Month: October 2017

Passwords Use Alone Still Trumps Multi-Factor Authentication

Read full post Strong authentication use overall remains weak but is starting to gain some ground with enterprises.

/ October 27, 2017

Honolulu gets tough on people texting while crossing

Read full post Looking at your mobile device while crossing is going to cost you

/ October 27, 2017

Cyber News Rundown: Edition 10/27/17

Read full post The Cyber News Rundown brings you the latest happenings in cyber news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst, and a guy with a passion for all things security. Any more questions?...

/ October 27, 2017

The Cybersecurity Skills Gap: Educating the next generation

Read full post A long-term strategy focused on training and educating the next generation will help to ensure enough people have the right skills for the future. The post The Cybersecurity Skills Gap: Educating the next generation appeared first on...

/ October 27, 2017

Android takes aim at ISP surveillance with DNS privacy

Read full post Google turns its attention to your unencrypted DNS

/ October 27, 2017

Firm Disputes IOActive Reports of Critical Flaws in Ship SATCOM

Read full post Inmarsat says security firm’s narrative about vulnerabilities in its AmosConnect 8 shipboard email service is overblown.

/ October 26, 2017

Security Forecast: Cloudy with Low Data Visibility

Read full post Businesses are moving more sensitive data to the cloud but struggle to monitor and manage it once it’s there.

/ October 26, 2017

‘Reaper’ IoT Botnet Likely a DDoS-for-Hire Tool

Read full post Latest IoT botnet commandeers 10,000 to 20,000 devices with an additional 2 million hosts identified.

/ October 26, 2017

Bad Rabbit Used Pilfered NSA Exploit

Read full post Turns out the fast and furious ransomware campaign in Eastern Europe this week employed the so-called ‘BadRomance’ tool to help it spread.

/ October 26, 2017

Dark Web Marketplaces’ New Home: Mobile Messaging Apps

Read full post Telegram, Discord, Whatsapp grow in popularity as criminals look for more alternatives to fly under the radar.

/ October 26, 2017

30% of Major CEOs Have Had Passwords Exposed

Read full post One in three CEOs have had passwords leaked through online services where they registered with a corporate email address.

/ October 26, 2017

Google wants you to hack Play Store apps, and it’s paying

Read full post Google plans to clean up Dodge, and it’s brought it’s wallet

/ October 26, 2017

Why Data Breach Stats Get It Wrong

Read full post It’s not the size of the stolen data dump that is important. It’s the window between the date of the breach and the date of discovery that represents the biggest threat.

/ October 26, 2017

As Congress mulls surveillance reforms, here are the good, bad, and ugly options

Read full post For the first time since the Edward Snowden surveillance revelations, lawmakers get to choose a new law.

/ October 26, 2017

5 paths to a career in cybersecurity

Read full post We asked some professionals how they got into cybersecurity.

/ October 26, 2017

Public Safety in a Connected World

Read full post The U.S. electrical grid is in “imminent danger” from cyberattacks according to a report from the U.S. Energy Department released earlier this year. Such an attack would put much of the infrastructure that we rely on for...

/ October 26, 2017

A Checklist for Securing the Internet of Things

Read full post IoT devices promise endless benefits, but they also come with serious security issues. Use this checklist to make sure your company stays safe.

/ October 26, 2017

5 Reasons Why the CISO is a Cryptocurrency Skeptic

Read full post If you think all you need is technology to defend against bad guys, you shouldn’t be a CISO. But technology is all cryptocurrency is, starting with Bitcoin.

/ October 26, 2017

Cisco rolls out new storage networking telemetry capabilities

Read full post As data from critical applications proliferates, customers are looking for deep visibility across the storage network, Cisco says.

/ October 26, 2017

Hackers can gain full access to maritime ship data through a built-in backdoor

Read full post The AmosConnect communication shipboard platform is so weak, complete hijacking is easy — and there’s an open door, too.

