Sat.Jun 16, 2018 - Fri.Jun 22, 2018

article thumbnail

Google to Fix Location Data Leak in Google Home, Chromecast

Krebs on Security

Google in the coming weeks is expected to fix a location privacy leak in two of its most popular consumer products. New research shows that Web sites can run a simple script in the background that collects precise location data on people who have a Google Home or Chromecast device installed anywhere on their local network. Craig Young , a researcher with security firm Tripwire , said he discovered an authentication weakness that leaks incredibly accurate location information about users of both

IoT 180
article thumbnail

Ridiculously Insecure Smart Lock

Schneier on Security

Tapplock sells an "unbreakable" Internet-connected lock that you can open with your fingerprint. It turns out that : The lock broadcasts its Bluetooth MAC address in the clear, and you can calculate the unlock key from it. Any Tapplock account an unlock every lock. You can open the lock with a screwdriver. Regarding the third flaw, the manufacturer has responded that ".the lock is invincible to the people who do not have a screwdriver.".

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

VASCO rebrands as OneSpan, makes acquisition, to support emerging mobile banking services

The Last Watchdog

Bank patrons in their 20s and 30s, who grew up blanketed with digital screens, have little interest in visiting a brick-and-mortar branch, nor interacting with a flesh-and-blood teller. This truism is pushing banks into unchartered territory. They are scrambling to invent and deliver a fresh portfolio of mobile banking services that appeal to millennials.

Banking 137
article thumbnail

Weekly Update 91

Troy Hunt

We're at NDC Oslo! We found a spot on the floor and recorded this a couple of hours before doing our final talk of the event. In this video, we discuss some of what we were planning to cover in that talk, namely HTTPS anti-vaxxers as Scott wrote about earlier in the week. And how did it go? Apparently, exceptionally well! Best talk of the conf! @troyhunt and @Scott_Helme on web security - dont get advise from a psychic ??

117
117
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

AT&T, Sprint, Verizon to Stop Sharing Customer Location Data With Third Parties

Krebs on Security

In the wake of a scandal involving third-party companies leaking or selling precise, real-time location data on virtually all Americans who own a mobile phone, AT&T , Sprint and Verizon now say they are terminating location data sharing agreements with third parties. At issue are companies known in the wireless industry as “location aggregators,” entities that manage requests for real-time customer location data for a variety of purposes, such as roadside assistance and emergenc

Mobile 160
article thumbnail

Perverse Vulnerability from Interaction between 2-Factor Authentication and iOS AutoFill

Schneier on Security

Apple is rolling out an iOS security usability feature called Security code AutoFill. The basic idea is that the OS scans incoming SMS messages for security codes and suggests them in AutoFill, so that people can use them without having to memorize or type them. Sounds like a really good idea, but Andreas Gutmann points out an application where this could become a vulnerability: when authenticating transactions: Transaction authentication, as opposed to user authentication, is used to attest the

More Trending

article thumbnail

Weekly Update 92

Troy Hunt

Last day away! As much as I enjoy travel, I love going home and I'm wrapping this post up whilst sitting at the airport in Oslo about to begin the epic journey that is travelling back to the other side of the world. It's been a great trip, but yeah, I like home ??. This week, I'm recapping on some workshops, talking about how data breaches circulate, sharing some pretty epic Report URI stats and also covering last week's blog post on the Estonian government providing data to HIBP.

article thumbnail

Supreme Court: Police Need Warrant for Mobile Location Data

Krebs on Security

The U.S. Supreme Court today ruled that the government needs to obtain a court-ordered warrant to gather location data on mobile device users. The decision is a major development for privacy rights, but experts say it may have limited bearing on the selling of real-time customer location data by the wireless carriers to third-party companies. Image: Wikipedia.

Mobile 123
article thumbnail

Algeria Shut Down the Internet to Prevent Students from Cheating on Exams

Schneier on Security

Algeria shut the Internet down nationwide to prevent high-school students from cheating on their exams. The solution in New South Wales, Australia was to ban smartphones.

Internet 127
article thumbnail

Threat Model Thursday: Architectural Review and Threat Modeling

Adam Shostack

For Threat Model Thursday, I want to use current events here in Seattle as a prism through which we can look at technology architecture review. If you want to take this as an excuse to civilly discuss the political side of this, please feel free. Seattle has a housing and homelessness crisis. The cost of a house has risen nearly 25% above the 2007 market peak , and has roughly doubled in the 6 years since April 2012.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Carpenter v. United States Decision Strengthens Digital Privacy

WIRED Threat Level

Thanks to Carpenter v. United States, the government will now generally need a warrant to obtain your cell site location information.

article thumbnail

'Pay Up or Get WannaCry Hit' Extortion Email Spreading

Dark Reading

Sophos warns of a 'protection racket' scam email that threatens to infect victims with the ransomware variant if they don't pay the attackers.

