Sat.Feb 24, 2018 - Fri.Mar 02, 2018

article thumbnail

E-Mail Leaves an Evidence Trail

Schneier on Security

If you're going to commit an illegal act, it's best not to discuss it in e-mail. It's also best to Google tech instructions rather than asking someone else to do it: One new detail from the indictment, however, points to just how unsophisticated Manafort seems to have been. Here's the relevant passage from the indictment. I've bolded the most important bits: Manafort and Gates made numerous false and fraudulent representations to secure the loans.

article thumbnail

The UK and Australian Governments Are Now Monitoring Their Gov Domains on Have I Been Pwned

Troy Hunt

If I'm honest, I'm constantly surprised by the extent of how far Have I Been Pwned (HIBP) is reaching these days. This is a little project I started whilst killing time in a hotel room in late 2013 after thinking "I wonder if people actually know where their data has been exposed?" I built it in part to help people answer that question and in part because my inner geek wanted to build an interesting project on Microsoft's Azure.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Insights about the first three years of the Right To Be Forgotten requests at Google

Elie

The "Right To Be Forgotten" (RTBF) is the landmark European ruling that governs the delisting of personal information from search results. This ruling establishes a right to privacy, whereby individuals can request that search engines delist URLs from across the Internet that contain “inaccurate, inadequate, irrelevant or excessive” information surfaced by queries containing the name of the requester.

Media 107
article thumbnail

Facebook Doesn't Know How Many People Followed Russians on Instagram

WIRED Threat Level

By leaving Instagram followers off the public record, Columbia researcher Jonathan Albright says Facebook is making the Russian trolls' true audience appear artificially low.

95
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Malware from Space

Schneier on Security

Since you don't have enough to worry about, here's a paper postulating that space aliens could send us malware capable of destroying humanity. Abstract : A complex message from space may require the use of computers to display, analyze and understand. Such a message cannot be decontaminated with certainty, and technical risks remain which can pose an existential threat.

Malware 152
article thumbnail

Weekly Update 76

Troy Hunt

Massive, massive week! I'm not trying to make these videos longer (and the next two while I'm overseas will definitely be shorter), but yeah, this week was a biggie. Pwned Passwords dominated throughout, interrupted only by a few thousand new data breaches going into HIBP. But the big one - at least to me in terms of the significance - is the UK and Aussie governments now using HIBP to monitor their gov domains.

More Trending

article thumbnail

How Liberals Amped Up a Parkland Shooting Conspiracy Theory

WIRED Threat Level

A fake story about a Parkland student started on the right, but outrage-tweeting on the left propelled it into the mainstream.

107
107
article thumbnail

Apple to Store Encryption Keys in China

Schneier on Security

Apple is bowing to pressure from the Chinese government and storing encryption keys in China. While I would prefer it if it would take a stand against China, I really can't blame it for putting its business model ahead of its desires for customer privacy. Two more articles.

article thumbnail

Millions of Office 365 Accounts Hit with Password Stealers

Dark Reading

Phishing emails disguised as tax-related alerts aim to trick users into handing attackers their usernames and passwords.

Passwords 103
article thumbnail

Tracking desktop ransomware payments end to end

Elie

Ransomware is a type of malware that encrypts the files of infected hosts and demands payment, often in a crypto-currency such as Bitcoin. In this paper, we create a measurement framework that we use to perform a large-scale, two-year, end-to-end measurement of ransomware payments, victims, and operators. By combining an array of data sources, including ransomware binaries, seed ransom payments, victim telemetry from infections, and a large database of Bitcoin addresses annotated with their owne

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

How to Turn Off Facebook's Face Recognition Features

WIRED Threat Level

Facebook recently expanded its face recognition features—and you may have opted in without even realizing it.

110
110
article thumbnail

Russians Hacked the Olympics

Schneier on Security

Two weeks ago, I blogged about the myriad of hacking threats against the Olympics. Last week, the Washington Post reported that Russia hacked the Olympics network and tried to cast the blame on North Korea. Of course, the evidence is classified, so there's no way to verify this claim. And while the article speculates that the hacks were a retaliation for Russia being banned due to doping, that doesn't ring true to me.

