All posts by patrickdigitalmedia

US rules on reporting cybersecurity flaws set to change according to source

Read full post Currently the US government employs an inter-agency review, created under former President Barack Obama. Known as the Vulnerability Equities Process, it is tasked with deciding what happens to any cybersecurity flaws that is discovered by the National...

/ November 15, 2017

Microsoft Uses Neural Networks to Make Fuzz Tests Smarter

Read full post Neural fuzzing can help uncover bugs in software better than traditional tools, company says.

/ November 15, 2017

Adobe patches 67 vulnerabilities in Flash, Reader

Read full post The round of patches fixes critical issues, many of which lead to remote code execution.

/ November 15, 2017

Forever 21 reveals potential data breach

Read full post The retailer says that some customer credit cards may have been compromised.

/ November 15, 2017

2017 Has Broken the Record for Security Vulnerabilities

Read full post Some 40% of disclosed vulns as of Q3 are rated as severe, new Risk Based Security data shows.

/ November 14, 2017

Microsoft Word Vuln Went Unnoticed for 17 Years: Report

Read full post Researchers claim Microsoft Word vulnerability CVE-2017-11881, patched today, has existed for 17 years.

/ November 14, 2017

Google study reveals how criminals break into Gmail accounts

Read full post The researchers’ conclusion? Password-based authentication is dead in the water

/ November 14, 2017

Enterprise Physical Security Drives IoT Adoption

Read full post The vast majority of respondents to a new survey are deploying IoT technologies for building safety in the form of security cameras.

/ November 14, 2017

ID theft puppet master convicted of huge tax refund scam

Read full post His gang exploited teenagers, prison inmates and serving US soldiers amongst others

/ November 14, 2017

Google researcher finds 79 Linux USB vulnerabilities

Read full post Kernel USB drivers have turned out to be a rich hunting ground for Google researcher Andrey Konovalov

/ November 14, 2017

Companies Blindly Believe They’ve Locked Down Users’ Mobile Use

Read full post IT security teams may be in for a surprise about their mobile exposure as the GDPR compliance deadline approaches, according to a new survey.

/ November 14, 2017

What the NFL Teaches Us about Fostering a Champion Security Team

Read full post Cybersecurity experts can learn how to do a better job by keeping a close eye on the gridiron.

/ November 14, 2017

Cloudflare Buys Mobile Firm Neumob

Read full post The deal will give Cloudflare technology to optimize mobile security, performance.

/ November 14, 2017

Facebook’s ex-president: we exploited “vulnerability in human psychology”

Read full post “God only knows what it’s doing to our children’s brains”

/ November 14, 2017

ADT Expands Cybersecurity Business with Purchase of Datashield

Read full post Home and business security giant launches ADT Cybersecurity to offer managed detection and response (MDR) service.

/ November 14, 2017

Lenovo says AI crucial for enterprise as it announces new tech for training machine-learning systems

Read full post Lenovo releases new hardware and software for streamlining machine-learning on a high-performance computer systems.

/ November 14, 2017

Samsung Rewards expands to Shop Samsung app amid continued growth

Read full post What originally was supposed to be a tool to keep people using Samsung Pay, Samsung Rewards has continued to expand across more Samsung products.

/ November 14, 2017

How criminals clear your stolen iPhone for resale

Read full post Criminals have dedicated themselves to compromising iCloud accounts to wipe clean stolen devices using a set of interesting tools.

/ November 14, 2017

Russian Developer Snuck Cryptocurrency Mining into Android Apps

Read full post Apps found in Google Play turned mobile devices into cryptocurrency miners unbeknownst to their users, according to researchers from security firm Ixia.

/ November 14, 2017

Americans’ unease about cybercrime towers over conventional crimes

Read full post The high level of fear of cybercrime dovetails with the self-reported rates of victimization, as 25% of the respondents reported that their personal information or that of their household member has been stolen by hackers over the...

/ November 14, 2017

Frequent Software Releases, Updates May Injure App Security

Read full post The more frequently you release apps, the more security vulnerabilities you are likely to introduce in the code, a new study confirms.

/ November 13, 2017

Emerging IT Security Technologies: 13 Categories, 26 Vendors

Read full post A rundown of some of the hottest security product areas, and vendors helping to shape them.

/ November 13, 2017

New Banking Trojan Similar to Dridex, Zeus, Gozi

Read full post IBM researchers uncover a new form of banking malware distributed as a second-stage infection via the Emotet Trojan.

/ November 13, 2017

Optiv Buys Conexsys for Canadian Market Growth

Read full post Optiv ramps up its growth strategy with an acquisition of Conexsys, security and networking firm based in Toronto.

/ November 13, 2017

FBI “should not be reluctant” to challenge encryption in court

Read full post Deputy US Attorney General speaks out to support encryption backdoors

/ November 13, 2017

How to Leverage the Rosetta Stone of Information Sharing

Read full post A common framework will help in the development of cyber-risk management efforts.

/ November 13, 2017

Transparency of ML algorithms is a double-edged sword

Read full post Unless companies processing citizens’ personal data fully understand the reasoning behind the decisions made based on their machine-learning models, they will find themselves between a rock and a hard place. The post Transparency of ML algorithms is...

/ November 13, 2017

YouTube to crack down on inappropriate videos targeting kids

Read full post The automatic filters are far from foolproof, so YouTube’s investigating other ways to take down the disturbing content.

/ November 13, 2017

Monday review – the hot 21 stories of the week

Read full post From the 35,000 character tweet and the fake WhatsApp that was downloaded 1m times to the hacker who deleted $300m, and more!

/ November 13, 2017

Firefox to offer tracking protection for all in its next update

Read full post This next major update, Quantum, is expected to include an option to turn on Tracking Protection during normal browsing

/ November 12, 2017

You *did* encrypt that USB drive… didn’t you? [Chet Chat Podcast 265]

Read full post Here’s the latest episode of the Chet Chat podcast…enjoy.

/ November 11, 2017

Simple exploit can be used to disable Brother printers remotely

Read full post The only people who should have access to your printer’s web interface are the people who need it

/ November 11, 2017

New Locky Ransomware Takes Another Turn

Read full post A newly discovered strain of Locky ransomware has been discovered masquerading as legitimate Microsoft Word documents.

/ November 10, 2017

The teen who bought a car bomb on the Dark Web

Read full post He was arrested after accepting a package delivered to his home address

/ November 10, 2017

Google Updates Chrome to Prevent Unwanted Content, Redirects

Read full post Changes to Google Chrome aim to prevent users from being redirected to unexpected websites and unwanted content.

/ November 10, 2017

Why Common Sense Is Not so Common in Security: 20 Answers

Read full post Or, questions vendors need to ask themselves before they write a single word of marketing material.

/ November 10, 2017

6 Steps for Sharing Threat Intelligence

Read full post Industry experts offer specific reasons to share threat information, why it’s important – and how to get started.

/ November 10, 2017

Cyber News Rundown: Edition 11/10/17

Read full post The Cyber News Rundown brings you the latest happenings in cyber news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst, and a guy with a passion for all things security. Any more questions?...

/ November 10, 2017

What do Microsoft’s highly secure Windows 10 device standards tell us?

Read full post Microsoft’s hardware spec could end up being a two-minute read with two-decade implications

/ November 10, 2017

Experts share perspective on the state of journalists’ cybersafety

Read full post These days, journalists and publishers are increasingly concerned about protecting themselves, their work, and their sources. Rightfully so, for we live in a time when nearly every aspect of publishing occurs online. The post Experts share perspective...

/ November 10, 2017