Month: May 2017

Cyber News Rundown: Edition 5/26/17

Read full post The Cyber News Rundown brings you the latest happenings in cyber news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst, and a guy with a passion for all things security. Any more questions?...

/ May 26, 2017

3 types of employees that can cause a data breach

Read full post When it comes to cybersecurity, what type of employee is most likely to cause a data breach? And how can companies protect themselves? The post 3 types of employees that can cause a data breach appeared first...

/ May 26, 2017

8 Most Overlooked Security Threats

Read full post Businesses know the obvious security threats to watch for, but some of the biggest dangers may not at top-of-mind.

/ May 26, 2017

Samba exploit – not quite WannaCry for Linux, but patch anyway!

Read full post SMB is the Windows networking protocol, so SMB security holes like the one that led to WannaCry can’t happen on Linux/Unix, right? Wrong!

/ May 26, 2017

Campaigners demand halt to Vermont’s use of facial recognition

Read full post Despite use of facial recognition being banned under state law, Vermont’s DMV is ‘overstepping’ the legislation, say campaigners

/ May 26, 2017

WannaCry: the rush to blame XP masked bigger problems

Read full post Many pointed the finger at Windows XP, but the worst hit computers were unpatched Windows 7 machines

/ May 25, 2017

New Samba Bug Dangerous But No WannaCry

Read full post The administrators of the open-source Samba software have fixed a newly discovered vulnerability that lets attackers upload malicious files to vulnerable systems and servers.

/ May 25, 2017

In the Cloud, Evolving Infrastructure Means Evolving Alliances

Read full post New opportunities makes for unusual bedfellows. Here’s how to navigate the shift in organizational dynamics between security operations, line-of-business managers and developers.

/ May 25, 2017

3 Nigerian Cyberthieves Sentenced to Total of 235 Years in Prison

Read full post Using love-struck girlfriends found on the Internet to help them carry out their schemes, three Nigerian cyberthieves and their cohorts made off with tens of millions of dollars in pilfered goods before they were ultimately sentenced to...

/ May 25, 2017

News in brief: Twitter pays $7,500 bounty; China gets ‘tweaked’ Windows; how to hide passwords

Read full post Your daily round-up of some of the other stories in the news

/ May 25, 2017

WannaCry Ransom Notes Penned by Chinese-Speaking Authors, Analysis Shows

Read full post Flashpoint says the Chinese-language link doesn’t shoot down theories of the North Korean Lazarus Group’s involvement in the ransomware worm attacks, however.

/ May 25, 2017

Put down the popcorn and patch your media player

Read full post A vulnerability in caption files has been patched in some media players, but it’s not clear how widespread the flaw still is

/ May 25, 2017

WannaCry Gives Consumers a First Look into Ransomware

Read full post Although ransomware has been around for two years, it took the fast-moving and expansive WannaCry to provide a majority of consumers their first glimpse, according to a study released today.

/ May 25, 2017

You Have One Year to Make GDPR Your Biggest Security Victory Ever

Read full post The EU’s new razor-toothed data privacy law could either rip you apart or help you create the best security program you’ve ever had. Here’s how.

/ May 25, 2017

Medical Devices Fall Short in Security Best Practices

Read full post More than half of medical device makers and healthcare delivery organizations anticipate an attack on their medical devices within the next 12 months, but only a smattering take significant steps to prevent it, according to a survey...

/ May 25, 2017

Ransomware: Carding’s Replacement for the Criminal Masses

Read full post Ransomware is not only here to stay, it’s going to proliferate by orders of magnitude and cause substantial risk to businesses for the foreseeable future.

/ May 25, 2017

82% of Databases Left Unencrypted in Public Cloud

Read full post Personal health information and other sensitive data is left exposed as businesses overlook encryption and network security.

/ May 25, 2017

Google debuts a new way to follow your footsteps around the web

Read full post New machine-learning tool aims to deliver even more information to Google’s advertisers about your ‘consumer journey’

/ May 25, 2017

Crysis ransomware master keys released to the public

Read full post A total of 200 master keys can now be used by victims to decrypt and unlock their systems.

/ May 25, 2017

ICO urges businesses to focus on becoming GDPR compliant

Read full post The ICO says businesses should stop focussing on the consequences of non-compliance and instead be motivated by the advantages of getting GDPR right. The post ICO urges businesses to focus on becoming GDPR compliant appeared first on...

