Sat.Jul 08, 2023 - Fri.Jul 14, 2023

article thumbnail

Wisconsin Governor Hacks the Veto Process

Schneier on Security

In my latest book, A Hacker’s Mind , I wrote about hacks as loophole exploiting. This is a great example: The Wisconsin governor used his line-item veto powers—supposedly unique in their specificity—to change a one-year funding increase into a 400-year funding increase. He took this wording: Section 402. 121.905 (3) (c) 9. of the statues is created to read: 121.903 (3) (c) 9.

Hacking 209
article thumbnail

MY TAKE: ‘IOWN’ makes the business case for fostering diversity, respecting individual privacy

The Last Watchdog

To tap the full potential of massively interconnected, fully interoperable digital systems we must solve privacy and cybersecurity, to be sure. Related: Using ‘Big Data’ to improve health and well-being But there’s yet another towering technology mountain to climb: we must also overcome the limitations of Moore’s Law. After 30 years, we’ve reached the end of Moore’s Law , which states that the number of transistors on a silicon-based semiconductor chip doubles approximately eve

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Lucky MVP 13

Troy Hunt

Each year since 2011, Microsoft has sent me a lovely email around this time: I've been fortunate enough to find a passion in life that has allowed me to do what I love and make a great living out of it all whilst contributing to the community in a meaningful and impactful way. In last year's MVP announcement blog post , I talked about one of my favourite contributions of all that year being the Pwned Passwords ingestion pipeline for the FBI.

article thumbnail

Apple & Microsoft Patch Tuesday, July 2023 Edition

Krebs on Security

Microsoft Corp. today released software updates to quash 130 security bugs in its Windows operating systems and related software, including at least five flaws that are already seeing active exploitation. Meanwhile, Apple customers have their own zero-day woes again this month: On Monday, Apple issued (and then quickly pulled) an emergency update to fix a zero-day vulnerability that is being exploited on MacOS and iOS devices.

Software 199
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Google Is Using Its Vast Data Stores to Train AI

Schneier on Security

No surprise, but Google just changed its privacy policy to reflect broader uses of all the surveillance data it has captured over the years: Research and development : Google uses information to improve our services and to develop new products, features and technologies that benefit our users and the public. For example, we use publicly available information to help train Google’s AI models and build products and features like Google Translate, Bard, and Cloud AI capabilities.

article thumbnail

How to Check If Someone Else Accessed Your Google Account

Tech Republic Security

Review your recent Gmail access, browser sign-in history and Google account activity to make sure no one other than you has used your account.

More Trending

article thumbnail

ESET Threat Report H1 2023

We Live Security

A view of the H1 2023 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts The post ESET Threat Report H1 2023 appeared first on WeLiveSecurity

article thumbnail

French Police Will Be Able to Spy on People through Their Cell Phones

Schneier on Security

The French police are getting new surveillance powers : French police should be able to spy on suspects by remotely activating the camera, microphone and GPS of their phones and other devices, lawmakers agreed late on Wednesday, July 5. […] Covering laptops, cars and other connected objects as well as phones, the measure would allow the geolocation of suspects in crimes punishable by at least five years’ jail.

article thumbnail

Gartner: Due to stress, half of cyber leaders will change jobs, and a quarter will quit the field

Tech Republic Security

Among the strategic propositions in Gartner's 2023-2024 cybersecurity outlook are that organizations need to institute cultural changes to lower pressure on security teams.

article thumbnail

Charming Kitten hackers use new ‘NokNok’ malware for macOS

Bleeping Computer

Security researchers observed a new campaign they attribute to the Charming Kitten APT group where hackers used new NokNok malware that targets macOS systems. [.

Malware 137
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

World Youth Skills Day 2023: Engaging Youth with Cybersecurity

Thales Cloud Protection & Licensing

World Youth Skills Day 2023: Engaging Youth with Cybersecurity madhav Thu, 07/13/2023 - 04:56 In 2014, the United Nations General Assembly declared 15 July as World Youth Skills Day to celebrate the strategic importance of equipping young people with skills for employment, decent work, and entrepreneurship. “Young people are drivers of change and must be fully engaged in decisions affecting their future,” said UN Secretary-General António Guterres.

article thumbnail

Banking Firms Under Attack by Sophisticated 'Toitoin' Campaign

Dark Reading

An attack involves a multi-stage infection chain with custom malware hosted on Amazon EC2 that ultimately steals critical system and browser data; so far, targets have been located in Latin America.

Banking 113
article thumbnail

How to Use an SSH Config File on macOS for Easier Connections to Your Data Center Servers

Tech Republic Security

Jack Wallen shows you how to make SSH connections even easier from your macOS machine. The post How to Use an SSH Config File on macOS for Easier Connections to Your Data Center Servers appeared first on TechRepublic.

140
140
article thumbnail

StackRot: Linux Bug so bad Linus Dives Into Code to Fix It

Security Boulevard

Maple Tree Side Effects: Torvalds feels the pressure, fixes lazy locks. The post StackRot: Linux Bug so bad Linus Dives Into Code to Fix It appeared first on Security Boulevard.

IoT 109
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Apple releases emergency update to fix zero-day exploited in attacks

Bleeping Computer

Apple has issued a new round of Rapid Security Response (RSR) updates to address a new zero-day bug exploited in attacks and impacting fully-patched iPhones, Macs, and iPads. [.