Scams 92
article thumbnail

The Effects of Iran's Telegram Ban

Schneier on Security

The Center for Human Rights in Iran has released a report outlining the effect's of that country's ban on Telegram, a secure messaging app used by about half of the country. The ban will disrupt the most important, uncensored platform for information and communication in Iran, one that is used extensively by activists, independent and citizen journalists, dissidents and international media.

Media 114
article thumbnail

Gartner Security & Risk Management Summit 2018 Trip Report

Thales Cloud Protection & Licensing

Every June, Gartner hosts a terrific security conference near Washington, D.C. called Gartner Security & Risk Management Summit. This event is focused on the needs of senior IT and security professionals, such as CISOs, chief risk officers, architects, IAM and network security leaders. This year, there were over 3,000 attendees, 120 analyst sessions to choose from, and 200 vendors that were on the show floor and delivering presentations.

Risk 59
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

China Escalates Hacks Against the US as Trade Tensions Rise

WIRED Threat Level

A hacking truce between China and the US doesn't address government espionage operations, a workaround both countries exploit.

Hacking 99
article thumbnail

'Wallchart' Phishing Campaign Exploits World Cup Watchers

Dark Reading

The details on a phishing attack designed to lure soccer fans with a subject line about the World Cup schedule and scoresheet.

article thumbnail

Domain Name Stealing at Gunpoint

Schneier on Security

I missed this story when it came around last year : someone tried to steal a domain name at gunpoint. He was just sentenced to 20 years in jail.

120
120
article thumbnail

Attention all businesses: Data security is the way to your customers? hearts (and wallets)!

Thales Cloud Protection & Licensing

For years now many organisations have approached data security with a sense of reluctance. Driven to adopt policies through a need to comply with complex regulations and a fear of picking up a fine through falling foul of the latest rules. Just look back at the amount of marketing we have seen around the launch of the GDPR this year, all of it relentlessly focused on the size of the financial penalties and, largely, adopting scare tactics designed to catch the eye and provoke pangs of guilt.

Retail 54
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Millions of Google, Roku, and Sonos Devices Are Vulnerable to a Web Attack

WIRED Threat Level

Using a technique called DNS rebinding, one amateur hacker found vulnerabilities in devices from Google, Roku, Sonos, and more.

DNS 98
article thumbnail

Cisco CPO: Privacy Is Not About Secrecy or Compliance

Dark Reading

Michelle Dennedy sat down with Dark Reading at the recent Cisco Live to set the record straight about privacy, regulation, encryption, and more.

article thumbnail

New Phishing Scam Reels in Netflix Users to TLS-Certified Sites

Threatpost

Researchers are warning of a new Netflix phishing scam that leads to sites with valid TLS certificates.

Scams 63
article thumbnail

Agencies Step Up to Data Security Challenge

Thales Cloud Protection & Licensing

Data-level security is not just another mandate. It’s a necessity. That was a recurring theme during a roundtable discussion held in advance of the Data Security Summit at Spire in Washington, D.C. The theme of the summit, sponsored by Thales eSecurity, was “IT Modernization: The New Cyber Agenda.”. The roundtable, including more than a dozen IT and cyber leaders from government and industry, explored the business drivers, challenges and evolving strategies around cybersecurity in government.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Apple's Latest iOS 12 Feature Will Save Lives by Pushing Your Location to 911

WIRED Threat Level

Forget memoji. Apple's push to transmit instant, accurate locations during emergency calls will have a profound effect for first responders.

87
article thumbnail

The Best and Worst Tasks for Security Automation

Dark Reading

As with all new tech, there are good times and and bad times to use it. Security experts share which tasks to prioritize for automation.

72
article thumbnail

Olympic Destroyer Returns to Target Biochemical Labs

Threatpost

The threat actors appear to be in a reconnaissance phase, which could be a prelude to a larger cyber-sabotage attack meant to destroy and paralyze infrastructure.

Malware 45
article thumbnail

Sophos XG vs SonicWall NSA: Top NGFWs Compared

eSecurity Planet

A look at the strengths and weaknesses of Sophos XG and SonicWall NSA, two top next-generation firewalls.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

Bill Could Give Californians Unprecedented Control Over Data

WIRED Threat Level

Lawmakers in California have introduced a sweeping privacy bill that could reign in the power of their Silicon Valley neighbors.

83
article thumbnail

'Hidden Tunnels' Help Hackers Launch Financial Services Attacks

Dark Reading

Hackers are using the infrastructure, meant to transmit data between applications, for command and control.

article thumbnail

Roku TV, Sonos Speaker Devices Open to Takeover

Threatpost

The Roku streaming video device and the Sonos Wi-Fi speakers suffer from the same DNS rebinding flaw reported in Google Home and Chromecast devices earlier this week.

DNS 44
article thumbnail

Disaster Recovery Plan for Enterprise

Spinone

Now we observe how businesses and non-profits are moving all of their valuable data to the cloud. Backup has already become their culture and savvy ones introduce CASB systems to protect their data from the most popular and dangerous cyber security risks. But since nobody knows what kind of new threat can occur, the only response remaining in case of a disaster is to follow a Disaster Recovery plan.

Backups 40
article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.