Sat.Jun 09, 2018 - Fri.Jun 15, 2018

article thumbnail

Thomas Dullien on Complexity and Security

Schneier on Security

For many years, I have said that complexity is the worst enemy of security. At CyCon earlier this month, Thomas Dullien gave an excellent talk on the subject with far more detail than I've ever provided. Video. Slides.

232
232
article thumbnail

Mobile security advances to stopping device exploits ? not just detecting malicious apps

The Last Watchdog

The most profound threat to corporate networks isn’t the latest, greatest malware. It’s carbon-based life forms. Humans tend to be gullible and impatient. With our affiliations and preferences put in play by search engines and social media, we’re perfect patsies for social engineering. And because we are slaves to convenience, we have a propensity for taking shortcuts when it comes to designing, configuring and using digital systems.

Mobile 182
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data Provided by the Estonian Central Criminal Police is Now Searchable on Have I Been Pwned

Troy Hunt

Running Have I Been Pwned (HIBP) has presented some fascinating insights into all sorts of aspects of how data breaches affect us; the impact on the individual victims such as you and I, of course, but also how they affect the companies involved and increasingly, the role of government and law enforcement in dealing with these incidents. Last week I had an all new situation arise related to that last point and I want to explain it properly here so it makes sense if someone finds themselves in th

article thumbnail

How Microsoft's Windows Red Team Keeps PCs Safe

WIRED Threat Level

Microsoft's Windows red team probes and prods the world's biggest operating system through the eyes of an adversary.

111
111
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Router Vulnerability and the VPNFilter Botnet

Schneier on Security

On May 25, the FBI asked us all to reboot our routers. The story behind this request is one of sophisticated malware and unsophisticated home-network security, and it's a harbinger of the sorts of pervasive threats ­ from nation-states, criminals and hackers ­ that we should expect in coming years. VPNFilter is a sophisticated piece of malware that infects mostly older home and small-office routers made by Linksys, MikroTik, Netgear, QNAP and TP-Link.

Malware 201
article thumbnail

Why big companies ignore SAP security patches ? and how that could bite them, big time

The Last Watchdog

Threat actors in the hunt for vulnerable targets often look first to ubiquitous platforms. It makes perfect sense for them to do so. Related article: Triaging open-source exposures. Finding a coding or design flaw on Windows OS can point the way to unauthorized to access to a treasure trove of company networks that use Windows. The same holds true for probing widely used open source protocols, as occurred when Heartbleed and Shellshock came to light.

LifeWorks

More Trending

article thumbnail

How NATO Defends Against the Cyberattacks

WIRED Threat Level

Opinion: The NATO Secretary General explains how the alliance manages the dark side of the web.

107
107
article thumbnail

Russian Censorship of Telegram

Schneier on Security

Internet censors have a new strategy in their bid to block applications and websites: pressuring the large cloud providers that host them. These providers have concerns that are much broader than the targets of censorship efforts, so they have the choice of either standing up to the censors or capitulating in order to maximize their business. Today's Internet largely reflects the dominance of a handful of companies behind the cloud services, search engines and mobile platforms that underpin the

Internet 198
article thumbnail

GUEST ESSAY: 3 key ingredients to stress-free compliance with data handling regulations

The Last Watchdog

The variety of laws and regulations governing how organizations manage and share sensitive information can look like a bowl of alphabet soup: HIPAA, GDPR, SOX, PCI and GLBA. A multinational conglomerate, government contractor, or public university must comply with ten or more, which makes demonstrating regulatory compliance seem like a daunting, even impossible, undertaking.

article thumbnail

10 Security Projects CISOs Should Consider: Gartner Analyst

eSecurity Planet

Gartner analyst lists 10 security projects CISOs should consider this year - and 10 they should have already done.

CISO 102
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Senators Demand Answers From Amazon on Echo's Snooping Habits

WIRED Threat Level

Jeff Flake and Chris Coons sent Jeff Bezos a letter Thursday with nearly 30 questions about how the company handles user data and privacy.

106
106
article thumbnail

New iPhone OS May Include Device-Unlocking Security

Schneier on Security

iOS 12, the next release of Apple's iPhone operating system, may include features to prevent someone from unlocking your phone without your permission: The feature essentially forces users to unlock the iPhone with the passcode when connecting it to a USB accessory everytime the phone has not been unlocked for one hour. That includes the iPhone unlocking devices that companies such as Cellebrite or GrayShift make, which police departments all over the world use to hack into seized iPhones.