/ May 25, 2017

Split Tunnel SMTP Exploit Bypasses Email Security Gateways

Read full post Attackers can inject malicious payloads directly to email server via email encryption appliances, Securolytics says.

/ May 25, 2017

YouTube, Twitter and Facebook face curbs on hate speech videos

Read full post Europe moves a step closer to limiting the spread of extremism and toxic content via social platforms

/ May 25, 2017

2017: These aren’t the droids you’re looking for

Read full post 40 years after the premiere of Star Wars, we’re much closer to HAL and The Terminator than we are Artoo and Threepio.

/ May 25, 2017

Apple iCloud, Android Nvidia driver N-day exploit details revealed

Read full post Kernels can be exploited and iCloud account user information leaked due to the security flaws.

/ May 25, 2017

WannaCry: The North Korea Debate

Read full post Researchers split over whether an infamous North Korean hacking group, an affiliate, or another attacker altogether, is behind the epic ransomware worm.

/ May 24, 2017

Unsanctioned Computer Support Costs Companies $88K per Year

Read full post A new survey of security professionals says that 83% of respondents help colleagues in other departments fix their privately-owned computers on company time.

/ May 24, 2017

Data Security & Privacy: The Risks of Not Playing by the Rules

Read full post Achieving compliance is a complex and challenging process. But with the right systems and policies, you can stay ahead of the next data breach – and the regulators.

/ May 24, 2017

What are “national security letters,” and why should you care?

Read full post Here’s everything you need to know about the secretive FBI’s investigative powers.

/ May 24, 2017

DDoS Attacks Fell 23% in First Quarter, Grew in Size

Read full post Although the number of DDoS attacks dropped in the first three months of the year, the average size of each attack grew, according to a Verisign report released Tuesday.

/ May 24, 2017

News in brief: drones could be hobbled; cost of ransomware counted; Target agrees $18.5m deal

Read full post Your daily round-up of some of the other stories in the news

/ May 24, 2017

Police swoop on gang that planted banking Trojan on 1m phones

Read full post The Cron gang’s malware was infecting some 3,500 Android devices every day – and siphoning money out of 60 accounts every day

/ May 24, 2017

WannaCryptor, aka WannaCry interview with Stephen Cobb and Marc Saltzman

Read full post Stephen Cobb, a senior security researcher at ESET, talks about one of the biggest cyberattacks of 2017 – WannaCryptor, aka WannaCry with radio and TV personality Marc Saltzman. The post WannaCryptor, aka WannaCry interview with Stephen Cobb...

/ May 24, 2017

Target Reaches Breach Settlement: $18.5 Million Fine, Security Controls

Read full post Target to cough up $18.5 million to 47 states in a settlement following its 2013 security breach, which exposed data of millions of customers.

/ May 24, 2017

LastPass’s new cloud backup option – sunny skies or a brewing storm?

Read full post Cloud backup for the password manager’s Authenticator certainly reduces the hassle for users – but it’s a security compromise

/ May 24, 2017

4 Reasons the Vulnerability Disclosure Process Stalls

Read full post The relationship between manufacturers and researchers is often strained. Here’s why, along with some resources to help.

/ May 24, 2017

Hacked Twitter account spits out poison – make sure yours isn’t next

Read full post Salem State University was horrified when its account was taken over and used to spout racist venom – how could they have prevented it? We’ve got some advice

/ May 24, 2017

How to protect your laptop in cargo when you fly

Read full post In this guide, learn about current regulations and how to deal with theft, insurance problems and hardware damage.

/ May 24, 2017

Twitter flaw allowed you to tweet from any account

Read full post All this time, a rather simple Twitter bug could have caused chaos on the platform.

/ May 24, 2017

Data Breach, Vulnerability Data on Track to Set New Records in 2017

Read full post There are so far 1,254 publicly reported data breaches and 4,837 published vulnerabilities in the first quarter of this year.

/ May 23, 2017

Data Breach, Vulnerability Data on Track to Set New Records in 2017

Read full post There are so far 1,254 publicly reported data breaches and 4,837 published vulnerabilities in the first quarter of this year.

/ May 23, 2017