Sat.Dec 02, 2017 - Fri.Dec 08, 2017

article thumbnail

"Crypto" Is Being Redefined as Cryptocurrencies

Schneier on Security

I agree with Lorenzo Franceschi-Bicchierai, " Cryptocurrencies aren't 'crypto' ": Lately on the internet, people in the world of Bitcoin and other digital currencies are starting to use the word "crypto" as a catch-all term for the lightly regulated and burgeoning world of digital currencies in general, or for the word "cryptocurrency" -- which probably shouldn't even be called "currency," by the way. [.].

article thumbnail

‘Mailsploit’ Lets Hackers Forge Perfect Email Spoofs

WIRED Threat Level

The attack uncovers bugs in how more than a dozen programs implement email's creaky protocol.

215
215
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Study: Simulated Attacks Uncover Real-World Problems in IT Security

Dark Reading

Some 70% of simulated attacks on real networks were able to move laterally within the network, while more than half infiltrated the perimeter and exfiltrated data.

71
article thumbnail

TeamViewer Rushes Fix for Permissions Bug

Threatpost

TeamViewer says it has issued a hotfix to address a bug that allows users sharing a desktop session to gain control of the other’s computer without permission.

Hacking 58
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Germany Preparing Backdoor Law

Schneier on Security

The German Interior Minister is preparing a bill that allows the government to mandate backdoors in encryption. No details about how likely this is to pass. I am skeptical.

article thumbnail

Quantum Computing Is the Next Big Security Risk

WIRED Threat Level

Opinion: Rep. Will Hurd of Texas argues that quantum computers will rock current security protocols that protect government and financial systems.

Risk 110

More Trending

article thumbnail

Inside Mirai the infamous IoT Botnet: A Retrospective Analysis

Elie

This post provides a retrospective analysis of Mirai — the infamous Internet-of-Things botnet that took down major websites via massive distributed denial-of-service using hundreds of thousands of compromised Internet-Of-Things devices.

IoT 48
article thumbnail

Security Vulnerabilities in Certificate Pinning

Schneier on Security

New research found that many banks offer certificate pinning as a security feature, but fail to authenticate the hostname. This leaves the systems open to man-in-the-middle attacks. From the paper : Abstract : Certificate verification is a crucial stage in the establishment of a TLS connection. A common security flaw in TLS implementations is the lack of certificate hostname verification but, in general, this is easy to detect.

Banking 127
article thumbnail

Phishing Schemes Are Using HTTPS Encrypted Sites to Seem Legit

WIRED Threat Level

A green padlock might make it seem like a site is secure, but increasingly phishers are using it to lure victims into giving up sensitive info.

article thumbnail

Ransomware Meets 'Grey's Anatomy'

Dark Reading

Fictional Grey Sloan Memorial Hospital is locked out of its electronic medical records, but in the real world, healthcare organizations face even greater risks.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Banking Apps Found Vulnerable to MITM Attacks

Threatpost

Using a free tool called Spinner, researchers identified certificate pinning vulnerabilities in mobile banking apps that left customers vulnerable to man-in-the-middle attacks.

Banking 49
article thumbnail

Matt Blaze on Securing Voting Machines

Schneier on Security

Matt Blaze's House testimony on the security of voting machines is an excellent read. (Details on the entire hearing is here.) I have not watched the video.

136
136
article thumbnail

Ethiopian Espionage Shows Commercial Spyware Is Out of Control

WIRED Threat Level

Opinion: A new report from Citizen Lab shows that governments are using commercial spyware to surveil dissidents and journalists.