Hacking 128
article thumbnail

How & Why the Cybersecurity Landscape Is Changing

Dark Reading

A comprehensive new report from Cisco should "scare the pants off" enterprise security leaders.

article thumbnail

Three years of the Right to be Forgotten

Elie

The “Right to be Forgotten” is a privacy ruling that enables Europeans to delist certain URLs appearing in search results related to their name. In order to illuminate the effect this ruling has on information access, we conduct a retrospective measurement study of 2.4 million URLs that were requested for delisting from Google Search over the last three and a half years.

Media 63
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

A 1.3Tbs DDoS Hit GitHub, the Largest Yet Recorded

WIRED Threat Level

On Wednesday, a 1.3Tbps DDoS attack pummeled GitHub for 15-20 minutes. Here's how it stayed online.

DDOS 112
article thumbnail

Sophisticated RedDrop Malware Targets Android Phones

Threatpost

A new strain of mobile malware found on an array of apps can pull out sensitive data – including audio recordings – from Android phones.

Malware 60
article thumbnail

7 Key Stats that Size Up the Cybercrime Deluge

Dark Reading

Updated data on zero-days, IoT threats, cryptomining, and economic costs should keep eyebrows raised in 2018.

article thumbnail

PIPEDA: Substantial Amendments Proposed by Parliamentary Committee

Privacy and Cybersecurity Law

Since February 2017, the House of Commons Standing Committee on Access to Information, Privacy and Ethics has been reviewing Canada’s […].

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Chrome's WebUSB Feature Leaves Some Yubikeys Vulnerable to Attack

WIRED Threat Level

While still the best protection against phishing attacks, some Yubikey models are vulnerable after a recent update to Google Chrome.

article thumbnail

How to Defend Servers Against Cryptojacking

eSecurity Planet

Here are some steps you can take to reduce the risk of becoming an unwitting accomplice to cryptojacking attacks.

Risk 64
article thumbnail

A Sneak Peek at the New NIST Cybersecurity Framework

Dark Reading

Key focus areas include supply chain risks, identity management, and cybersecurity risk assessment and measurement.

article thumbnail

Massive Malspam Campaign Targets Unpatched Systems

Threatpost

Morphisec said that it has detected several malicious word documents – part of a “massive” malspam campaign – that takes advantage of a critical Adobe Flash Player vulnerability discovered earlier this month.

Malware 47
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Russia's Olympics Hack Was the Country's Latest False Flag Attack

WIRED Threat Level

The Kremlin's hacking misdirection is evolving. And even when those attempts to confuse forensics fail, they still succeed at sowing future doubt.

Hacking 90
article thumbnail

20 Cyber Security Startups to Watch in 2018

eSecurity Planet

Here are 20 hot IT security startups addressing everything from IoT security and blockchain to artificial intelligence and machine learning.

article thumbnail

Security Starts with the User Experience

Dark Reading

Preventing a data breach is safer and more cost-effective than dealing with a breach after it has already happened. That means a focus on security in the design phase.

article thumbnail

In Wake of ‘Biggest-Ever’ DDoS Attack, Experts Say Brace For More

Threatpost

This week's DDoS attack against GitHub is a harbinger of attacks to come that will use the highly effective memcached amplification technique, say experts.

DDOS 47
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

Replay Sessions From Mixpanel and Others Have Recorded Passwords

WIRED Threat Level

Analytics services are unintentionally collecting a mass of passwords and other sensitive data, new research shows.

article thumbnail

Cloud Storage vs. Cloud Backup

Spinone

When deciding between different cloud providers, it can sometimes be confusing to understand all the different terminology and to know exactly what type of cloud services you need. Cloud storage and cloud backup are two of the most common services offered by cloud providers, but they each serve a similar but different purpose. Before signing up for one of these cloud services, it’s very important to understand the differences between them and to determine which will suit your needs best.

Backups 40
article thumbnail

Incident 'Management': What IT Security Can Learn from Public Safety

Dark Reading

How a framework developed for fighting California wildfires back in the '70s can fortify first responders to a modern cyberattack.

57
article thumbnail

Equifax Adds 2.4 Million More People to List of Those Impacted By 2017 Breach

Threatpost

Equifax said that an additional 2.4 million Americans have been impacted by a 2017 data breach, bringing the total of those implicated to around 148 million people.

article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.