Sat.May 19, 2018 - Fri.May 25, 2018

article thumbnail

Another Spectre-Like CPU Vulnerability

Schneier on Security

Google and Microsoft researchers have disclosed another Spectre-like CPU side-channel vulnerability, called " Speculative Store Bypass." Like the others, the fix will slow the CPU down. The German tech site Heise reports that more are coming. I'm not surprised. Writing about Spectre and Meltdown in January, I predicted that we'll be seeing a lot more of these sorts of vulnerabilities.

139
139
article thumbnail

New Pluralsight Course: Bug Bounties for Companies

Troy Hunt

Try publishing something to the internet - anything - and see how it long it takes before something nasty is probing away at it. Brand new website, new domain and it's mere hours (if not minutes) before requests for wp-admin are in the logs. Yes, I know it's not a Wordpress site but that doesn't matter, the bots don't care. But that's just indiscriminate scanning, nothing personal; how about deliberate and concerted attacks more specifically designed to get into your things?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Stealthy, Destructive Malware Infects Half a Million Routers

WIRED Threat Level

Cisco researchers discover a new router malware outbreak that might also be the next cyberwar attack in Ukraine.

Malware 107
article thumbnail

Most Expensive Data Breaches Start with Third Parties: Report

Dark Reading

Data breach costs increased 24% for enterprise victims and 36% for SMBs from 2017 to 2018, researchers found.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Japan's Directorate for Signals Intelligence

Schneier on Security

The Intercept has a long article on Japan's equivalent of the NSA: the Directorate for Signals Intelligence. Interesting, but nothing really surprising. The directorate has a history that dates back to the 1950s; its role is to eavesdrop on communications. But its operations remain so highly classified that the Japanese government has disclosed little about its work ­ even the location of its headquarters.

article thumbnail

Weekly Update 88

Troy Hunt

Well it's all quietened down here with Scott gone so it's back to business as usual, which means, well, it's not very quiet at all! I've been in Sydney this week talking at one of our big banks and as I say in this week's update, getting out there amongst companies dealing with their unique cyber challenges is always interesting: #cyber pic.twitter.com/CIMDhPfKIP — Troy Hunt (@troyhunt) May 23, 2018.

More Trending

article thumbnail

John Grimm, Senior Director of IoT Security Strategy, speaks to the CyberWire Podcast

Thales Cloud Protection & Licensing

John Grimm, Thales eSecurity’s Senior Director of IoT Security Strategy, recently spoke with CyberWire’s Dave Bittner about key findings and trends from Thales eSecurity’s 2018 Global Encryption Trends Study. The CyberWire is a free, community-driven cybersecurity news service based in Baltimore. A sampling of John’s comments: The lynchpin of any good encryption system is how well you protect the key.

IoT 59
article thumbnail

Detecting Lies through Mouse Movements

Schneier on Security

Interesting research: " The detection of faked identity using unexpected questions and mouse dynamics ," by Merulin Monaro, Luciano Gamberini, and Guiseppe Sartori. Abstract: The detection of faked identities is a major problem in security. Current memory-detection techniques cannot be used as they require prior knowledge of the respondent's true identity.

130
130
article thumbnail

GDPR Oddsmakers: Who, Where, When Will Enforcement Hit First?

Dark Reading

The GDPR grace period ends today. Experts take their best guesses on when data protection authorities will strike - and what kind of organizations will be first to feel the sting of the EU privacy law.

56
article thumbnail

How the LAPD Uses Data to Predict Crime

WIRED Threat Level

The Los Angeles Police Department is using "predictive policing" to prevent crime, but this innovative approach has its problems.

