93% of Cloud Applications Aren’t Enterprise-Ready

Read full post The average business uses 1,181 cloud services, and most don’t meet all recommended security requirements, Netskope says.

/ February 23, 2018

NPM update changes critical Linux filesystem permissions, breaks everything

Read full post A recent update to the Node Package Manager introduced a bug that caused it to interfere with the operating system, by locking the system itself out of numerous mission-critical files

/ February 23, 2018

‘OMG’: New Mirai Variant Converts IoT Devices into Proxy Servers

Read full post The new malware also can turn bots into DDoS attack machines, says Fortinet.

/ February 23, 2018

10 Can’t-Miss Talks at Black Hat Asia

Read full post With threats featuring everything from nation-states to sleep states, the sessions taking place from March 20-23 in Singapore are relevant to security experts around the world.

/ February 23, 2018

Visa: EMV Cards Drove 70% Decline in Fraud

Read full post Merchants who adopted chip technology saw a sharp decline in counterfeit fraud between 2015 and 2017, Visa reports.

/ February 23, 2018

Leveraging Security to Enable Your Business

Read full post When done right, security doesn’t have to be the barrier to employee productivity that many have come to expect. Here’s how.

/ February 23, 2018

Enabling Better Risk Mitigation with Threat Intelligence

Read full post In order to get the maximum benefit from threat intel you need to be able to operationalize it. Here’s how.

/ February 23, 2018

Bitcoin exchange founder charged with covering up hack

Read full post Prosecutors charged Jon Montroll, chief of the belly-up BitFunder, of trying to cover up a hack that gutted it of 6,000 Bitcoins.

/ February 23, 2018

Rancher sues Feds for sneaking a spy camera on to his land

Read full post Just like that camera and the agents who stuck it in that tree, the federal lawsuit is treading on contentious territory

/ February 23, 2018

5 signs you may be talking to a bot

Read full post If you’re on social media – be it Twitter, Facebook or Instagram – it’s worth asking yourself: Can you tell when you’re talking to a bot?

/ February 23, 2018

Poor smart contract coding exposes millions of dollars in Ethereum

Read full post Researchers have discovered over 30,000 contracts are open to exploit.

/ February 23, 2018

Hacker claims spyware maker Retina-X has been breached, again

Read full post Retina-X denies that the vigilante hacker got in

/ February 23, 2018

Drupal patches critical CMS vulnerabilities

Read full post The bugs include incorrect code handling and access bypass security flaws.

/ February 23, 2018

Six tips to help you avoid targeted marketing

Read full post If you get sick of shopping sites sending you “I see you stared at this item, here’s some similar stuff” messages, you may be able to modify your subscriptions or notifications to make this stop. The post...

/ February 23, 2018

Cyber News Rundown: Linux OS Hacked onto Nintendo Switch

Read full post The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst and a guy with a passion for all things security. Any questions? Just...

/ February 23, 2018

Best Practices for Recruiting and Retaining Women in Security

Read full post Gender diversity can help fill the security talent gap, new Forrester Research report says.

/ February 22, 2018

Criminals Obtain Code-Signing Certificates Using Stolen Corporate IDs

Read full post The certificates are available on demand at prices ranging from $299 to $1,599, says Recorded Future.

/ February 22, 2018

It’s Not What You Know, It’s What You Can Prove That Matters to Investigators

Read full post Achieving the data visibility to ensure you can provide auditors with the information they need after a breach, and do so in just a few days, has never been more difficult.

/ February 22, 2018

SEC: Companies Must Disclose More Info on Cybersecurity Attacks & Risks

Read full post New agency guidance statement also says company officials, execs can’t trade stocks if they have unannounced information on a security breach at the company.

/ February 22, 2018

IRS Warns of Spike in W-2 Phishing Emails

Read full post The IRS reports an increase in reports of phishing emails asking for W-2 information.

