Researchers Create Framework to Evaluate Endpoint Security Products

Read full post Black Hat USA researchers tested more than 30,000 types of malware to learn the effectiveness of endpoint security tools – and they’ll demonstrate how they did it.

/ July 17, 2017

News in brief: Beijing bans Pooh; Ashley Madison offers settlement; patient data shared on Facebook

Read full post Your daily round-up of some of the other stories in the news

/ July 17, 2017

50% of Ex-Employees Still Have Access to Corporate Applications

Read full post Former employees increase the security risk for organizations failing to de-provision their corporate application accounts.

/ July 17, 2017

50% of Ex-Employees Still Have Access to Corporate Applications

Read full post Former employees increase the security risk for organizations failing to de-provision their corporate application accounts.

/ July 17, 2017

What does Imogen Heap have in common with mail? The blockchain

Read full post The blockchain isn’t just for verifying Bitcoin transactions – a number of very different ventures are using it to cut out middlemen and keep people honest

/ July 17, 2017

Wait, you didn’t want to clean the toilets? Should have read the terms!

Read full post Some 22,000 people unwittingly agreed to clean bathrooms and hug stray cats and dogs in return for free WiFi – and their experience is a good reminder to be aware of what you’re agreeing to

/ July 17, 2017

AWS S3 Breaches: What to Do & Why

Read full post Although basic operations in Amazon’s Simple Storage Services are (as the name implies) – simple – things can get complicated with access control and permissions.

/ July 17, 2017

AWS S3 Breaches: What to Do & Why

Read full post Although basic operations in Amazon’s Simple Storage Services are (as the name implies) – simple – things can get complicated with access control and permissions.

/ July 17, 2017

The iPhone lockscreen hole that we can’t reproduce

Read full post We can’t reproduce an iPhone lockscreen bug that hit the news last week – but there are plenty of lockscreen lessons to learn anyway.

/ July 17, 2017

Alexa is listening to what you say – and might share that with developers

Read full post How do you feel about the possibility of your recorded requests to Alexa being shared with third-party developers? Here’s what we know about that – and some tips to manage your data

/ July 17, 2017

Monday review – the hot 25 stories of the week

Read full post From the malware-scammed $14.3m lottery win and how secure is 2FA on your mobile to Pornhub pushing verification via social media, and more!

/ July 17, 2017

Ashley Madison offers users caught in data breach $11 million in compensation

Read full post Whether or not former users of the affairs website will take up the offer, however, is up for debate.

/ July 16, 2017

Cloud AV Can Serve as an Avenue for Exfiltration

Read full post Black Hat USA researchers show how bad guys can use cloud AV connections to bypass air-gaps and extremely segmented networks to keep stolen data flowing.

/ July 14, 2017

Cloud AV Can Serve as an Avenue for Exfiltration

Read full post Black Hat USA researchers show how bad guys can use cloud AV connections to bypass air-gaps and extremely segmented networks to keep stolen data flowing.

/ July 14, 2017

News in brief: Oz law ‘trumps maths’; CBP can’t search phones for cloud data; police launch drone unit

Read full post Your daily round-up of some of the other stories in the news

/ July 14, 2017

50,000 Machines Remain Vulnerable to EternalBlue Attacks

Read full post Researcher’s free scanner tool finds many systems remain at risk of EternalBlue-based attacks like WannaCry and NotPetya.

/ July 14, 2017

50,000 Machines Remain Vulnerable to EternalBlue Attacks

Read full post Researcher’s free scanner tool finds many systems remain at risk of EternalBlue-based attacks like WannaCry and NotPetya.

/ July 14, 2017

BUPA breach – why names and addresses matter

Read full post UK healthcare company BUPA just had an employee run off with half a million names and addresses – here’s what we can learn from the breach.

/ July 14, 2017

Vault 7: new WikiLeaks dump details Android SMS snooping malware

Read full post Latest dump of stolen CIA documents includes user manual for HighRise app, used to eavesdrop on text messages

/ July 14, 2017

Trump voter commission releases voter complaints — and their personal data

Read full post The government just doxed several concerned (and angry) citizens.

