Sat.Jun 02, 2018 - Fri.Jun 08, 2018

article thumbnail

New Data Privacy Regulations

Schneier on Security

When Marc Zuckerberg testified before both the House and the Senate last month, it became immediately obvious that few US lawmakers had any appetite to regulate the pervasive surveillance taking place on the internet. Right now, the only way we can force these companies to take our privacy more seriously is through the market. But the market is broken.

article thumbnail

I Just Won the European Security Blogger Award Grand Prix Prize for the Best Overall Security Blog!

Troy Hunt

I'm not sure how I found myself in a European award program, maybe it's like Australians in Eurovision ? But somehow, I wiggled my way into The European Security Blogger Awards and before even having a chance to come down off the high that was last week's Award for Information Security Excellence at the AusCERT conference in Australia , this happened: @troyhunt hey mate, you just won the EU security blogger of the year.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Britannica Insights Is a Chrome Extension to Fix False Google Results

WIRED Threat Level

Encyclopedia Britannica released a Chrome extension designed to fix Google's sometimes inaccurate "featured snippets.".

111
111
article thumbnail

Researcher Succesfully Hacked In-Flight Airplanes - From the Ground

Dark Reading

IOActive researcher will demonstrate at Black Hat USA how satellite equipment can be 'weaponized.

Hacking 107
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

E-Mail Vulnerabilities and Disclosure

Schneier on Security

Last week, researchers disclosed vulnerabilities in a large number of encrypted email clients: specifically, those that use OpenPGP and S/MIME, including Thunderbird and AppleMail. These are serious vulnerabilities : An attacker who can alter mail sent to a vulnerable client can trick that client into sending a copy of the plaintext to a web server controlled by that attacker.

article thumbnail

Report URI Just Won the Best Emerging Technology Award!

Troy Hunt

I don't normally do back-to-back blog posts, but this was no normal week! I just posted about how I won the European Security Blogger Award Grand Prix Prize for the Best Overall Security Blog and per the title of this post, a couple of hours later Scott Helme and I backed it up with this at the SC Awards : To us! ?? #SCAwards2018 pic.twitter.com/Gv7hhzT9T2 — Report URI (@reporturi) June 5, 2018.

More Trending

article thumbnail

Facebook Bug Sets 14M Users' Settings to 'Public'

Dark Reading

The default sharing setting was accidentally changed for millions of accounts during a four-day period last month.

article thumbnail

Regulating Bitcoin

Schneier on Security

Ross Anderson has a new paper on cryptocurrency exchanges. From his blog : Bitcoin Redux explains what's going wrong in the world of cryptocurrencies. The bitcoin exchanges are developing into a shadow banking system, which do not give their customers actual bitcoin but rather display a "balance" and allow them to transact with others. However if Alice sends Bob a bitcoin, and they're both customers of the same exchange, it just adjusts their balances rather than doing anything on the blockchain

article thumbnail

Facebook Software Bug Made Some Private Posts Public: 14 Million Affected

Threatpost

A Facebook glitch in May set millions of posts that users composed to “public" for ten days.

article thumbnail

Crime Fighting Gets High-Tech Advances Palantir, Axom, and More

WIRED Threat Level

Beyond big data, officers are increasingly turning to software and ­predictive analytics from companies like Palantir to anticipate when and where misdeeds are likely to occur.

Big data 111
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

MyHeritage Alerts Users to Data Breach

Dark Reading

A researcher found email addresses and hashed passwords of nearly 92.3 million users stored on a server outside MyHeritage.

article thumbnail

The Habituation of Security Warnings

Schneier on Security

We all know that it happens: when we see a security warning too often -- and without effect -- we start tuning it out. A new paper uses fMRI, eye tracking, and field studies to prove it.

137
137
article thumbnail

Cyber is Cyber is Cyber

Lenny Zeltser

If you’re in the business of safeguarding data and the systems that process it, what do you call your profession? Are you in cybersecurity? Information security? Computer security, perhaps? The words we use, and the way in which the meaning we assign to them evolves, reflects the reality behind our language. If we examine the factors that influence our desire to use one security title over the other, we’ll better understand the nature of the industry and its driving forces.

article thumbnail

What Will Microsoft's GitHub Buy Mean For Controversial Code?

