Sat.Dec 30, 2017 - Fri.Jan 05, 2018

article thumbnail

2018 Cause Awareness & Giving Day Calendar

Troy Hunt

Cause awareness and giving days can be very powerful themes upon which to launch online fundraising campaigns. The real-time, in-the-moment nature of cause awareness and giving days can inspire donors to give provided that your nonprofit knows how to promote the days effectively. The first step is to decide which days to build a campaign upon and add them to your 2018 editorial calendar.

Internet 246
article thumbnail

Spectre and Meltdown Attacks Against Microprocessors

Schneier on Security

The security of pretty much every computer on the planet has just gotten a lot worse, and the only real solution -- which of course is not a solution -- is to throw them all away and buy new ones. On Wednesday, researchers just announced a series of major security vulnerabilities in the microprocessors at the heart of the world's computers for the past 15-20 years.

Firmware 194
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why 2018 Will Be the Trust Turning Point for the Digital Economy

Thales Cloud Protection & Licensing

We are in the midst of a digital revolution impacting every aspect of our everyday lives. At the center of the revolution is data, which is available in more forms, volume, depth and complexity since the beginnings of the computer revolution. Earlier this year , IDC predicted the world’s volume of data would expand to 163 zettabytes by 2025 – a tenfold rise in the total.

article thumbnail

Critical "Meltdown" and "Spectre" Flaws Breaks Basic Security for Intel, AMD, ARM Computers

WIRED Threat Level

Still-unidentified researchers have found a critical chip flaw that developers are scrambling to patch in millions of computers.

111
111
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Weekly Update 68

Troy Hunt

It's 2018! All new year and already someone has gone and broken our computer things courtesy of the Meltdown and Spectre bugs. I only touch briefly on them in this week's update and I refer people to my Twitter timeline for good coverage I've shared. However, there's one resource which stands out above the others and it's this thread from Graham Sutherland.

article thumbnail

Spectre and Meltdown Attacks

Schneier on Security

After a week or so of rumors, everyone is now reporting about the Spectre and Meltdown attacks against pretty much every modern processor out there. These are side-channel attacks where one process can spy on other processes. They affect computers where an untrusted browser window can execute code, phones that have multiple apps running at the same time, and cloud computing networks that run lots of different processes at once.

More Trending

article thumbnail

Pro-Russia Twitter Trolls Take Aim at Special Counsel Robert Mueller

WIRED Threat Level

As special counsel Robert Mueller's Russia investigation heats up, a network of pro-Russia trolls have rushed to discredit him.

111
111
article thumbnail

Forever 21 Found Malware and Encryption Disabled on its PoS Devices

Dark Reading

The retailer found signs of unauthorized access and malware installed on point-of-sale devices during an investigation into last year's data breach.

Malware 79
article thumbnail

New Book Coming in September: "Click Here to Kill Everybody"

Schneier on Security

My next book is still on track for a September 2018 publication. Norton is still the publisher. The title is now Click Here to Kill Everybody: Peril and Promise on a Hyperconnected Planet , which I generally refer to as CH2KE. The table of contents has changed since I last blogged about this, and it now looks like this: Introduction: Everything is Becoming a Computer Part 1: The Trends 1.

Internet 144
article thumbnail

Google Play Removes 22 Malicious ‘LightsOut’ Apps From Marketplace

Threatpost

Google removed 22 malicious adware apps ranging from flashlights, call recorders to wifi signal boosters that together were downloaded up to 7.5 million times from the Google Play marketplace.

Adware 49
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Voter ID Laws Really Do Discriminate, a New Study Shows

WIRED Threat Level

Critics of voter ID laws have had a difficult time proving their menace in court. A new algorithm could change that.

111
111
article thumbnail

A Pragmatic Approach to Fixing Cybersecurity: 5 Steps

Dark Reading

The digital infrastructure that supports our economy, protects our national security, and empowers our society must be made more secure, more trusted, and more reliable. Here's how.

article thumbnail

Detecting Adblocker Blockers

Schneier on Security

Interesting research on the prevalence of adblock blockers: " Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis ": Abstract : Millions of people use adblockers to remove intrusive and malicious ads as well as protect themselves against tracking and pervasive surveillance. Online publishers consider adblockers a major threat to the ad-powered "free" Web.

article thumbnail

Vendors Share Patch Updates on Spectre and Meltdown Mitigation Efforts

Threatpost

Intel, Amazon, ARM, Microsoft and others have shared patch updates to keep customers informed on their mitigation efforts to protect against the far reaching Spectre and Meltdown vulnerabilities impacting computers, servers and mobile devices worldwide. .

