Category: Uncategorized

WhatsApp is among the most blacklisted apps in the enterprise

Read full post These apps, among others, apparently pose a serious threat to business security.

/ October 3, 2017

How a Twitter troll was slain

Read full post After two months tracking down the troll, what does Foxlin think of Twitter support? “Twitter support was a bot”

/ October 3, 2017

How forgetting to renew a domain name cost $3m

Read full post If only they’d hit auto-renew

/ October 3, 2017

ESET at Virus Bulletin 2017

Read full post The annual Virus Bulletin International Conference takes place in Madrid, Spain this October and ESET will be well represented across the three-day event. The post ESET at Virus Bulletin 2017 appeared first on WeLiveSecurity

/ October 3, 2017

Google exposes seven severe flaws in Dnsmasq

Read full post The DNS software package is often found in Linux distributions, routers, and IoT devices.

/ October 3, 2017

The State of Ransomware

Read full post Ransomware has become one of the most prevalent new cybersecurity threats faced by today’s enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization’s ransomware experiences, defense plans, and...

/ October 2, 2017

Equifax: Number of US Breach Victims Rises to 145.5 Million

Read full post Credit bureau provides update on its breach investigation.

/ October 2, 2017

FBI Won’t Have to Reveal iPhone-Cracking Tool Used in Terror Case

Read full post Revealing vendor’s name and pricing details a threat to national security, DC court says.

/ October 2, 2017

Bitcoin’s soft and vulnerable underbelly

Read full post Your bitcoins are only as safe as your private key

/ October 2, 2017

3 simple steps to online safety

Read full post It’s Cybersecurity Awareness Month, so here are 3 simple steps to make you more #CyberAware…

/ October 2, 2017

News in brief: Whole Foods holed; Facebook face lock; Mining malware

Read full post Your daily round-up of some of the other stories in the news

/ October 2, 2017

Google Tightens Web Security for 45 TLDs with HSTS

Read full post Google broadens HTTPS Strict Transport Security to Top Level Domains under its control and makes them secure by default.

/ October 2, 2017

How to improve your iPhone or iPad battery life with iOS 11

Read full post New to iOS 11? Here’s how you can conserve your battery power with the latest software update.

/ October 2, 2017

5 IT Practices That Put Enterprises at Risk

Read full post No one solution will keep you 100% protected, but if you avoid these common missteps, you can shore up your security posture.

/ October 2, 2017

UK National Lottery knocked offline by DDoS attack

Read full post The UK National Lottery website and smartphone app are taken offline as a DDoS attack strikes. The post UK National Lottery knocked offline by DDoS attack appeared first on WeLiveSecurity

/ October 2, 2017

Global Cyber Security Month 2017

Read full post European Cyber Security Month and similar events, give cybersecurity companies the opportunity to reach out to the masses and get them involved. The post Global Cyber Security Month 2017 appeared first on WeLiveSecurity

/ October 2, 2017

Weakness In Windows Defender Lets Malware Slip Through Via SMB Shares

Read full post CyberArk says the manner in which Defender scans for malicious executables in SMB shares gives attackers an opening.

/ October 2, 2017

Government demands for Apple and Google data keep on climbing

Read full post Law enforcement agencies and governments haven’t lost their taste for data from the two tech titans’ devices, users and accounts.

/ October 2, 2017

FBI’s secret iPhone hacking tool must stay under wraps, court rules

Read full post That’s it, case closed: the media companies that filed a Freedom of Information Act request can’t appeal

/ October 2, 2017

Monday review – the hot 20 stories of the week

Read full post From the Facebook spy hoax and the mass-spoofing of ships’ GPS in the Black Sea to the password-beaming software flaw, and more!

/ October 2, 2017

FBI allowed to keep secret details of iPhone hacking tool, court rules

Read full post The case sparked months of legal tension between Apple and the FBI, before federal agents eventually bought a hacking tool to break into a terrorist’s iPhone.

/ October 1, 2017

Best and Worst Security Functions to Outsource

Read full post Which security functions are best handled by third parties, and which should be kept in-house? Experts weigh in.

/ September 29, 2017

Equifax mea-culpas with free credit “locks” forever

Read full post They’ll be easy to lock and unlock… and they don’t exist yet

/ September 29, 2017

Signal app’s address book security could upset governments

Read full post The app’s novel approach turns Digital Rights Management on its head

/ September 29, 2017

Apple Shares More Data with US in First Half of 2017

Read full post Device-based data requests from government agencies dropped in the first half over last year, but Apple fulfilled a higher percentage of those requests, according to its transparency report.

/ September 29, 2017

Whole Foods Reports Credit Card Breach

Read full post The breach affects customers of certain Whole Foods taprooms and table-service restaurants.

/ September 29, 2017

Apple Mac Models Vulnerable to Targeted Attacks

Read full post Several updated Mac models don’t receive EFI security fixes, putting machines at risk for targeted cyberattacks.

/ September 29, 2017

Analyzing Cybersecurity’s Fractured Educational Ecosystem

Read full post We have surprisingly little data on how to evaluate infosec job candidates academic qualifications. That needs to change.

/ September 29, 2017

Android malware ZNIU exploits DirtyCOW vulnerability

Read full post DirtyCOW can be used to compromise phones and tablets

/ September 29, 2017

CISOs Offer Soup-to-Nuts C-Suite Strategy

Read full post Chief information security officers from Dell, RCB Bank and other organizations share what it takes to become a security exec, sit in the C-Suite, and keep the job.

/ September 29, 2017

Cloud security policy: The questions you need to ask

Read full post Cloud services are very much what you make of them, and you need to apply at least an equivalent level of rigorousness, in terms of risk assessment, as you would with assets that are hosted on your...

/ September 29, 2017

iPhone X Face ID baffled by kids, twins, siblings, doppelgängers

Read full post Get the lowdown on Apple’s newly released Face ID Security Overview

/ September 29, 2017

Cyber News Rundown: Edition 9/29/17

Read full post Showtime Site Found Using Cryptocurrency Miner Following the discovery last week that ThePirateBay has been using a Monero miner to experiment with revenue alternatives for the site, researchers have found that both Showtime.com and ShowtimeAnytime.com have embedded...

/ September 28, 2017

Key Security Innovations Focus on Policy and Tech

Read full post The New York Cyber Task Force says strategic innovations, not only technical ones, have made the biggest difference.

/ September 28, 2017

DHS expanding surveillance of immigrants to social media

Read full post Social media handles, aliases, associated identifiable information and search results are included

/ September 28, 2017

Report: Bank Email Fraud Increases since Equifax Breach

Read full post Cyberthieves are impersonating banks to send bogus “secure” bank email messages.

/ September 28, 2017

Central Banks Propose Better Inter-Bank Security

Read full post Institutions from the world’s largest economies want to improve security following abuse of inter-bank messaging and payment systems.

/ September 28, 2017

Your Android lock screen pattern isn’t as safe as a PIN code

Read full post What’s safer? Using a numeric PIN code to unlock your Android smartphone or relying on a finger squiggle? The answer might surprise you. The post Your Android lock screen pattern isn’t as safe as a PIN code...

/ September 28, 2017

Ransomware Numbers Continue to Look Abysmal

Read full post Ransomware is one of the fastest-growing concerns among IT pros, according to several studies out this week.

/ September 28, 2017

Apple reported a spike in secret national security orders this year

Read full post Device and requests went down, but secret and classified orders spiked by more than three-fold.

/ September 28, 2017