WIRED Threat Level

The tech giant will officially acquire the legendary developer platform. The question now is what happens to some of the code it hosts.

111
111
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

5 Tips for Protecting SOHO Routers Against the VPNFilter Malware

Dark Reading

Most home office users need to simply power cycle their routers and disable remote access; enterprises with work-at-home employees should move NAS behind the firewall.

article thumbnail

Cryptocurrency – are you ready for next big hack?

Thales Cloud Protection & Licensing

A few years ago, the term cryptocurrency was only used among the tech elite and the only type available for purchase was Bitcoin. Fast forward to 2018 when the average consumer is able to invest and has a pick of over 1,800 different kinds of cryptocurrencies to choose from. It doesn’t come as much of surprise that people are eager to learn more about this new space and profitable industry.

article thumbnail

WARDroid Uncovers Mobile Threats to Millions of Users Worldwide

Threatpost

An analysis of 10,000 mobile apps has found that a significant portion of them are open to web API hijacking – thanks to inconsistencies between app and server logic in web APIs.

Mobile 60
article thumbnail

WWDC 2018: Apple Just Made Safari the Good Privacy Browser

WIRED Threat Level

The next version of Safari takes on ad-trackers more aggressively than ever.

111
111
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Phishing Scams Target FIFA World Cup Attendees

Dark Reading

Soccer-themed emails and Web pages target fans with fake giveaways and the chance to snag overpriced, illegitimate 'guest tickets.

Scams 79
article thumbnail

Gartner Security Summit: Enterprises, Vendors Respond to Cybercriminals

eSecurity Planet

Vulnerabilities abound and cybercriminals are more aggressive than ever, but enterprises and security vendors are responding.

53
article thumbnail

Shipping Industry Cybersecurity: A Shipwreck Waiting to Happen

Threatpost

Pen Test Partners demonstrates how to send vessels off-course or even onto a path to collision -- fairly easily.

article thumbnail

WannaCry Hero Marcus Hutchins' New Legal Woes Spell Trouble for White Hat Hackers

WIRED Threat Level

By expanding the case against Marcus Hutchins, the Department of Justice has signaled a troubling interpretation of cybersecurity law.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

US-North Korea Summit News Used as Lure In New Malware Campaign

Dark Reading

Previously known threat actor Group 123 likely behind NavRAT malware, security vendor says.

Malware 75
article thumbnail

Installing PowerShell on Kali Linux

Kali Linux

UPDATE NOV 2019 This post is out of date as of 2019 as powershell has been added to the primary repos. Just do a: apt update && apt -y install powershell And you will have powershell on your system. Old Post You may already be aware that you can safely add external repositories to your Kali Linux installation but you may not be aware that one of the many repositories available online includes one from Microsoft that includes PowerShell.

article thumbnail

Zero-Day Flash Exploit Targeting Middle East

Threatpost

Adobe patched the Flash Player vulnerability (CVE-2018-5002) earlier on Thursday.

Hacking 50
article thumbnail

Former Cambridge Analytica CEO Alexander Nix Testifies Before Parliament

WIRED Threat Level

Alexander Nix testified before Parliament, but provided more bluster than answers.

106
106
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Web Application Firewalls Adjust to Secure the Cloud

Dark Reading

Cloud-based WAFs protect applications without the costs and complexity of on-prem hardware. Here's what to keep in mind as you browse the growing market.

article thumbnail

Managing Digital Security as Risk and Complexity Rise

Thales Cloud Protection & Licensing

Gartner defines digital risk management as “the integrated management of risks associated with digital business components, such as cloud, mobile, social, big data, third-party technology providers, OT and the IoT.” And, as we’ve all seen, the failure to manage digital risks can have a negative impact on the reputation, operations and market value of affected enterprises.

Risk 48
article thumbnail

PageUp Malware Scare Sheds Light On Third-Party Risks

Threatpost

The incident is another reminder that third-party software and services are an easy way for attackers to steal sensitive data.

Risk 49
article thumbnail

An Encryption Upgrade Could Upend Online Payments

WIRED Threat Level

While ditching TLS 1.0 encryption will benefit the payments ecosystem, it'll be rough going for those with older devices.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!