Spyware 109
article thumbnail

How the Major Intel ME Firmware Flaw Lets Attackers Get 'God Mode' on a Machine

Dark Reading

Researchers at Black Hat Europe today revealed how a buffer overflow they discovered in the chip's firmware can be abused to take control of a machine - even when it's turned 'off.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Google Cracks Down On Nosy Android Apps

Threatpost

Google beefs up privacy protections on apps distributed via third-party Android marketplaces and Google Play that that collect personal data without user consent.

article thumbnail

ProcDump for Linux v3.0 releases: Linux version of the ProcDump Sysinternals tool

Penetration Testing

ProcDump is a Linux reimagining of the classic ProcDump tool from the Sysinternals Suite of tools for Windows. ProcDump provides a convenient way for Linux developers to create core dumps of their applications based... The post ProcDump for Linux v3.0 releases: Linux version of the ProcDump Sysinternals tool appeared first on Penetration Testing.

article thumbnail

Ghostery 8 Deploys Artificial Intelligence in the Fight Against Ad Trackers

WIRED Threat Level

With the release of Ghostery 8, the popular ad-blocker introduces artificial intelligence and Smart Mode, a whole new level of usability for beginners.

article thumbnail

The Rising Dangers of Unsecured IoT Technology

Dark Reading

As government regulation looms, the security industry must take a leading role in determining whether the convenience of the Internet of Things is worth the risk and compromise of unsecured devices.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Apple Fixes Flaw Impacting HomeKit Devices

Threatpost

Apple said it has fixed an undisclosed vulnerability in its HomeKit framework that could have allowed unauthorized remote control of HomeKit devices such as smart locks and connected garage door openers.

IoT 43
article thumbnail

Are You Ready for PCI DSS 3.2?

NopSec

The updated PCI 3.2 requirements are coming to a head with a deadline this February 1st, 2018. While we’re sure that you’ve already started preparing for these new requirements, there may still be some areas that need more attention. This blog post is a quick list of the new requirements found on PCI DSS version 2, and how NopSec can help you get some them in place quickly before the deadline.

article thumbnail

APT 34 Is an Iran-Linked Hacking Group That Probes Critical Infrastructure

WIRED Threat Level

A new Iran-linked hacking group called APT 34 has been spotted lurking in the networks of financial, energy, telecom, and chemical companies.

Hacking 93
article thumbnail

Why Cybersecurity Must Be an International Effort

Dark Reading

The former head of cyber for the US State Department calls for agreements across countries to improve government cybersecurity.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Google Patches Critical Encryption Bug Impacting Pixel, Nexus Phones

Threatpost

As part of its December Android and Pixel/Nexus security updates, Google has issued patches addressing a bevy of flaws, 11 of which are rated critical.

article thumbnail

Where Armis is Taking IoT Security Next

eSecurity Planet

VIDEO: Nadir Izrael, co-founder and CTO of Armis Security, discusses the evolving landscape for Internet of Things security.

IoT 49
article thumbnail

A New Bill Wants Jail Time for Execs Who Hide Data Breaches

WIRED Threat Level

A bill to punish hack hiders, Apple bug fix bumbling, and more of the week's top security stories.

article thumbnail

Conficker: The Worm That Won't Die

Dark Reading

More than nine years after it infected millions of systems worldwide, the malware continues to be highly active, according to a Trend Micro report.

Malware 53
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

Ursnif Trojan Adopts New Code Injection Technique

Threatpost

Researchers have found a variant of Ursnif Trojan they said is a “v3 build” that targets Australian bank customers with new redirection attack techniques.

Banking 45
article thumbnail

Cryptocurrencies in the Crosshairs: NiceHash Breach Results in Theft of $83 Million

eSecurity Planet

The 4,736 Bitcoin stolen from NiceHash have surged in value over the past few days.

article thumbnail

Microsoft's Project Sopris Could Secure the Next Generation of IoT

WIRED Threat Level

With Project Sopris, Microsoft has a new hardware solution for the next wave of IoT security problems.

IoT 95
article thumbnail

Cyberattack: It Can't Happen to Us (Until It Does)

Dark Reading

Just because your small or medium-sized business isn't as well known as Equifax or Yahoo doesn't mean you're immune to becoming a cybercrime victim.

article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.