Month: March 2017

​Microsoft yanks Docs.com search after complaints of exposed sensitive files

Read full post Security experts pointed to numerous sensitive and personal files found on Microsoft’s document sharing site, which lets users share documents publicly by default.

/ March 25, 2017

Experts Doubt Hackers’ Claim Of Millions Of Breached Apple Credentials

Read full post Security experts say they are skeptical that a group called Turkish Crime Family actually possess a cache of hundreds of millions of Apple iCloud account credentials.

/ March 25, 2017

How to protect your Apple iCloud account

Read full post Worried about hackers destroying your iCloud music, pictures, and documents? Here are three things you should do right now.

/ March 24, 2017

Google Slams Symantec for ‘Failures’ in SSL/TLS Certificate Process

Read full post Google Chrome engineers railed on Symantec for allegedly issuing thousands of security certificates that had not been properly validated.

/ March 24, 2017

Apple: Mac, iPhone Bugs That CIA Allegedly Exploited Were Fixed Years Ago

Read full post New WikiLeaks data dump describes “Sonic Screwdriver,” other CIA exploits for Mac desktops and iPhones

/ March 24, 2017

Intro to Cyber Insurance: 7 Questions to Ask

Read full post Buying a cyber insurance policy can be complex and difficult. Make sure you’re asking these questions as you navigate the process.

/ March 24, 2017

Privacy Advocates Vow to Fight Rollback of Broadband Privacy Rules

Read full post Privacy activists say rolling-back ISP privacy rules means health, financial and browsing habits can be used, shared and sold to the highest bidder without consent.

/ March 24, 2017

Instagram Adds Two-Factor Authentication

Read full post Instagram became the latest in a long line of services over the years to offer users two-factor authentication.

/ March 24, 2017

Prosecutors access data from locked phones of 100 Trump protesters

Read full post Personal data from protesters’ devices including photographs will be available to all the defendants’ lawyers via a cloud portal

/ March 24, 2017

News in brief: Pyongyang role in heist probed; EU to discuss laptops ban; social media rapped on terrorism

Read full post Your daily round-up of some of the other stories in the news

/ March 24, 2017

Cyber News Rundown: Edition 3/24/17

Read full post The Cyber News Rundown brings you the latest happenings in cyber news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst, and a guy with a passion for all things security. Any more questions?...

/ March 24, 2017

Phishing 101 at the School of Hard Knocks

Read full post A recent, massive spike in sophisticated and successful phishing attacks is prompting many universities to speed up timetables for deploying mandatory two-factor authentication (2FA) — requiring a one-time code in addition to a password — for access...

/ March 24, 2017

America’s JobLink Suffers Security Breach

Read full post A third-party hacker exploited a flaw in America’s JobLink application code to access the information of job seekers from 10 states.

/ March 24, 2017

Latest WikiLeaks dump shows CIA targeting Apple earlier than others

Read full post Focusing on Macs makes sense, say experts: ‘many high-value targets love to use Macs’

/ March 24, 2017

Apple underwhelmed by latest CIA exploits revealed by WikiLeaks

Read full post WikiLeaks’s revelations about security vulnerabilities in Apple products appear to be a damp squib. The post Apple underwhelmed by latest CIA exploits revealed by WikiLeaks appeared first on WeLiveSecurity

/ March 24, 2017

Apple underwhelmed by latest CIA exploits revealed by WikiLeaks

Read full post WikiLeaks’s revelations about security vulnerabilities in Apple products appear to be a damp squib. The post Apple underwhelmed by latest CIA exploits revealed by WikiLeaks appeared first on WeLiveSecurity

/ March 24, 2017

Sandia Testing New Intrusion Detection Tool That Mimics Human Brain

Read full post Neuromorphic Data Microscope can spot malicious patterns in network traffic 100 times faster than current tool, lab claims.

/ March 24, 2017

US Senate Overturns Obama Consumer Privacy Rule

Read full post The FCC regulation, passed in October, was rejected in a 50-to-48 vote and is now in the House of Representatives.

/ March 24, 2017

Prioritizing Threats: Why Most Companies Get It Wrong

Read full post To stay safer, focus on multiple-threat attack chains rather than on individual threats.

/ March 24, 2017

Threatpost News Wrap, March 27, 2017

Read full post The latest Wikileaks dump of Apple hacking tools, the LastPass vulnerabilities, and a new Android security report are discussed.

/ March 24, 2017

Still running Windows Vista? Here’s a wake-up call for you

Read full post Microsoft is finally ending its extended support for Windows Vista, which means no more security patches or other updates. If you’re one of the hold-outs, it’s time to act

/ March 24, 2017

16 years of Mac OS X: Secure but not invincible to malware

Read full post Mac OS X is still secure 16 years after its creation, but increasingly being targeted by cybercriminals. No operating system is 100% malware-proof. The post 16 years of Mac OS X: Secure but not invincible to malware...

