Sat.Dec 02, 2017 - Fri.Dec 08, 2017

article thumbnail

"Crypto" Is Being Redefined as Cryptocurrencies

Schneier on Security

I agree with Lorenzo Franceschi-Bicchierai, " Cryptocurrencies aren't 'crypto' ": Lately on the internet, people in the world of Bitcoin and other digital currencies are starting to use the word "crypto" as a catch-all term for the lightly regulated and burgeoning world of digital currencies in general, or for the word "cryptocurrency" -- which probably shouldn't even be called "currency," by the way. [.].

article thumbnail

Quantum Computing Is the Next Big Security Risk

WIRED Threat Level

Opinion: Rep. Will Hurd of Texas argues that quantum computers will rock current security protocols that protect government and financial systems.

Risk 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Inside Mirai the infamous IoT Botnet: A Retrospective Analysis

Elie

This post provides a retrospective analysis of Mirai — the infamous Internet-of-Things botnet that took down major websites via massive distributed denial-of-service using hundreds of thousands of compromised Internet-Of-Things devices. At its peak in September 2016, Mirai temporarily crippled several high-profile services such as. OVH. , Dyn. , and.

IoT 107
article thumbnail

NIST Releases New Cybersecurity Framework Draft

Dark Reading

Updated version includes changes to some existing guidelines - and adds some new ones.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Germany Preparing Backdoor Law

Schneier on Security

The German Interior Minister is preparing a bill that allows the government to mandate backdoors in encryption. No details about how likely this is to pass. I am skeptical.

article thumbnail

Ethiopian Espionage Shows Commercial Spyware Is Out of Control

WIRED Threat Level

Opinion: A new report from Citizen Lab shows that governments are using commercial spyware to surveil dissidents and journalists.

Spyware 111

LifeWorks

More Trending

article thumbnail

54 Percent of Energy Companies Lack Security Skills for IoT

eSecurity Planet

Just 2 percent say IoT presents no new security challenges.

IoT 75
article thumbnail

Matt Blaze on Securing Voting Machines

Schneier on Security

Matt Blaze's House testimony on the security of voting machines is an excellent read. (Details on the entire hearing is here.) I have not watched the video.

178
178
article thumbnail

‘Mailsploit’ Lets Hackers Forge Perfect Email Spoofs

WIRED Threat Level

The attack uncovers bugs in how more than a dozen programs implement email's creaky protocol.

223
223
article thumbnail

Study: Simulated Attacks Uncover Real-World Problems in IT Security

Dark Reading

Some 70% of simulated attacks on real networks were able to move laterally within the network, while more than half infiltrated the perimeter and exfiltrated data.

71
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Half of U.S. Companies Face Serious Challenges in Becoming GDPR Compliant

eSecurity Planet

The deadline is less than six months away.

69
article thumbnail

Security Vulnerabilities in Certificate Pinning

Schneier on Security

New research found that many banks offer certificate pinning as a security feature, but fail to authenticate the hostname. This leaves the systems open to man-in-the-middle attacks. From the paper : Abstract : Certificate verification is a crucial stage in the establishment of a TLS connection. A common security flaw in TLS implementations is the lack of certificate hostname verification but, in general, this is easy to detect.

Banking 165
article thumbnail

Phishing Schemes Are Using HTTPS Encrypted Sites to Seem Legit

WIRED Threat Level

A green padlock might make it seem like a site is secure, but increasingly phishers are using it to lure victims into giving up sensitive info.

article thumbnail

Leveraging PCI DSS Principles for General Data Protection

Thales Cloud Protection & Licensing

In the month of November, I wrote about the options available specifically to secure data as part of a PCI DSS compliance effort. In this blog, I explore ideas for how the technology in question can be leveraged effectively for much broader general data protection requirements that are equally important for a wide variety of organizations. The benefits of thinking beyond PCI DSS.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Cryptocurrencies in the Crosshairs: NiceHash Breach Results in Theft of $83 Million

eSecurity Planet

The 4,736 Bitcoin stolen from NiceHash have surged in value over the past few days.

article thumbnail

Why Cybersecurity Must Be an International Effort

Dark Reading

The former head of cyber for the US State Department calls for agreements across countries to improve government cybersecurity.

article thumbnail

A New Bill Wants Jail Time for Execs Who Hide Data Breaches

WIRED Threat Level

A bill to punish hack hiders, Apple bug fix bumbling, and more of the week's top security stories.

article thumbnail

TeamViewer Rushes Fix for Permissions Bug

Threatpost

TeamViewer says it has issued a hotfix to address a bug that allows users sharing a desktop session to gain control of the other’s computer without permission.

Hacking 58
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Google Patches Android for 47 Vulnerabilities in Final Update for 2017

eSecurity Planet

Google end 2017 the same way it began the year, by patching media framework flaws.

Media 64
article thumbnail

Ransomware Meets 'Grey's Anatomy'

Dark Reading

Fictional Grey Sloan Memorial Hospital is locked out of its electronic medical records, but in the real world, healthcare organizations face even greater risks.

article thumbnail

Microsoft's Project Sopris Could Secure the Next Generation of IoT

WIRED Threat Level

With Project Sopris, Microsoft has a new hardware solution for the next wave of IoT security problems.

IoT 110
article thumbnail

Android Flaw Poisons Signed Apps with Malicious Code

Threatpost

An Android vulnerability called Janus allows attackers to inject malicious code into signed Android apps.

Mobile 49
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Where Armis is Taking IoT Security Next

eSecurity Planet

VIDEO: Nadir Izrael, co-founder and CTO of Armis Security, discusses the evolving landscape for Internet of Things security.

IoT 61
article thumbnail

FBI, Europol, Microsoft, ESET Team Up, Dismantle One of World's Largest Malware Operations

Dark Reading

Avalanche, aka Gamarue, aka Wauchos, malware enterprise spanned hundreds of botnets and 88 different malware families.

Malware 58
article thumbnail

Ghostery 8 Deploys Artificial Intelligence in the Fight Against Ad Trackers

WIRED Threat Level

With the release of Ghostery 8, the popular ad-blocker introduces artificial intelligence and Smart Mode, a whole new level of usability for beginners.

article thumbnail

Banking Apps Found Vulnerable to MITM Attacks

Threatpost

Using a free tool called Spinner, researchers identified certificate pinning vulnerabilities in mobile banking apps that left customers vulnerable to man-in-the-middle attacks.

Banking 49
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Online Fraud Dropped 33 Percent Between Black Friday and Cyber Monday

eSecurity Planet

It also dropped throughout 2017, a recent study found.

53
article thumbnail

NSA Employee Pleads Guilty to Illegally Retaining National Defense Secrets

Dark Reading

Nghia Hoang Pho faces up to eight years in prison for removing highly classified NSA data from workplace and storing it at home.

55
article thumbnail

APT 34 Is an Iran-Linked Hacking Group That Probes Critical Infrastructure

WIRED Threat Level

A new Iran-linked hacking group called APT 34 has been spotted lurking in the networks of financial, energy, telecom, and chemical companies.

Hacking 109
article thumbnail

Google Patches Critical Encryption Bug Impacting Pixel, Nexus Phones

Threatpost

As part of its December Android and Pixel/Nexus security updates, Google has issued patches addressing a bevy of flaws, 11 of which are rated critical.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!