Sat.Jan 13, 2018 - Fri.Jan 19, 2018

article thumbnail

Security Breaches Don't Affect Stock Price

Schneier on Security

Interesting research: " Long-term market implications of data breaches, not ," by Russell Lange and Eric W. Burger. Abstract : This report assesses the impact disclosure of data breaches has on the total returns and volatility of the affected companies' stock, with a focus on the results relative to the performance of the firms' peer industries, as represented through selected indices rather than the market as a whole.

Marketing 302
article thumbnail

Weekly Update 70 (NDC London Edition)

Troy Hunt

It's NDC London! I'm pushing this week's update out a little later due to the different time zones and frankly, due to it being an absolutely non-stop week of events. I talk about those, about how I'm trying to tackle breach disclosures now and about some upcoming events. Next week is Norway and Denmark and I'll be coming to you a little later due to a totally jam-packed Friday, more from me then. iTunes podcast | Google Play Music podcast | RSS podcast.

116
116
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Meet Antifa's Secret Weapon Against Far-Right Extremists

WIRED Threat Level

Megan Squire doesn’t consider herself to be antifa and pushes digital activism instead, passing along information to those who might put it to real-world use—who might weaponize it.

111
111
article thumbnail

Where to Find Security Holes in Serverless Architecture

Dark Reading

Serverless architectures take away business responsibility for server management, but security should still be top of mind.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Fighting Ransomware

Schneier on Security

No More Ransom is a central repository of keys and applications for ransomware, so people can recover their data without paying. It's not complete, of course, but is pretty good against older strains of ransomware. The site is a joint effort by Europol, the Dutch police, Kaspersky, and McAfee.

article thumbnail

Sprawling Mobile Espionage Campaign Targets Android Devices

Threatpost

A massive mobile espionage campaign has been collecting troves of sensitive personal information since 2012, according to a new report from the Electronic Frontier Foundation and security firm Lookout.

Mobile 52

More Trending

article thumbnail

Four Malicious Google Chrome Extensions Affect 500K Users

Dark Reading

ICEBRG Security Research team's finding highlights an often-overlooked threat.

88
article thumbnail

Article from a Former Chinese PLA General on Cyber Sovereignty

Schneier on Security

Interesting article by Major General Hao Yeli, Chinese People's Liberation Army (ret.), a senior advisor at the China International Institute for Strategic Society, Vice President of China Institute for Innovation and Development Strategy, and the Chair of the Guanchao Cyber Forum. Against the background of globalization and the internet era, the emerging cyber sovereignty concept calls for breaking through the limitations of physical space and avoiding misunderstandings based on perceptions of

article thumbnail

Lenovo Patches Networking OS Vulnerability Dating Back to 2004

Threatpost

A bug in Lenovo’s Enterprise Networking Operating System could allow an attacker to launch an authentication bypass attack.

article thumbnail

The 'Doublespeak' of Responsible Encryption

WIRED Threat Level

It's a new name for an old argument: that public agencies fighting crime and terrorism must have access to our private communications—for our own good.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Understanding Supply Chain Cyber Attacks

Dark Reading

While the attack surface has increased exponentially because of the cloud and everything-as-a-service providers, there are still ways in which host companies can harden supply chain security.

article thumbnail

Jim Risen Writes about Reporting Government Secrets

Schneier on Security

Jim Risen writes a long and interesting article about his battles with the US government and the New York Times to report government secrets.

article thumbnail

Potent Skygofree Malware Packs ‘Never-Before-Seen’ Features

Threatpost

Researchers have discovered Android malware with spy capabilities never seen before such as allowing attackers to capture encrypted WhatsApp chat sessions.

Malware 46
article thumbnail

A Popular Crime-Predicting Algorithms Performed Worse Than Mechanical Turks in One Study

WIRED Threat Level

When researchers put a popular criminal justice algorithm up against a bunch of Mechanical Turks, they came out about even.

90
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Which CISO 'Tribe' Do You Belong To?

Dark Reading

New research categorizes CISOs into four distinct groups based on factors related to workforce, governance, and security controls.

CISO 59
article thumbnail

Student Cracks Inca Knot Code

Schneier on Security

Interesting.

154
154
article thumbnail

Enterprise Technologies That Tame GDPR Compliance

eSecurity Planet

The IT and software solutions that help businesses meet the EU's tough new data privacy regulation.

article thumbnail

Triton Malware Details Show the Dangers of Industrial System Sabotage

WIRED Threat Level

New details about Triton malware should put industrial systems and critical infrastructure on notice.

Malware 96
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Kaspersky Lab Seeks Injunction Against US Government Ban

Dark Reading

Revenues and reputation have taken a hit in the wake of the US Department of Homeland Security's decision to prohibit use of its products and services by the feds, the company says.

article thumbnail

Attackers Use Microsoft Office Vulnerabilities to Spread Zyklon Malware

Threatpost

Hackers are exploiting three Microsoft Office vulnerabilities to spread the Zyklon HTTP malware.

Malware 59
article thumbnail

Flexera Corporate Software Inspector: Overview and Analysis

eSecurity Planet

We review Flexera Corporate Software Inspector, a patch management solution for Windows, Mac OS and Red Hat Linux.

article thumbnail

A New Way to Track Down Bugs Could Help Save IoT

WIRED Threat Level

New research advances techniques for finding and exploiting known vulnerabilities in IoT devices automatically.

IoT 88
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Threats from Russia, North Korea Loom as Geopolitics Spills into Cyber Realm

Dark Reading

Threat actors from both nations ramped up their activities sharply in 2017, Flashpoint says in a new threat intelligence report.

56
article thumbnail

Apple Preps ChaiOS iMessage Bug Fix, Report

Threatpost

A so-called ‘text bomb’ flaw in Apple’s iPhone and Mac computers that causes devices to crash or restart will be patched next week, according to multiple sources.

Mobile 42
article thumbnail

SolarWinds Patch Manager: Overview and Analysis

eSecurity Planet

We review SolarWinds Patch Manager, a patch management solution focused on Windows servers and workstations and third-party products.

48
article thumbnail

Meltdown, Spectre, Malicious Apps, and More of This Week's Security News

WIRED Threat Level

Meltdown, Spectre, malicious Android apps, and more of the week's top security news.

86
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

Top 3 Pitfalls of Securing the Decentralized Enterprise

Dark Reading

Doubling down on outdated security practices while the number of users leveraging your enterprise network grows is a race to the bottom for businesses moving to distributed workflows.

43
article thumbnail

Best of 2017: Top 7 Articles by Spinbackup

Spinone

As the security threat landscape evolves, enterprise organizations continuously invest into data protection solutions aimed at preventing massive data breaches, Ransomware, phishing scams and other sophisticated cyber attacks. Looking back at 2017 Spinbackup has made it a priority to offer state-of-the-art solutions to the problems above. So take a cup of coffee, relax, and have a look at our best articles providing solutions to your most serious G Suite security concerns.

Backups 40
article thumbnail

BMC BladeLogic Server Automation: Patch Management Overview and Analysis

eSecurity Planet

We review BMC BladeLogic Server Automation, a server configuration tool that also offers patch management for Microsoft, Linux, and other OSes.

44
article thumbnail

How the False Hawaii Missile Warning Could Have Happened

WIRED Threat Level

And where was the federal government?

article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.