Category: Uncategorized

White House: Russian Military Behind NotPetya Attacks

Read full post Trump administration statement comes on the heels of UK government calling out Russia for the cyberattacks that spread through Europe and elsewhere.

/ February 15, 2018

IRS Reports Steep Decline in Tax-Related ID Theft

Read full post Research group Javelin confirms that the numbers are trending in the right direction, with total fraud losses dropping more than 14% to $783 million.

/ February 15, 2018

North Korea-Linked Cyberattacks Spread Out of Control: Report

Read full post New details on old cyberattacks originating from North Korea indicate several forms of malware unintentionally spread wider than authors intended.

/ February 15, 2018

Democracy & DevOps: What Is the Proper Role for Security?

Read full post Security experts need a front-row seat in the application development process but not at the expense of the business.

/ February 15, 2018

Air Force Awards $12,500 for One Bug

Read full post The highest single bounty of any federal bug bounty program yet is awarded through Hack the Air Force 2.0.

/ February 15, 2018

Oracle Buys Zenedge for Cloud Security

Read full post Oracle announces its acquisition of Zenedge, which focuses on cloud-based network and infrastructure security.

/ February 15, 2018

From DevOps to DevSecOps: Structuring Communication for Better Security

Read full post A solid approach to change management can help prevent problems downstream.

/ February 15, 2018

The Mirai Botnet Is Attacking Again…

Read full post And the spinoff bots – and all their command and control hostnames buried in the morass of digital data – are hilarious.

/ February 15, 2018

Unsecured server exposed thousands of FedEx customer records

Read full post Another day, another exposed Amazon S3 server.

/ February 15, 2018

Hack the Air Force 2.0 uncovers over 100 vulnerabilities

Read full post Participants managed to secure themselves over $103,000 in rewards.

/ February 15, 2018

Concerns about data breaches hitting all-time high

Read full post A record-high proportion of organizations worldwide (67%) said that they had been breached at some point, up from 56% in the report’s previous edition. The post Concerns about data breaches hitting all-time high appeared first on WeLiveSecurity

/ February 15, 2018

Joke dating site matches people based on their passwords

Read full post Hey baby, nice little “abc123” ya got there.

/ February 15, 2018

Coinming frenzy is making it hard for us to find aliens

Read full post As cryptocurrency values have soared, so too has the cost of the hardware needed to mine them – if you can even buy the GPUs, given the shortages.

/ February 15, 2018

Bitcoin thieves use Google AdWords to target victims

Read full post Cisco Talos says the gang responsible has managed to steal millions of dollars through phishing campaigns.

/ February 15, 2018

Android ransomware in 2017: Innovative infiltration and rougher extortion

Read full post Ransomware in 2017 saw users and businesses across the globe trying to cope with campaigns such as Petya and WannaCryptor. Not to be outdone, Android ransomware had a year full of innovative infiltration and rougher extortion as...

/ February 15, 2018

Windows 10 Critical Vulnerability Reports Grew 64% in 2017

Read full post The launch and growth of new operating systems is mirrored by an increase in reported vulnerabilities.

/ February 14, 2018

Filing Deadline for New Infosec Law Hits NY Finance Firms Thursday

Read full post Banks and financial services companies in New York must file by tomorrow to certify they are compliant with the state Department of Financial Services’ new cybersecurity regulation, 23 NYCRR 500.

/ February 14, 2018

Intel Expands Bug Bounty Program, Offers up to $250K

Read full post Microprocessor giant adds vulnerability-finding category for Meltdown, Spectre-type flaws.

/ February 14, 2018

3 Tips to Keep Cybersecurity Front & Center

Read full post In today’s environment, a focus on cybersecurity isn’t a luxury. It’s a necessity, and making sure that focus is achieved starts with the company’s culture.

/ February 14, 2018

Watch our ads or we’ll use your CPU for cryptomining

Read full post The Salon news site are offering users a novel choice: turn off your adblocker or let it use your browser to mine cryptocurrency

/ February 14, 2018

Cybercrime Costs for Financial Sector up 40% Since 2014

Read full post A 9.6% increase just in the past year, and denial-of-service attacks are partly to blame.