/ July 14, 2017

Beware bogus ‘WhatsApp subscription ending’ emails and texts

Read full post You ultimately decide what links you click on, and whether you hand over your passwords and payment card details. Always think twice, because the wrong decision could prove costly. The post Beware bogus ‘WhatsApp subscription ending’ emails...

/ July 14, 2017

AsTech Offers a $5 Million Security Breach Warranty

Read full post AsTech expands its warranty program with a guarantee it will find Internet application vulnerabilities or it will pay up to $5 million if there is a breach.

/ July 14, 2017

AsTech Offers a $5 Million Security Breach Warranty

Read full post AsTech expands its warranty program with a guarantee it will find Internet application vulnerabilities or it will pay up to $5 million if there is a breach.

/ July 14, 2017

Whose job is it to keep us safe from online harassment?

Read full post As more of us report having been the focus of abuse online, what steps can be taken to make the web better while protecting freedom of speech?

/ July 14, 2017

7 Deadly Sins to Avoid When Mitigating Cyberthreats

Read full post How digitally savvy organizations can take cyber resilience to a whole new dimension.

/ July 14, 2017

7 Deadly Sins to Avoid When Mitigating Cyberthreats

Read full post How digitally savvy organizations can take cyber resilience to a whole new dimension.

/ July 14, 2017

Homeland Security says Americans who don’t want faces scanned leaving the country “shouldn’t travel”

Read full post Congress allowed the government to scan faces of foreign nationals to keep track of visa overstays. But now that’s set to be extended to Americans, worrying some privacy advocates.

/ July 14, 2017

SQL injection attacks controlled using Telegram messaging app

Read full post This weaponising of an encrypted messaging app prompts us to remind you that you should really be focusing on how to avoid SQLi attacks in the first place

/ July 14, 2017

Patching: Your questions answered

Read full post How do patches work? Could the Microsoft patch have stopped WannaCryptor? All your questions answered. The post Patching: Your questions answered appeared first on WeLiveSecurity

/ July 14, 2017

Insider who scammed $14.3m lottery ‘win’ pleads guilty

Read full post Lottery company’s security director used a thumb drive to insert software that produced predictable winning numbers

/ July 14, 2017

Cyber News Rundown: Edition 7/14/17

Read full post The Cyber News Rundown brings you the latest happenings in cyber news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst, and a guy with a passion for all things security. Any more questions?...

/ July 14, 2017

Black Hat to Host Discussion on Diversity

Read full post Panel of diversity pioneers will share their views and firsthand experience on how to make inclusion a priority in security.

/ July 13, 2017

Black Hat to Host Discussion on Diversity

Read full post Panel of diversity pioneers will share their views and firsthand experience on how to make inclusion a priority in security.

/ July 13, 2017

Study: Backdoors Found on 73% of Compromised Websites

Read full post No such thing as ‘too small to hack,’ according to research from SMB security provider SiteLock.

/ July 13, 2017

Study: Backdoors Found on 73% of Compromised Websites

Read full post No such thing as ‘too small to hack,’ according to research from SMB security provider SiteLock.

/ July 13, 2017

The Hunt for Networks Building Death Star-Sized Botnets

Read full post Internet of Things devices are more critically vulnerable to compromise in DDos attacks than ever before. Here’s how to defend against them.

/ July 13, 2017

The Hunt for Networks Building Death Star-Sized Botnets

Read full post Internet of Things devices are more critically vulnerable to compromise in DDos attacks than ever before. Here’s how to defend against them.

/ July 13, 2017

News in brief: Health insurer breached; Audi tops autonomy

Read full post Your daily round-up of some of the other stories in the news

/ July 13, 2017

How to protect yourself from the Verizon data breach

Read full post To be safe, you must change your Verizon PIN.

/ July 13, 2017

How did the data of 14m Verizon customers end up online?

Read full post Verizon says the loss is ‘overstated’, but if you’re a customer, you might want to change your PIN – just to be on the safe side

/ July 13, 2017