/ March 24, 2017

16 years of Mac OS X: Secure but not invincible to malware

Read full post Mac OS X is still secure 16 years after its creation, but increasingly being targeted by cybercriminals. No operating system is 100% malware-proof. The post 16 years of Mac OS X: Secure but not invincible to malware...

/ March 24, 2017

Adware Apps Booted from Google Play

Read full post More than a dozen apps removed from Google Play store after it was determined they were overly aggressive adware.

/ March 24, 2017

GDPR: A simple explainer

Read full post The GDPR is the biggest change in data protection laws for 20 years, and comes into effect on May 25th, 2018. We answer some key questions. The post GDPR: A simple explainer appeared first on WeLiveSecurity

/ March 24, 2017

GDPR: A simple explainer

Read full post The GDPR is the biggest change in data protection laws for 20 years, and comes into effect on May 25th, 2018. We answer some key questions. The post GDPR: A simple explainer appeared first on WeLiveSecurity

/ March 24, 2017

When bad bugs bite: Apple iCloud accounts ‘held hostage’

Read full post The so-called Turkish Crime Family is demanding that Apple pays it a ransom, otherwise it will delete millions of credentials it says it possesses. The post When bad bugs bite: Apple iCloud accounts ‘held hostage’ appeared first...

/ March 24, 2017

When bad bugs bite: Apple iCloud accounts ‘held hostage’

Read full post The so-called Turkish Crime Family is demanding that Apple pays it a ransom, otherwise it will delete millions of credentials it says it possesses. The post When bad bugs bite: Apple iCloud accounts ‘held hostage’ appeared first...

/ March 24, 2017

Man charged with $100m ‘whaling’ attack on two US tech giants

Read full post Victims of whaling attack not named, but it’s not the first time a big multinational has been targeted, and it won’t be the last

/ March 24, 2017

Spock will unlock Kirk ransomware – after you beam up a bunch of Monero

Read full post It’s ransomware, Jim, but not as we know it

/ March 24, 2017

Contact centers branded the ‘Achilles heel’ of the enterprise

Read full post Could phoneprinting tackle the contact center weak link in the enterprise chain?

/ March 24, 2017

Apple Tells WikiLeaks to Submit CIA Exploits Through Normal Process

Read full post Apple’s initial analysis of the iPhone and Mac exploits disclosed by WikiLeaks on Thursday shows that the vulnerabilities they use have already been patched. The company told WikiLeaks to send the information it possesses through the regular...

/ March 24, 2017

Cisco Patches Critical IOX Vulnerability

Read full post Cisco Systems patched a critical vulnerability Wednesday that could allow an unauthenticated, remote attacker to execute remote code on affected hardware and gain root privileges. The bug is in Cisco’s Data-in-Motion (DMo) process, part of the company’s...

/ March 24, 2017

Breach of DoL Jobs Database a Threat to 10 States, so far

Read full post A multi-state database was hacked, potentially revealing names, dates of birth and Social Security numbers of hundreds of thousands of job seekers across 10 states…so far. The site, America’s Job Link Alliance (AJLA), is offered by the...

/ March 24, 2017

WikiLeaks Reveals How the CIA Can Hack a Mac’s Hidden Code

Read full post If the CIA wants inside your Mac, it may not be enough that you so carefully avoided those infected email attachments or maliciously crafted web sites designed to plant spyware on your machine. Based on new documents in...

/ March 24, 2017

OS X and Windows Targeted by Malware in Word

Read full post Researchers from FortiGuard Labs, part of Fortinet, have captured malware that infects both Windows and Apple OS X. The malware is distributed inside an infected Microsoft Word file. The malware asks the users to enable the Macro...

/ March 24, 2017

Kaspersky warns lights could go out

Read full post The connected world in which we live could suffer a catastrophic blackout unless critical infrastructure is secured, warns Eugene Kaspersky founder and CEO, Kaspersky Lab. The ramifications of a blackout, like the one recently experienced in Ukraine,...

/ March 24, 2017

Hackers: we will remotely wipe iPhones unless Apple pays ransom

Read full post Hackers are threatening to wipe out a large cache of data from 300 Million Apple accounts unless a ransom is paid. Labelling themselves as the ‘Turkish Crime Family’, the group or individual is demanding that £75,000 is...

/ March 24, 2017

IT security pros and network operators view DDoS attacks as an increased concern in 2017

Read full post DDoS attacks are a greater security threat to businesses in 2017 than ever before, and Internet Service Providers (ISPs) need to do something about it according to a new survey of IT security professionals and network operators...

/ March 24, 2017

When is a phishing email not a phishing email? The taxonomy of malicious emails

Read full post Malicious email attacks have dominated the security headlines in recent months, with 2017 already seeing large campaigns targeting Netflix and Amazon customers. Despite the number of incident however, many individuals and businesses alike don’t actually know what...

/ March 24, 2017