/ February 14, 2018

Encrypted Attacks Continue to Dog Perimeter Defenses

Read full post Attacks using SSL to obfuscate malicious traffic finding fertile ground for growth.

/ February 14, 2018

Fileless Malware: Not Just a Threat, but a Super-Threat

Read full post Exploits are getting more sophisticated by the day, and cybersecurity technology just isn’t keeping up.

/ February 14, 2018

Patch now! Microsoft fixes over 50 serious security flaws

Read full post This week saw the second Tuesday of the month, and everyone who is responsible for protecting Windows computers knows what that means: another bundle of security patches have been released by Microsoft. The post Patch now! Microsoft...

/ February 14, 2018

Fitbit bug bounty program now pays for vulnerability reports

Read full post Bug hunters can expect to be paid for their efforts now the Fitbit public and private programs have merged.

/ February 14, 2018

The GDPR Clock Is Running Out. Now What?

Read full post Many organizations impacted by new European Union data privacy rules that go into effect May 25 are still blind to some of the basics.

/ February 14, 2018

When crooks mine cryptocoins, but you pay [Naked Security Podcast 1]

Read full post Fraser Howard of SophosLabs teaches us about cryptojacking – where crooks mine for cryptocurrency, but someone else pays for the electricity.

/ February 14, 2018

Bitcoin mining to zap more energy than households in Iceland this year

Read full post As far as Bitcoin miners are concerned, Iceland is starting to look like the best place in the world to run a business.

/ February 14, 2018

How safe are you around your smart TV?

Read full post Smart TVs afford us the opportunity to use them for purposes that are more commonly associated with computers. In fact, that’s what these TVs have become – internet-connected ‘computers’, much like mobile phones. It would no doubt...

/ February 14, 2018

New AI technology used by UK government to fight extremist content

Read full post And it won’t rule out forcing big companies like Google and Facebook to use it.

/ February 14, 2018

Cryptocurrency startup LoopX exit scams with $4.5M in ICO

Read full post It was one flaky pastry: “great profits continuously every month,” zero details on its “Loop Algorithm,” and nary a single detail on its team.

/ February 14, 2018

Adobe addresses critical vulnerabilities in Acrobat, Reader

Read full post Microsoft protected Windows users from suspected North Korean exploitation of an Adobe zero-day bug earlier this month.

/ February 14, 2018

AI and Machine Learning: Breaking Down Buzzwords

Read full post Security experts explain two of today’s trendiest technologies to explain what they mean and where you need them.

/ February 13, 2018

As Primaries Loom, Election Security Efforts Behind Schedule

Read full post While federal agencies lag on vulnerability assessments and security clearance requests, the bipartisan Defending Digital Democracy Project releases three new resources to help state and local election agencies with cybersecurity, incident response.

/ February 13, 2018

Microsoft Fixes Two Security Flaws in Outlook

Read full post February security patches include updates for 50 vulnerabilities, 14 of which are critical.

/ February 13, 2018

Microsoft Fixes Two Security Flaws in Outlook

Read full post February security patches include updates for 50 vulnerabilities, 14 of which are critical.

/ February 13, 2018

Lazarus Group Attacks Banks, Bitcoin Users in New Campaign

Read full post A new Lazarus Group cyberattack campaign combines spear-phishing techniques with a cryptocurrency scanner designed to scan for Bitcoin wallets.

/ February 13, 2018

Can Android for Work Redefine Enterprise Mobile Security?

Read full post Google’s new mobility management framework makes great strides in addressing security and device management concerns while offering diverse deployment options. Here are the pros and cons.

/ February 13, 2018

Would you allow Facebook into your home?

Read full post If you believe some of the more speculative stories on the internet right now, this question won’t be hypothetical for long.

/ February 13, 2018

Fake News: Could the Next Major Cyberattack Cause a Cyberwar?

Read full post In the way it undercuts trust, fake news is a form of cyberattack. Governments must work to stop it.

/ February 13, 2018