/ February 22, 2018

US border officials haven’t properly verified visitor passports for more than a decade

Read full post E-passports contain a cryptographic hash of a passport holders’ details, designed to

/ February 22, 2018

Anatomy of an Attack on the Industrial IoT

Read full post How cyber vulnerabilities on sensors can lead to production outage and financial loss.

/ February 22, 2018

Survey shows sloppy password habits among young Brits

Read full post Young people were singled out as increasingly likely victims of internet-borne fraud, including because of their penchant for liberal sharing of personal information. The post Survey shows sloppy password habits among young Brits appeared first on WeLiveSecurity

/ February 22, 2018

Security Liability in an ‘Assume Breach’ World

Read full post Cybersecurity today is more than an IT issue. It’s a product quality issue, a customer service issue, an operational issue, and an executive issue. Here’s why.

/ February 22, 2018

Tesla cryptojacked by currency miners

Read full post Tesla’s Amazon Web Services (AWS) cloud account was broken into by hackers who suckled at its computer power for cryptocurrency mining

/ February 22, 2018

How one guy could have taken over any Tinder account (but didn’t)

Read full post The potential outcome of the Tinder security hole – complete account takeover, with a crook logged in as you

/ February 22, 2018

Friendly warnings left in unsecured Amazon S3 buckets which expose private data

Read full post Ethical hackers are warning businesses who use Amazon S3 cloud storage if they have left data exposed for anyone to access… by leaving “friendly warnings” on the servers. The post Friendly warnings left in unsecured Amazon S3...

/ February 22, 2018

Hackers are selling legitimate code-signing certificates to evade malware detection

Read full post Code-signed apps are harder to detect by network security appliances, making it easier to sneak malware onto a vulnerable system. The downside? Certificates aren’t cheap — and hackers usually are.

/ February 22, 2018

Another baby monitor is allowing strangers to spy on children

Read full post Researchers say Mi-Cam is easy to hijack: turn it off to keep the kids from being eyeballed by prying eyes or chatted up by strangers.

/ February 22, 2018

Vectra raises $36 million in AI-based threat detection push

Read full post The startup’s Series D round highlights investor interest in AI cybersecurity systems.

/ February 22, 2018

UK Companies House strips company director info to combat identity theft

Read full post Company directors are being targeted en masse by identity fraudsters in the UK.

/ February 22, 2018

Lack of funding exposes US federal agencies to high data breach risks

Read full post Budget cuts and other restraints are hampering the government from effectively protecting itself against cyberattacks.

/ February 22, 2018

Global Cybercrime Costs Top $600 Billion

Read full post More than 50% of attacks result in damages of over $500K, two reports show.

/ February 21, 2018

GitLab fixes security issue that let anyone hijack custom domains

Read full post A security researcher hijacked 700 domains and subdomains in less than a minute.

/ February 21, 2018

The Mobile Threat: 4 out of 10 Businesses Report ‘Significant’ Risk

Read full post Organizations put efficiency and profit before security, leading to system downtime and data loss, according to inaugural research from Verizon.

/ February 21, 2018

Trucking Industry Launches Info Sharing, Cybercrime Reporting Service

Read full post American Trucking Associations developed new Fleet CyWatch threat reporting, information sharing service in conjunction with FBI.

/ February 21, 2018

Cyber Aware – are passwords past it? (Hint: no.) [VIDEO]

Read full post Getting your online password situation right is easier than you think – so here’s how to do it!

/ February 21, 2018

Takeaways from the Russia-Linked US Senate Phishing Attacks

Read full post The Zero Trust Security approach could empower organizations and protect their customers in ways that go far beyond typical security concerns.

/ February 21, 2018

7 Cryptominers & Cryptomining Botnets You Can’t Ignore

Read full post Cryptominers have emerged as a major threat to organizations worldwide. Here are seven you cannot afford to ignore.

/ February 21, 2018

Apple defuses ‘text bomb’ bug

Read full post A number of text-based apps crashed, became unresponsive or entered an endless bootloop when attempting to show the otherwise little-used character from a language that is spoken by some 75 million people. The post Apple defuses ‘text...

/ February 21, 2018