111
111
article thumbnail

Microsoft Discloses 5 Zero-Days in Voluminous July Security Update

Dark Reading

Fixes for more than 100 vulnerabilities affect numerous products, including Windows, Office,Net, and Azure Active Directory, among others.

128
128
article thumbnail

White House Launches Cybersecurity Implementation Plan

Tech Republic Security

The White House has announced the first iteration of the National Cybersecurity Implementation Plan. Read on to learn more about the plan and alignment with the five essential pillars.

article thumbnail

Takeaways from the 2023 Verizon DBIR: 9 Ways Hackers Can Use Files to Attack Your Organization

Security Boulevard

The annual Verizon Data Breach Investigations Report (DBIR) is an essential resource used by enterprise security leaders to understand the latest trends in cybersecurity and learn lessons on improving organizational defenses. Let’s review some of the key highlights and see how Votiro Cloud can address and mitigate many of the most pressing security issues resulting.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Microsoft July 2023 Patch Tuesday warns of 6 zero-days, 132 flaws

Bleeping Computer

Today is Microsoft's July 2023 Patch Tuesday, with security updates for 132 flaws, including six actively exploited and thirty-seven remote code execution vulnerabilities. [.

111
111
article thumbnail

Two Spyware Apps on Google Play with 1.5 Million Users Sending Data to China

The Hacker News

Two file management apps on the Google Play Store have been discovered to be spyware, putting the privacy and security of up to 1.5 million Android users at risk. These apps engage in deceptive behaviour and secretly send sensitive user data to malicious servers in China. Pradeo, a leading mobile security company, has uncovered this alarming infiltration.

Spyware 104
article thumbnail

What Are Mobile VPN Apps and Why You Should Be Using Them

Tech Republic Security

When you think of VPNs, chances are pretty good your thoughts go to the tried and true virtual private networks of old, which made it possible for you to securely connect to your company network (from a remote location) such that your local computer behaved as if it were within the company LAN. In this. The post What Are Mobile VPN Apps and Why You Should Be Using Them appeared first on TechRepublic.

VPN 135
article thumbnail

Crafting a Successful Cybersecurity Risk Management Strategy

Security Boulevard

In a world where cyber risks lurk in the dark shadows of our networks, one thing is crystal clear. You need a cybersecurity risk management strategy in place to better understand your risk exposure. While few will question the importance of risk management in cybersecurity, the challenge lies in figuring out what those important first […] The post Crafting a Successful Cybersecurity Risk Management Strategy appeared first on Centraleyes.

Risk 104
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Microsoft rebrands Azure Active Directory to Microsoft Entra ID

Bleeping Computer

Microsoft announced today that it would change the name of its Azure Active Directory (Azure AD) enterprise identity service to Microsoft Entra ID by the end of the year. [.

111
111
article thumbnail

Deepfake Quantum AI Investment Scam Pops Up on Facebook

Dark Reading

A consumer finance journalist and television personality took to Twitter to warn his followers about advertisements using his name and face to scam victims.

Scams 109
article thumbnail

Scarleteel Threat Targets AWS Fargate, Launches DDoS and Cryptojacking Campaigns

Tech Republic Security

The Scarleteel threat targets AWS Fargate environments for data theft and more malicious types of attacks such as cryptojacking and DDoS. Learn how to mitigate this threat.

DDOS 116
article thumbnail

Guide to Building a Cybersecurity Incident Response Plan [Part 1]

Security Boulevard

Cybersecurity incidents are a fact of life in today’s digital world. Every day, organizations of all sizes are targeted by hackers and other cyber criminals. In 2022, there were over 600 billion cyberattacks worldwide, and the number is only expected… The post Guide to Building a Cybersecurity Incident Response Plan [Part 1] appeared first on LogRhythm.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

Instagram's Threads to get Twitter-like hashtags support, edit button and more

Bleeping Computer

Instagram's dedicated text-sharing app, Threads, is set to introduce many new features, including Twitter-style hashtags, an edit button, a trending page, and possibly even an automatic archiving function. Instagram's Head, Adam Mosseri, confirmed these upcoming features in a series of posts on Threads. [.

article thumbnail

Why I started the Security Serious Unsung Heroes Awards

IT Security Guru

I don’t typically like awards; let’s be honest, more often than not, they’re pay to play – and most of us see them for what they are! It begs the question; how come we ended up running an award that literally makes no money and takes a huge amount of time to organise for the heroes that work for me – Beth Smith and Nicole Sigrist? It’s because there have never been any awards for the real people; the ones teaching, the mentors, those doing the seemingly boring stuff like compliance or infr

CISO 100
article thumbnail

Top Tech Conferences & Events to Add to Your Calendar in 2023

Tech Republic Security

Looking for a list of the top tech conferences and events in 2023? Explore our guide to find out which events you should add to your calendar.

Big data 122
article thumbnail

How to Combat Misinformation in the Age of AI

Security Boulevard

Fake news, misinformation and online scams are growing at an alarming rate as generative AI explodes in usage. So what are the problems, and what are some potential solutions to consider? The post How to Combat Misinformation in the Age of AI appeared first on Security Boulevard.

Scams 104
article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.