Month: January 2018

How to set up 2FA on your Facebook account

Read full post As Facebook continues to embed itself into the fabric of our social and online lives – or, perhaps it’s more correct to say, as we let Facebook continue to embed itself in our lives – it’s increasingly...

/ January 15, 2018

More SCADA app vulnerabilities found

Read full post A big motivation for pulling software apart to find security flaws is the idealistic hope that developers will get the message and do a better job next time. But what happens if they don’t?

/ January 15, 2018

CES: Why doesn’t everyone use VR already?

Read full post One side effect of slower than expected uptake of VR is that virtual reality application developers have been slow to invest in creating content. In this sort of chicken-and-egg cycle, growth tends to be slow, not explosive....

/ January 15, 2018

iPhone’s Apple Health data used as evidence in murder trial

Read full post The data showed the suspect twice “climbed stairs”: what investigators said was altitude changes as the body was dragged down to a riverbank.

/ January 15, 2018

Your Facebook News Feed is getting an overhaul

Read full post Mark Zuckerberg says the refresh will bring users more “meaningful social interactions” and less content from media and businesses.

/ January 15, 2018

MaMi malware targets Mac OS X DNS settings

Read full post The malware is potentially a rehash of an old Windows DNS hijacker.

/ January 15, 2018

Monday review – the hot 22 stories of the week

Read full post From police giving out infected USBs and the ex-NSA hacker hunting hate groups’ symbols online with AI tool to Apple’s Spectre fix update, and more!

/ January 15, 2018

Fruitfly malware spied on Mac users for 13 years – man charged

Read full post US authorities have charged a 28-year-old Ohio man who is alleged to have created and installed creepy spyware on thousands of computers for 13 years. The post Fruitfly malware spied on Mac users for 13 years –...

/ January 12, 2018

France Might Vet Acquisitions of AI, Data Protection Firms

Read full post Finance minister raises possibility of adding artificial intelligence and data security to list of nation’s strategically important, regulated sectors

/ January 12, 2018

How to Attract More Women Into Cybersecurity – Now

Read full post A recent survey finds a number of attributes women seek in their careers can be found in a cybersecurity profession – the dots just need to be connected.

/ January 12, 2018

House Passes Bill to Renew NSA’s Warrantless Surveillance Program

Read full post The bill passed without an amendment which would require a warrant to analyze Americans’ incidentally collected data.

/ January 12, 2018

Cryptocurrency as the lure, an ISO as the attachment – why not open it?

Read full post Phishers are using the hot topic of cryptocurrency as a means to an end in cybercrime, not merely as the end itself…

/ January 12, 2018

Cyber News Rundown: Edition 1/12/18

Read full post The Cyber News Rundown brings you the latest happenings in cyber news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst with a passion for all things security. Any questions? Just ask. Exploitable Backdoor...

/ January 12, 2018

What Can We Learn from Counterterrorism and National Security Efforts?

Read full post The best practices and technologies that originated in the intelligence realm can help businesses stay safer, too.

/ January 12, 2018

Man charged with spying on thousands of Mac users for 13 years

Read full post The technical description of the “Fruitfly” malware is spyware – but perhaps the term creepware would be more appropriate.

/ January 12, 2018

Majority of Companies Lack Sufficient IoT Policy Enforcement Tools

Read full post Shortfall exists despite nearly all global technology enterprise companies having security policies to manage IoT devices.

/ January 12, 2018

AMD processors: Not as safe as you might have thought

Read full post With all the hub-bub about Meltdown and Spectre, AMD CPUs are widely regarded as being perfectly safe. Well AMD chips may be safer, but they’re not invulnerable.

/ January 12, 2018

Bitcoin conference won’t let you pay with Bitcoin

Read full post The transaction fees, which have risen from pennies to tens of dollars, plus network congestion are causing some merchants to block bitcoin.

/ January 12, 2018

Police give out infected USBs as prizes in cybersecurity quiz

Read full post Quiz winners at a data security expo were given USBs, which been accidentally infected with executable malware files

/ January 12, 2018

ICO fines spam-happy companies £600,000

Read full post Four UK companies have been slapped with fines for nuisance marketing.

