Sat.Dec 30, 2017 - Fri.Jan 05, 2018

article thumbnail

2018 Cause Awareness & Giving Day Calendar

Troy Hunt

Cause awareness and giving days can be very powerful themes upon which to launch online fundraising campaigns. The real-time, in-the-moment nature of cause awareness and giving days can inspire donors to give provided that your nonprofit knows how to promote the days effectively. The first step is to decide which days to build a campaign upon and add them to your 2018 editorial calendar.

Internet 243
article thumbnail

Spectre and Meltdown Attacks Against Microprocessors

Schneier on Security

The security of pretty much every computer on the planet has just gotten a lot worse, and the only real solution -- which of course is not a solution -- is to throw them all away and buy new ones. On Wednesday, researchers just announced a series of major security vulnerabilities in the microprocessors at the heart of the world's computers for the past 15-20 years.

Firmware 202
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Pro-Russia Twitter Trolls Take Aim at Special Counsel Robert Mueller

WIRED Threat Level

As special counsel Robert Mueller's Russia investigation heats up, a network of pro-Russia trolls have rushed to discredit him.

112
112
article thumbnail

Why 2018 Will Be the Trust Turning Point for the Digital Economy

Thales Cloud Protection & Licensing

We are in the midst of a digital revolution impacting every aspect of our everyday lives. At the center of the revolution is data, which is available in more forms, volume, depth and complexity since the beginnings of the computer revolution. Earlier this year , IDC predicted the world’s volume of data would expand to 163 zettabytes by 2025 – a tenfold rise in the total.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

2017 Retrospective

Troy Hunt

I look back a lot more than what I suspect people realise. Not in a reminiscent way, but rather because I find it helps me put things in perspective. A lot of people like to set personal goals or objectives so that there's something specific they're setting out to achieve but for me personally, I just want to see progress. I want to be able to do these retrospectives - not just on Jan 1 but every day - and say to myself "yeah, I'm happy with how far I've moved ahead" And believe me when

Hacking 120
article thumbnail

Spectre and Meltdown Attacks

Schneier on Security

After a week or so of rumors, everyone is now reporting about the Spectre and Meltdown attacks against pretty much every modern processor out there. These are side-channel attacks where one process can spy on other processes. They affect computers where an untrusted browser window can execute code, phones that have multiple apps running at the same time, and cloud computing networks that run lots of different processes at once.

More Trending

article thumbnail

Counting down, Getting Ready: GDPR in a Multi-Cloud World

Thales Cloud Protection & Licensing

( Originally posted to CenturyLink’s blog on November 10 ). To help save time and money, a growing number of enterprises are storing sensitive customer data in the public cloud. Increasingly, they’re also leveraging multiple cloud providers. According to IDC, nearly 80% of IT organizations currently deploy multi-cloud or plan to implement multi-cloud environments within 12 months.

article thumbnail

Weekly Update 68

Troy Hunt

It's 2018! All new year and already someone has gone and broken our computer things courtesy of the Meltdown and Spectre bugs. I only touch briefly on them in this week's update and I refer people to my Twitter timeline for good coverage I've shared. However, there's one resource which stands out above the others and it's this thread from Graham Sutherland.

article thumbnail

Security Vulnerabilities in Star Wars

Schneier on Security

A fun video describing some of the many Empire security vulnerabilities in the first Star Wars movie. Happy New Year, everyone.

182
182
article thumbnail

Even Realistic Videogames like Call of Duty Won’t Help Us Win Wars

WIRED Threat Level

Opinion: Research shows that millennial cadets' digital skills don't help them on the virtual battlefield.

111
111
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Forever 21 Found Malware and Encryption Disabled on its PoS Devices

Dark Reading

The retailer found signs of unauthorized access and malware installed on point-of-sale devices during an investigation into last year's data breach.

Malware 79
article thumbnail

2018 IT Security Outlook: Attacks and Threats Get More Sophisticated

eSecurity Planet

2018 will bring more high-profile data breaches, with attacks and threats getting increasingly sophisticated. We outline 10 security trends to watch.

article thumbnail

New Book Coming in September: "Click Here to Kill Everybody"

Schneier on Security

My next book is still on track for a September 2018 publication. Norton is still the publisher. The title is now Click Here to Kill Everybody: Peril and Promise on a Hyperconnected Planet , which I generally refer to as CH2KE. The table of contents has changed since I last blogged about this, and it now looks like this: Introduction: Everything is Becoming a Computer Part 1: The Trends 1.