Mobile 49
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

What Happens If Russia Attacks Undersea Internet Cables

WIRED Threat Level

The world’s internet infrastructure is vulnerable, but snipping a couple of lines is the least of your concerns.

Internet 111
article thumbnail

The Cybersecurity 'Upside Down'

Dark Reading

There is no stranger thing than being breached. Here are a few ways to avoid the horror.

article thumbnail

Security Vulnerabilities in Star Wars

Schneier on Security

A fun video describing some of the many Empire security vulnerabilities in the first Star Wars movie. Happy New Year, everyone.

163
163
article thumbnail

2018 IT Security Outlook: Attacks and Threats Get More Sophisticated

eSecurity Planet

2018 will bring more high-profile data breaches, with attacks and threats getting increasingly sophisticated. We outline 10 security trends to watch.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

The Logan Paul "Suicide Forest" Video Should Be a Reckoning For YouTube

WIRED Threat Level

Logan Paul's video of Japan's "suicide forest" was a nadir for the YouTube star—and the platform that enables him.

109
109
article thumbnail

The Argument for Risk-Based Security

Dark Reading

A scanner can identify a vulnerability, but only a deep understanding of cyber exposure will tell you about the seriousness of that risk. Here's how and why.

Risk 51
article thumbnail

Tamper-Detection App for Android

Schneier on Security

Edward Snowden and Nathan Freitas have created an Android app that detects when it's being tampered with. The basic idea is to put the app on a second phone and put the app on or near something important, like your laptop. The app can then text you -- and also record audio and video -- when something happens around it: when it's moved, when the lighting changes, and so on.

126
126
article thumbnail

Intel In Security Hot Seat Over Reported CPU Design Flaw

Threatpost

Intel is grappling with what many are calling a processor design flaw impacting CPUs used in Linux, Windows and some macOS systems.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Trolls, Bots, and Fake News Made 2017 a Terrible Year for Internet Freedom

WIRED Threat Level

Trolls, bots, and fake news posed a serious threat to internet freedom this year—and there's no easy answer in sight.

Internet 106
article thumbnail

Critical Microprocessor Flaws Affect Nearly Every Machine

Dark Reading

Researchers release details of 'Meltdown' and 'Spectre' attacks that allow programs to steal sensitive data.

63
article thumbnail

Fake Santa Surveillance Camera

Schneier on Security

Reka makes a " decorative Santa cam ," meaning that it's not a real camera. Instead, it just gets children used to being under constant surveillance. Our Santa Cam has a cute Father Christmas and mistletoe design, and a red, flashing LED light which will make the most logical kids suspend their disbelief and start to believe!

article thumbnail

Don't let the scale fool you: Why you could still be at risk for diabetes

Threatpost

Type 2 diabetes has reached epidemic proportions, with an estimated 29 million people in the U.S. having the disease and another 86 million considered prediabetic. With an estimated cost of US$245 billion, prevention becomes critically important to stem the tide of increasing diabetes prevalence.

Risk 40
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

Even Realistic Videogames like Call of Duty Won’t Help Us Win Wars

WIRED Threat Level

Opinion: Research shows that millennial cadets' digital skills don't help them on the virtual battlefield.

106
106
article thumbnail

Vendors Rush to Issue Security Updates for Meltdown, Spectre Flaws

Dark Reading

Apple alone remains silent so far on potential impact to its products and its plans to address new side-channel attack vulnerabilities.

55
article thumbnail

Russian Cryptocurrency Designed to Evade Western Sanctions

Schneier on Security

Russia’s president Vladimir Putin has commissioned work on a state-run cryptocurrency that can circumvent other cryptocurrency sanctions around the world. The cryptocurrency is being called Cryptorouble. Back in October, the Russian Minister of Communications and Mass Communications first mentioned the possibility of the state-run cryptocurrency. According a Financial Times report yesterday, Putin’s economic advisor Sergei […].

article thumbnail

Assessing the Impact of Meltdown and Spectre: Companies Rush to Mitigate the Threat

eSecurity Planet

As Intel is hit with class action lawsuits, enterprises are working quickly to assess the potential impact of the flaws.

42
article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.