Category: Uncategorized

Cyber News Rundown: Edition 5/5/17

Read full post The Cyber News Rundown brings you the latest happenings in cyber news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst, and a guy with a passion for all things security. Any more questions?...

/ May 12, 2017

Man who padded timesheets fined $318,000 for trashing boss’s servers

Read full post His strategy: pad the payroll program with extra hours, in black letters, on a black background, in 1-pt type, then demolish the server.

/ May 12, 2017

Trump Issues Previously Delayed Cybersecurity Executive Order

Read full post EO calls for immediate review of federal agencies’ security postures, adoption of the NIST Framework, and a focus on critical infrastructure security.

/ May 11, 2017

Trump’s cybersecurity executive order met with mixed reviews

Read full post The order asks for a full review of all cyber capabilities in an effort to strengthen federal systems, but that might be tough — if not impossible — given the timeline.

/ May 11, 2017

Keylogger Discovered in Some HP Laptops

Read full post Researchers discovered the audio driver in some HP laptops contains a tool to record and save users’ keystrokes.

/ May 11, 2017

What Developers Don’t Know About Security Can Hurt You

Read full post Developers won’t start writing secure code just because you tell them it’s part of their job. You need to give them the right training, support, and tools to instill a security mindset.

/ May 11, 2017

Google won’t fix Android ‘contentjacking’ flaw for months

Read full post Google Play is a bit like a happening nightclub: the faster you let people in, the less time you have to spend keeping troublemakers out.

/ May 11, 2017

News in brief: laptop ban could be extended; DDoS hits news sites; Taiwan might block Google DNS

Read full post Your daily round-up of some of the other stories in the news

/ May 11, 2017

Would you like a side of facial recognition with your pizza?

Read full post Oslo pizza joint’s menu includes facial recognition so that it can serve up gender-specific ads – meat to the men, salad to the women

/ May 11, 2017

Hackers who stole information from law firms and made millions by insider trading, fined $9 million

Read full post Law firms, PR agencies, newswires, accountants… all manner of firms need to ensure that they are working hard to secure the information entrusted to them by their corporate clients, and keep it out of unauthorised hands. The...

/ May 11, 2017

‘Keylogger’ found on several HP laptops

Read full post A security researcher says an audio driver is recording every keystroke entered, accessible to any person or malware that knows where to look.

/ May 11, 2017

SSA Plans Stronger Website Authentication

Read full post Starting in June 2017, the US Social Security Administration will require a more secure login process for SSA.gov.

/ May 11, 2017

Artificial Intelligence: Cybersecurity Friend or Foe?

Read full post The next generation of situation-aware malware will use AI to behave like a human attacker: performing reconnaissance, identifying targets, choosing methods of attack, and intelligently evading detection.

/ May 11, 2017

Unhappy 39th birthday, spam, and many unhappy returns

Read full post As computing reaches middle age, expect to see more of these kinds of anniversaries

/ May 11, 2017

Anti-trust, EU complaints and the anti-malware industry

Read full post ESET’s Tony Anscombe takes a closer look at the anti-malware industry. The post Anti-trust, EU complaints and the anti-malware industry appeared first on WeLiveSecurity

/ May 11, 2017

One more way to get busted on the Dark Web

Read full post Tor users suspected of child abuse imagery may have visited an outside file-sharing service – simply because Tor is so slow at routing traffic

/ May 11, 2017

Businesses Not Properly Securing Microsoft Active Directory

Read full post Businesses overlook key security aspects of AD, leaving sensitive data open to external and internal attacks, new study shows.

/ May 10, 2017

‘Systemic’ Cyberattack Most Likely to Hit Financial, Energy Sectors

Read full post The financial services industry is among the top five industries that likely face a systemic cyberattack, according to a survey released today.

/ May 10, 2017

Your IoT Baby Isn’t as Beautiful as You Think It Is

Read full post Both development and evaluation teams have been ignoring security problems in Internet-connected devices for too long. That must stop.