Passwords 196
article thumbnail

Threat Model Thursday: Chromium Post-Spectre

Adam Shostack

Today’s Threat Model Thursday is a look at “ Post-Spectre Threat Model Re-Think ,” from a dozen or so folks at Google. As always, I’m looking at this from a perspective of what can we learn and to encourage dialogue around what makes for a good threat model. What are we working on? From the title, I’d assume Chromium, but there’s a fascinating comment in the introduction that this is wider: “ any software that both (a) runs (native or interpreted) code f

Software 100
article thumbnail

Meet 'Bro': The Best-Kept Secret of Network Security

Dark Reading

This often overlooked open source tool uses deep packet inspection to transform network traffic into exceptionally useful, real-time data for security operations.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Encrypted Messaging Apps Have Limitations You Should Know

WIRED Threat Level

As recent events have shown, using an encrypted messaging app like WhatsApp or Signal is no privacy panacea.

article thumbnail

Bypass Glitch Allows Malware to Masquerade as Legit Apple Files

Threatpost

Malware can to worm its way onto Macs thanks to a recently discovered code-signing bypass flaw.

Malware 64
article thumbnail

Leopard Spots and Zebra Stripes: Fraud and Behavioral Analytics

Thales Cloud Protection & Licensing

Did you know that every zebra has its own unique stripe pattern? Just like a human fingerprint, every zebra can be identified by their distinctive set of stripes. Luckily, zebras don’t use mobile devices, or manufacturers would be hard at work on stripe recognition technology. But they’d also be working to supplement their stripe recognition and biometrics with behavioral analytics.

article thumbnail

Modern Cybersecurity Demands a Different Corporate Mindset

Dark Reading

Very few organizations have fully incorporated all relevant risks and threats into their current digital strategy, research finds.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

World Cup 2018: How to Secure Your Devices When Traveling in Russia

WIRED Threat Level

Russia expects as many as 2 million visitors during the 2018 World Cup, most of whom should take extra precautions against the country's many cyber risks.

article thumbnail

New Banking Trojan Can Launch Overlay Attacks on Latest Android Versions

Threatpost

While other malware families have been searching for new overlay techniques for Android 7 and 8, MysteryBot appears to have found a solution.

Banking 53
article thumbnail

Pen Testing Toolkit: White Hat Tools to Improve Web Application Penetration Testing

NopSec

Many of our clients at NopSec have mature web application security programs with their own internal white hat penetration testing personnel. Performing penetration testing in coordination with an agile software development team presents unique challenges as the speed of feature development can make thorough testing of the application difficult to achieve.

article thumbnail

23,000 Compromised in HealthEquity Data Breach

Dark Reading

HealthEquity, which handles more than 3.4 million health savings accounts, was breached when an intruder accessed an employee's email.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Alleged Silk Road Adviser Roger Clark Extradited To the US

WIRED Threat Level

Roger Clark allegedly served as Ross Ulbricht's Silk Road consigliere. Friday, the feds announced his extradition from Thailand.

100
100
article thumbnail

U.S. Intelligence Cautions World Cup Travelers on Mobile Use

Threatpost

World Cup travelers should leave their mobile phones, laptops and tablets behind.

Mobile 50
article thumbnail

Container and Kubernetes Security: It's Complicated

eSecurity Planet

While there are a lot of things that containers do to help improve security, there are still some missing pieces.

50
article thumbnail

Why CISOs Need a Security Reality Check

Dark Reading

We deserve a seat at the executive table, and we'll be much better at our jobs once we take it.

CISO 73
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Feds Bust Dozens of Nigerian Email Scammers, but Your Inbox Still Isn’t Safe

WIRED Threat Level

The arrest of dozens of alleged Nigerian email scammers and their associates is a small, but important, first step toward tackling an enormous problem.

99
article thumbnail

Apple Removes iPhone USB Access Feature, Blocking Out Hackers, Law Enforcement

Threatpost

The move escalates tensions between the phone giant and federal law enforcement when it comes to mobile security.

Mobile 49
article thumbnail

Leopard Spots and Zebra Stripes: Big Data and Identity Management

Thales Cloud Protection & Licensing

The expression “a leopard cannot change its spots” maintains that it is challenging to alter ones’ inherent nature — not only who you are but also what defines you. Your spots, in this case, include your ways, habits, and behaviors. In this age of big data, the concept is fitting, because this kind of information is increasingly being used to identify individuals and even machines.

article thumbnail

DDoS Amped Up: DNS, Memcached Attacks Rise

Dark Reading

China and the US are the world's leading sources of distributed denial-of-service botnet attacks.

DNS 71
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!