/ October 26, 2017

Doubling Up on AV Fails to Protect 40% of Users from Malware Attacks

Read full post Traditional signature-based antivirus solutions are falling short on protecting endpoints, even when there are two or more deployed.

/ October 26, 2017

How to secure your router to prevent IoT threats?

Read full post The router is the first device that you must consider, since it not only controls the perimeter of your network, but all your traffic and information pass through it. The post How to secure your router to...

/ October 26, 2017

Mr. Robot eps3.2_legacy.so – the security review

Read full post We’re looking at how Mr Robot’s treatment of security stacked up in s3 e3

/ October 26, 2017

National Cybersecurity Awareness Month Twitter Chats part 4

Read full post In our previous blog entries we covered Simple Steps to Online Safety and Cybersecurity in the Workplace. In the blog today we will be talking about some of today’s predictions when it comes to the internet of...

/ October 26, 2017

Bad Rabbit Dies Down But Questions Remain

Read full post The origins of the rapid-fire ransomware attack campaign affecting mainly Russian targets remain a bit of a mystery.

/ October 25, 2017

Windows 10 Update: 10 Key New Security Features

Read full post Microsoft is tightening its focus on Windows 10 security with several new security tools in its latest major OS update.

/ October 25, 2017

Creep signs plea deal for celebrity nudes hack

Read full post A third man faces 18 months in prison for phishing passwords for people’s Apple iCloud and Gmail accounts

/ October 25, 2017

Advanced Analytics + Frictionless Security: What CISOS Need to Know

Read full post Advances in analytics technologies promise to make identity management smarter and more transparent to users. But the process is neither straightforward nor easy. Here’s why.

/ October 25, 2017

Third Man Charged in Hacking Celebrities’ iCloud and Gmail Accounts

Read full post An Illinois man is charged with hacking into more than 550 accounts that belong to entertainment industry figures and others.

/ October 25, 2017

Productivity, Operations Hardest-Hit by Endpoint Attacks

Read full post Operational outcomes from infected endpoints are more common than data loss or financial effects, researchers found.

/ October 25, 2017

Why Patching Software Is Hard: Organizational Challenges

Read full post The Equifax breach shows how large companies can stumble when it comes to patching. Organizational problems can prevent best practices from being enforced.

/ October 25, 2017

Hackers steal compromising photos from plastic surgery clinic

Read full post Nudity will always get people’s attention.

/ October 25, 2017

Canadian SMBs: How technology can help you stay energized

Read full post Canadian small and medium businesses (SMBs) use a multitude of skills and resources to continuously improve all aspects of their companies’ performance. The post Canadian SMBs: How technology can help you stay energized appeared first on WeLiveSecurity

/ October 25, 2017

Kaspersky admits to reaping hacking tools from NSA employee PC

Read full post Apparently, a pirate download of Microsoft Office could be the root of all the trouble.

/ October 25, 2017

How to turn your watch, shoes, or household junk into a password

Read full post Researchers are exploring ways to use your smartphone’s camera as a secure way to identify yourself.

/ October 25, 2017

Whistleblower system SecureDrop fixes information leak vulnerability

Read full post While serious, the bug would take advanced skills to exploit in a very small time window.

/ October 25, 2017

Hackers hijack Coinhive cryptocurrency miner through an old password

Read full post Yet another lesson in how not to secure your network.

/ October 25, 2017

Kaspersky Lab Collected, Then Deleted NSA File from a Home Computer

Read full post Concerns over handling classified US data one of the reasons why Kaspersky Lab CEO ordered file deletion, company says.

/ October 24, 2017

Bad Rabbit ransomware outbreak

Read full post The Bad Rabbit ransomware outbreak is spreading into Europe from Russia

/ October 24, 2017

‘Bad Rabbit’ Ransomware Attacks Rock Russia, Ukraine – and Beyond

Read full post Attack employs new version of infamous NotPetya ransomware used in June attacks on Ukraine targets.

/ October 24, 2017