/ January 12, 2018

Security event in Taiwan ‘rewards’ quiz winners with malware-laden USB drives

Read full post The distribution of the USB sticks was halted on December 12 after some of the quiz’s successful entrants reported that their rewards had been flagged by their security software as containing malware. The post Security event in...

/ January 12, 2018

These are the House members who voted to extend NSA spying and reject privacy reforms

Read full post And nearly all of them are up for re-election later this year.

/ January 11, 2018

Survey Suggests Many Are Still Waiting for Spectre, Meltdown Windows Updates

Read full post Microsoft’s insistence on a specific registry key setting for offering the updates on systems appears to be the issue, security vendor Barkly says.

/ January 11, 2018

Microsoft Launches ‘Private Conversations’ in Skype

Read full post New feature uses Signal Protocol for strong encryption.

/ January 11, 2018

Responding to the Rise of Fileless Attacks

Read full post Fileless attacks, easier to conduct and more effective than traditional malware-based threats, pose a growing challenge to enterprise targets.

/ January 11, 2018

Privacy: The Dark Side of the Internet of Things

Read full post Before letting an IoT device into your business or home, consider what data is being collected and where it is going.

/ January 11, 2018

RIG EK Remains Top of Heap, Turns to Cryptomining

Read full post Popular exploit kit turns its sights to drive-by cryptomining in what security researchers believe will be a trend to follow in 2018.

/ January 11, 2018

FBI director says ‘unbreakable encryption is a public safety issue’

Read full post FBI director Christopher Wray is still fighting for encryption back door

/ January 11, 2018

AI in Cybersecurity: Where We Stand & Where We Need to Go

Read full post How security practitioners can incorporate expert knowledge into machine learning algorithms that reveal security insights, safeguard data, and keep attackers out.

/ January 11, 2018

Facebook settles after 14-year-old sues over nude image reposting

Read full post The alleged extortionist, still facing charges, reposted the image to shame sites multiple times. Why didn’t Facebook use hashes to stop it?

/ January 11, 2018

Why Facebook Security Questions Are no Substitute for MFA

Read full post If identity is established based on one thing you know and one thing you have, the latter should not also be a thing you know because in the sharing economy, we share everything.

/ January 11, 2018

Drunk droning could cost you jail time in New Jersey

Read full post The New Jersey law would make inebriated droning a disorderly person’s offense.

/ January 11, 2018

Vulnerable Mobile Apps: The Next ICS/SCADA Cyber Threat

Read full post Researchers find nearly 150 vulnerabilities in SCADA mobile apps downloadable from Google Play.

/ January 11, 2018

Warbiking in Perth – how does Wi-Fi security stack up these days?

Read full post Perth, Western Australia. Christmas in summer. Warbiking in the sunshine! Here’s what we found…

/ January 11, 2018

Let’s Encrypt disables TLS-SNI-01 validation

Read full post It is possible to exploit the protocol to obtain certificates for domains you do not own.

/ January 11, 2018

CES 2018: The price of tech is dropping, kids can do this!

Read full post Row after row of startup tech here has tiny modules designed to be mashed up into the next big thing if their founders have anything to say about it, and the trend continues. The post CES 2018:...

/ January 11, 2018

CISOs’ No. 1 Concern in 2018: The Talent Gap

Read full post Survey finds ‘lack of competent in-house staff’ outranks all other forms of cybersecurity worry, including data breaches to ransomware attacks.

/ January 10, 2018

New Year’s #sophospuzzle crossword 2017/2018 – solution and winners!

Read full post Here you go – #sophospuzzle crossword, NYE 2017/2018 – the answers and the winners

/ January 10, 2018

Cisco Adds Encrypted Traffic Analysis Function

Read full post New Encrypted Traffic Analytics is designed to help enterprises inspect encrypted traffic for malicious activity without having to decrypt it first.

/ January 10, 2018

AWS, Google Cloud Popular Home for Botnet Controllers

Read full post The number of command-and-control listings increase 32% in 2017, with more botnet controllers hosted in the cloud.

/ January 10, 2018