Internet 164
article thumbnail

Voter ID Laws Really Do Discriminate, a New Study Shows

WIRED Threat Level

Critics of voter ID laws have had a difficult time proving their menace in court. A new algorithm could change that.

112
112
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

The Cybersecurity 'Upside Down'

Dark Reading

There is no stranger thing than being breached. Here are a few ways to avoid the horror.

article thumbnail

Intel In Security Hot Seat Over Reported CPU Design Flaw

Threatpost

Intel is grappling with what many are calling a processor design flaw impacting CPUs used in Linux, Windows and some macOS systems.

article thumbnail

Detecting Adblocker Blockers

Schneier on Security

Interesting research on the prevalence of adblock blockers: " Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis ": Abstract : Millions of people use adblockers to remove intrusive and malicious ads as well as protect themselves against tracking and pervasive surveillance. Online publishers consider adblockers a major threat to the ad-powered "free" Web.

article thumbnail

The Logan Paul "Suicide Forest" Video Should Be a Reckoning For YouTube

WIRED Threat Level

Logan Paul's video of Japan's "suicide forest" was a nadir for the YouTube star—and the platform that enables him.

112
112
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Critical Microprocessor Flaws Affect Nearly Every Machine

Dark Reading

Researchers release details of 'Meltdown' and 'Spectre' attacks that allow programs to steal sensitive data.

63
article thumbnail

Google Play Removes 22 Malicious ‘LightsOut’ Apps From Marketplace

Threatpost

Google removed 22 malicious adware apps ranging from flashlights, call recorders to wifi signal boosters that together were downloaded up to 7.5 million times from the Google Play marketplace.

Adware 49
article thumbnail

Fake Santa Surveillance Camera

Schneier on Security

Reka makes a " decorative Santa cam ," meaning that it's not a real camera. Instead, it just gets children used to being under constant surveillance. Our Santa Cam has a cute Father Christmas and mistletoe design, and a red, flashing LED light which will make the most logical kids suspend their disbelief and start to believe!

article thumbnail

Critical "Meltdown" and "Spectre" Flaws Breaks Basic Security for Intel, AMD, ARM Computers

WIRED Threat Level

Still-unidentified researchers have found a critical chip flaw that developers are scrambling to patch in millions of computers.

112
112
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Breach of India's Biometric Database Puts 1 Billion Users at Risk

Dark Reading

The Tribune reports that hackers gained access to users' names, addresses, phone numbers, and other PII.

Risk 0
article thumbnail

Vendors Share Patch Updates on Spectre and Meltdown Mitigation Efforts

Threatpost

Intel, Amazon, ARM, Microsoft and others have shared patch updates to keep customers informed on their mitigation efforts to protect against the far reaching Spectre and Meltdown vulnerabilities impacting computers, servers and mobile devices worldwide. .

Mobile 49
article thumbnail

Tamper-Detection App for Android

Schneier on Security

Edward Snowden and Nathan Freitas have created an Android app that detects when it's being tampered with. The basic idea is to put the app on a second phone and put the app on or near something important, like your laptop. The app can then text you -- and also record audio and video -- when something happens around it: when it's moved, when the lighting changes, and so on.

144
144
article thumbnail

Get a Password Manager. Here's Where to Start

WIRED Threat Level

How important are password managers? Even their flaws double as reminders why you need one.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

LockPoS Malware Sneaks onto Kernel via new Injection Technique

Dark Reading

"Alarming evolution" of Flokibot bypasses antivirus software and was likely built by a group of advanced attackers, researchers say.

article thumbnail

Assessing the Impact of Meltdown and Spectre: Companies Rush to Mitigate the Threat

eSecurity Planet

As Intel is hit with class action lawsuits, enterprises are working quickly to assess the potential impact of the flaws.

43
article thumbnail

Russian Cryptocurrency Designed to Evade Western Sanctions

Schneier on Security

Russia’s president Vladimir Putin has commissioned work on a state-run cryptocurrency that can circumvent other cryptocurrency sanctions around the world. The cryptocurrency is being called Cryptorouble. Back in October, the Russian Minister of Communications and Mass Communications first mentioned the possibility of the state-run cryptocurrency. According a Financial Times report yesterday, Putin’s economic advisor Sergei […].

article thumbnail

Trolls, Bots, and Fake News Made 2017 a Terrible Year for Internet Freedom

WIRED Threat Level

Trolls, bots, and fake news posed a serious threat to internet freedom this year—and there's no easy answer in sight.

Internet 111
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!