/ May 10, 2017

News in brief: Game of Thrones tells cast to use 2FA; Cisco flaw patched; Windows 10 on 500m devices

Read full post Your daily round-up of some of the other stories in the news

/ May 10, 2017

Minority Report in Chicago as police aim to stop crime before it happens

Read full post As gun crime in Chicago reaches record levels, police claim that it’s having an impact on crime prevention, but civil rights campaigners are less convinced

/ May 10, 2017

APT28, Turla Nation-State Groups Deployed Multiple 0Days in Recent Attacks

Read full post Attack campaigns by APT28, Turla, and an unidentified group showcase easy availability of zero-days.

/ May 10, 2017

How to hack a Jeep Cherokee – but don’t try this at home, kids

Read full post Carmakers are going to have to get much better at securing their vehicles now that the researchers who demonstrated how to hack a Cherokee Jeep added their notes to the tools already online

/ May 10, 2017

FTC Launches Cybersecurity Resource Website for SMBs

Read full post Federal Trade Commission website offers free tips and information for small businesses.

/ May 10, 2017

Holidaymakers warned against increased threat from online fraudsters

Read full post An increasing number of holidaymakers are finding themselves targeted by online fraudsters, according to a new study. The post Holidaymakers warned against increased threat from online fraudsters appeared first on WeLiveSecurity

/ May 10, 2017

A bot is flooding the FCC’s website with fake anti-net neutrality comments

Read full post Several people we spoke to denied they had posted comments to the FCC’s feedback pages, in which one-in-ten comments appear to be fake.

/ May 10, 2017

Extreme Makeover: AI & Network Cybersecurity

Read full post In the future, artificial intelligence will constantly adapt to the growing attack surface. Today, we are still connecting the dots.

/ May 10, 2017

The Google Play apps that say they don’t collect your data – and then do

Read full post Our researchers have found more than 50 apps in Google Play that contain XavirAd, which says it doesn’t collect your personal information and then promptly sucks it up and sends it back to the mothership

/ May 10, 2017

SLocker Ransomware Variants Surge

Read full post SLocker, one of the top 20 Android malware families, has seen a six-fold increase in the number of new versions over the past six months.

/ May 10, 2017

The Long Tail of the Intel AMT Flaw

Read full post Organizations impacted by easily exploitable privilege escalation vulnerability may need time to apply firmware patches, analysts say.

/ May 10, 2017

IDC: 1 in 4 companies have no clue GDPR is coming their way

Read full post A quarter of European companies admit they were not aware of GDPR, with more than half unsure of the impact it will have, according to a new survey. The post IDC: 1 in 4 companies have no...

/ May 10, 2017

IDC: 1 in 5 companies prepared for GDPR

Read full post A quarter of European companies admit they were not aware of GDPR, with more than half unsure of the impact it will have, according to a new survey. The post IDC: 1 in 5 companies prepared for...

/ May 10, 2017

Military ‘revenge porn’ investigation leads to 21 felony cases

Read full post Despite facial recognition and other technology, it’s still a gruelling cat-and-mouse game for investigators

/ May 10, 2017

Trump sacks FBI chief James Comey amid Russia probe

Read full post Comey was investigating Trump’s team and possible links to Russia.

/ May 10, 2017

Adobe patches critical vulnerabilities in Flash, OEM

Read full post Seven of the security flaws are critical issues.

/ May 10, 2017

Hackers Face $8.9 Million Fine for Law Firm Breaches

Read full post A federal court orders three Chinese nationals to pay $8.9 million in fines and penalties for hacking into two law firms and using stolen confidential information to trade stocks.

/ May 9, 2017

New IoT Botnet Discovered, 120K IP Cameras At Risk of Attack

Read full post The Persirai IoT botnet, which targets IP cameras, arrives hot on the heels of Mirai and highlights the growing threat of IoT botnets.

/ May 9, 2017

Good news! The entire Senate just embraced web encryption

Read full post Remember this for next time lawmakers bring out the pitchforks.

/ May 9, 2017

Android App Permission in Google Play Contains Security Flaw

Read full post Android’s app permission mechanisms could allow malicious apps in Google Play to download directly onto the device.

/ May 9, 2017

Sednit adds two zero-day exploits using ‘Trump’s attack on Syria’ as a decoy

Read full post Sednit is back – this time with two more zero-day exploits embedded in a phishing email titled Trump’s_Attack_on_Syria_English.docx. The post Sednit adds two zero-day exploits using ‘Trump’s attack on Syria’ as a decoy appeared first on WeLiveSecurity

/ May 9, 2017