulnerabilities in the microprocessors at the heart of the world's computers for the past 15-20 years.

Firmware 201
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Pro-Russia Twitter Trolls Take Aim at Special Counsel Robert Mueller

WIRED Threat Level

As special counsel Robert Mueller's Russia investigation heats up, a network of pro-Russia trolls have rushed to discredit him.

112
112
article thumbnail

Why 2018 Will Be the Trust Turning Point for the Digital Economy

Thales Cloud Protection & Licensing

We are in the midst of a digital revolution impacting every aspect of our everyday lives. At the center of the revolution is data, which is available in more forms, volume, depth and complexity since the beginnings of the computer revolution. Earlier this year , IDC predicted the world’s volume of data would expand to 163 zettabytes by 2025 – a tenfold rise in the total.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

2017 Retrospective

Troy Hunt

I look back a lot more than what I suspect people realise. Not in a reminiscent way, but rather because I find it helps me put things in perspective. A lot of people like to set personal goals or objectives so that there's something specific they're setting out to achieve but for me personally, I just want to see progress. I want to be able to do these retrospectives - not just on Jan 1 but every day - and say to myself "yeah, I'm happy with how far I've moved ahead" And believe me when

Hacking 146
article thumbnail

Spectre and Meltdown Attacks

Schneier on Security

After a week or so of rumors, everyone is now reporting about the Spectre and Meltdown attacks against pretty much every modern processor out there. These are side-channel attacks where one process can spy on other processes. They affect computers where an untrusted browser window can execute code, phones that have multiple apps running at the same time, and cloud computing networks that run lots of different processes at once.

LifeWorks

More Trending

article thumbnail

Counting down, Getting Ready: GDPR in a Multi-Cloud World

Thales Cloud Protection & Licensing

( Originally posted to CenturyLink’s blog on November 10 ). To help save time and money, a growing number of enterprises are storing sensitive customer data in the public cloud. Increasingly, they’re also leveraging multiple cloud providers. According to IDC, nearly 80% of IT organizations currently deploy multi-cloud or plan to implement multi-cloud environments within 12 months.

article thumbnail

Weekly Update 68

Troy Hunt

It's 2018! All new year and already someone has gone and broken our computer things courtesy of the Meltdown and Spectre bugs. I only touch briefly on them in this week's update and I refer people to my Twitter timeline for good coverage I've shared. However, there's one resource which stands out above the others and it's this thread from Graham Sutherland.

article thumbnail

Security Vulnerabilities in Star Wars

Schneier on Security

A fun video describing some of the many Empire security vulnerabilities in the first Star Wars movie. Happy New Year, everyone.

190
190
article thumbnail

Voter ID Laws Really Do Discriminate, a New Study Shows

WIRED Threat Level

Critics of voter ID laws have had a difficult time proving their menace in court. A new algorithm could change that.

112
112
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Forever 21 Found Malware and Encryption Disabled on its PoS Devices

Dark Reading

The retailer found signs of unauthorized access and malware installed on point-of-sale devices during an investigation into last year's data breach.

Malware 79
article thumbnail

2018 IT Security Outlook: Attacks and Threats Get More Sophisticated

eSecurity Planet

2018 will bring more high-profile data breaches, with attacks and threats getting increasingly sophisticated. We outline 10 security trends to watch.

article thumbnail

New Book Coming in September: "Click Here to Kill Everybody"

Schneier on Security

My next book is still on track for a September 2018 publication. Norton is still the publisher. The title is now Click Here to Kill Everybody: Peril and Promise on a Hyperconnected Planet , which I generally refer to as CH2KE. The table of contents has changed since I last blogged about this, and it now looks like this: Introduction: Everything is Becoming a Computer Part 1: The Trends 1.

Internet 181
article thumbnail

Critical "Meltdown" and "Spectre" Flaws Breaks Basic Security for Intel, AMD, ARM Computers

WIRED Threat Level

Still-unidentified researchers have found a critical chip flaw that developers are scrambling to patch in millions of computers.