94
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Attackers Cashing In On Cryptocurrency With Increased Scams

Threatpost

As the popularity around cryptocurrency has continued to rise in 2018, it has also paved an easy path for cash-hungry scammers to launch “cryptocurrency giveaway scams.”.

article thumbnail

Security and Human Behavior (SHB 2018)

Schneier on Security

I'm at Carnegie Mellon University, at the eleventh Workshop on Security and Human Behavior. SHB is a small invitational gathering of people studying various aspects of the human side of security, organized each year by Alessandro Acquisti, Ross Anderson, and myself. The 50 or so people in the room include psychologists, economists, computer security researchers, sociologists, political scientists, neuroscientists, designers, lawyers, philosophers, anthropologists, business school professors, and

123
123
article thumbnail

Google to Delete 'Secure' Label from HTTPS Sites

Dark Reading

Google acknowledges HTTPS as the Internet standard with plans to remove 'secure' from all HTTPS sites.

article thumbnail

A Location-Sharing Disaster Shows How Exposed You Really Are

WIRED Threat Level

The failures of Securus and LocationSmart to secure location data are the failures of an entire industry.

99
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Highlights from Cloud Expo Asia Hong Kong 2018

Thales Cloud Protection & Licensing

The rules of risk taking. What kind of person are you? Are you a risk taker or someone who like to play it safe? Is your organization one that takes risk, or is it risk averse? Let’s take digital transformation , for example. Most organizations want to embrace it, but feel constricted due to data privacy concerns and compliance regulations. However, companies that can’t or won’t find a path forward run the risk (pun intended!

article thumbnail

Font Steganography

Schneier on Security

Interesting research in steganography at the font level.

article thumbnail

Las Vegas Most Insecure Cyber City in US; St. Louis Least Vulnerable

Dark Reading

Forty-three percent chance of users connecting to high or medium-risk networks in Las Vegas - compared to less than 1% risk in least vulnerable areas, Coronet says.

Risk 55
article thumbnail

‘Significant’ FBI Error Reignites Data Encryption Debate

WIRED Threat Level

FBI stats about inaccessible cellphones were inflated, undermining already controversial bureau claims about the threat of encryption.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Intel Responds to Spectre-Like Flaw In CPUs

Threatpost

Intel on Monday acknowledged that its processors are vulnerable to another Spectre-like speculative execution side channel flaw that could allow attackers to access information.

48
article thumbnail

Supermarket Shoplifting

Schneier on Security

The rise of self-checkout has caused a corresponding rise in shoplifting.

Scams 117
article thumbnail

Android Malware Comes Baked into Some New Tablets, Phones

Dark Reading

Ad-loading malware is being built into the firmware and operating system of some new tablets and phones from three major manufacturers.

Malware 61
article thumbnail

After Meltdown and Spectre, Another Scary Chip Flaw Emerges

WIRED Threat Level

A new processor vulnerability known as Speculative Store Bypass could expose user data on a huge swath of devices.

85
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Amazon Comes Under Fire for Facial Recognition Platform

Threatpost

Privacy advocates say facial recognition can be an agent of authoritarian surveillance; others say it's an invaluable tool to combat kidnapping, locate lost children and track down criminals on the run.

article thumbnail

GDPR Will Change Security and Privacy Everywhere

eSecurity Planet

As Microsoft demonstrated this week, companies will find that having separate data protection and privacy policies for non-EU customers won't work.

41
article thumbnail

Wicked Mirai Brings New Exploits to IoT Botnets

Dark Reading

The latest variant of the venerable Mirai botnet malware combines approaches and brings new exploits to the world of IoT security challenges.

IoT 58
article thumbnail

Facebook Is Beefing Up Its Two-Factor Authentication

WIRED Threat Level

The update, now available to most users, comes several months after Facebook was criticized for spamming users' two-factor authentication phone numbers.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

Intel’s ‘Virtual Fences’ Spectre Fix Won’t Protect Against Variant 4

Threatpost

The new hardware-based protections Intel announced earlier in March it was embedding into new chips will only protect against Spectre and Meltdown – but not the newly disclosed Variant 4, sources said.

44
article thumbnail

How to Stop Advanced Persistent Threats

eSecurity Planet

The security professional's guide to advanced persistent threats and how to stop and prevent them.

49
article thumbnail

What Should Post-Quantum Cryptography Look Like?

Dark Reading

Researchers are tackling the difficult problem of transitioning toward a new mode of cryptographic protections that won't break under the pressure of quantum computing power.

50
article thumbnail

You Can Send Invisible Messages With Subtle Font Tweaks

WIRED Threat Level

Researchers have developed a new technique called FontCode that hides secrets in plain sight.

90
article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.