111
111
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

The Cybersecurity 'Upside Down'

Dark Reading

There is no stranger thing than being breached. Here are a few ways to avoid the horror.

article thumbnail

Intel In Security Hot Seat Over Reported CPU Design Flaw

Threatpost

Intel is grappling with what many are calling a processor design flaw impacting CPUs used in Linux, Windows and some macOS systems.

article thumbnail

Detecting Adblocker Blockers

Schneier on Security

Interesting research on the prevalence of adblock blockers: " Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis ": Abstract : Millions of people use adblockers to remove intrusive and malicious ads as well as protect themselves against tracking and pervasive surveillance. Online publishers consider adblockers a major threat to the ad-powered "free" Web.

article thumbnail

Get a Password Manager. Here's Where to Start

WIRED Threat Level

How important are password managers? Even their flaws double as reminders why you need one.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Critical Microprocessor Flaws Affect Nearly Every Machine

Dark Reading

Researchers release details of 'Meltdown' and 'Spectre' attacks that allow programs to steal sensitive data.

63
article thumbnail

Google Play Removes 22 Malicious ‘LightsOut’ Apps From Marketplace

Threatpost

Google removed 22 malicious adware apps ranging from flashlights, call recorders to wifi signal boosters that together were downloaded up to 7.5 million times from the Google Play marketplace.

Adware 49
article thumbnail

Fake Santa Surveillance Camera

Schneier on Security

Reka makes a " decorative Santa cam ," meaning that it's not a real camera. Instead, it just gets children used to being under constant surveillance. Our Santa Cam has a cute Father Christmas and mistletoe design, and a red, flashing LED light which will make the most logical kids suspend their disbelief and start to believe!

article thumbnail

The Logan Paul "Suicide Forest" Video Should Be a Reckoning For YouTube

WIRED Threat Level

Logan Paul's video of Japan's "suicide forest" was a nadir for the YouTube star—and the platform that enables him.

111
111
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Breach of India's Biometric Database Puts 1 Billion Users at Risk

Dark Reading

The Tribune reports that hackers gained access to users' names, addresses, phone numbers, and other PII.

Risk 0
article thumbnail

Vendors Share Patch Updates on Spectre and Meltdown Mitigation Efforts

Threatpost

Intel, Amazon, ARM, Microsoft and others have shared patch updates to keep customers informed on their mitigation efforts to protect against the far reaching Spectre and Meltdown vulnerabilities impacting computers, servers and mobile devices worldwide. .

Mobile 49
article thumbnail

Tamper-Detection App for Android

Schneier on Security

Edward Snowden and Nathan Freitas have created an Android app that detects when it's being tampered with. The basic idea is to put the app on a second phone and put the app on or near something important, like your laptop. The app can then text you -- and also record audio and video -- when something happens around it: when it's moved, when the lighting changes, and so on.

164
164
article thumbnail

Trolls, Bots, and Fake News Made 2017 a Terrible Year for Internet Freedom

WIRED Threat Level

Trolls, bots, and fake news posed a serious threat to internet freedom this year—and there's no easy answer in sight.

Internet 111
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

LockPoS Malware Sneaks onto Kernel via new Injection Technique

Dark Reading

"Alarming evolution" of Flokibot bypasses antivirus software and was likely built by a group of advanced attackers, researchers say.

article thumbnail

Assessing the Impact of Meltdown and Spectre: Companies Rush to Mitigate the Threat

eSecurity Planet

As Intel is hit with class action lawsuits, enterprises are working quickly to assess the potential impact of the flaws.

46
article thumbnail

Russian Cryptocurrency Designed to Evade Western Sanctions

Schneier on Security

Russia’s president Vladimir Putin has commissioned work on a state-run cryptocurrency that can circumvent other cryptocurrency sanctions around the world. The cryptocurrency is being called Cryptorouble. Back in October, the Russian Minister of Communications and Mass Communications first mentioned the possibility of the state-run cryptocurrency. According a Financial Times report yesterday, Putin’s economic advisor Sergei […].

article thumbnail

Even Realistic Videogames like Call of Duty Won’t Help Us Win Wars

WIRED Threat Level

Opinion: Research shows that millennial cadets' digital skills don't help them on the virtual battlefield.

110
110
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!