Sat.Oct 26, 2019 - Fri.Nov 01, 2019

article thumbnail

A Broken Random Number Generator in AMD Microcode

Schneier on Security

Interesting story. I always recommend using a random number generator like Fortuna , even if you're using a hardware random source. It's just safer.

202
202
article thumbnail

Breaches at NetworkSolutions, Register.com, and Web.com

Krebs on Security

Top domain name registrars NetworkSolutions.com , Register.com and Web.com are asking customers to reset their passwords after discovering an intrusion in August 2019 in which customer account information was accessed. A notice to customers at notice.web.com. “On October 16, 2019, Web.com determined that a third-party gained unauthorized access to a limited number of its computer systems in late August 2019, and as a result, account information may have been accessed,” Web.com said i

Passwords 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARED INTEL: APIs hook up new web and mobile apps — and break attack vectors wide open

The Last Watchdog

If your daily screen time is split between a laptop browser and a smartphone, you may have noticed that a few browser web pages are beginning to match the slickness of their mobile apps. Related: The case for a microservices firewall Netflix and Airbnb are prime examples of companies moving to single-page applications, or SPAs , in order to make their browser webpages as responsive as their mobile apps.

Mobile 140
article thumbnail

Wanted: More women hackers

Tech Republic Security

Capture the Flag challenge encourages women to pursue cybersecurity careers and connects experts with newcomers

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Former FBI General Counsel Jim Baker Chooses Encryption Over Backdoors

Schneier on Security

In an extraordinary essay , the former FBI general counsel Jim Baker makes the case for strong encryption over government-mandated backdoors: In the face of congressional inaction, and in light of the magnitude of the threat, it is time for governmental authorities­ -- including law enforcement­ -- to embrace encryption because it is one of the few mechanisms that the United States and its allies can use to more effectively protect themselves from existential cybersecurity threats, particularly

article thumbnail

Takeaways from the $566M BriansClub Breach

Krebs on Security

Reporting on the exposure of some 26 million stolen credit cards leaked from a top underground cybercrime store highlighted some persistent and hard truths. Most notably, that the world’s largest financial institutions tend to have a much better idea of which merchants and bank cards have been breached than do the thousands of smaller banks and credit unions across the United States.

Banking 124

More Trending

article thumbnail

How to help make your Chromebook as secure as possible: 6 tips

Tech Republic Security

Find out how to better secure your chromebook with these easy tips.

131
131
article thumbnail

WhatsApp Sues NSO Group

Schneier on Security

WhatsApp is suing the Israeli cyberweapons arms manufacturer NSO Group in California court: WhatsApp's lawsuit, filed in a California court on Tuesday, has demanded a permanent injunction blocking NSO from attempting to access WhatsApp computer systems and those of its parent company, Facebook. It has also asked the court to rule that NSO violated US federal law and California state law against computer fraud, breached their contracts with WhatsApp and "wrongfully trespassed" on Facebook's prope

article thumbnail

How Many Major Companies Have Lost Their Leadership Position Due to a Breach?

Daniel Miessler

I was just thinking about the biggest breaches we’ve had in history, from companies like Adobe, LinkedIn, Equifax, Marriott, Target, etc., and wondering how badly they’ve been affected long-term. Stock price doesn’t tell the full story of whether something impacted a company. I’m wondering one specific thing about these top companies with the biggest breaches: What percentage of companies that were top-three in their industry, were dropped out of their top-three spot as a

Marketing 100
article thumbnail

Medical Device Security Standards

Adam Shostack

Recently, I’ve seen four cybersecurity approaches for medical devices, and we can learn by juxtaposing them. The Principles and Practices for Medical Device Cybersecurity is a process-centered and comprehensive document from the International Medical Device Regulators Forum. It covers pre- and post- market considerations, as well as information sharing and coordinated vuln disclosure.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Research finds 2019 increase in breaches and cybersecurity spending

Tech Republic Security

The ServiceNow and Ponemon study found an average 24% increase in cybersecurity spending and a 17% rise in attacks.

article thumbnail

Resources for Measuring Cybersecurity

Schneier on Security

Kathryn Waldron at R Street has collected all of the different resources and methodologies for measuring cybersecurity.

article thumbnail

Unsupervised Learning: No. 200 (Member Edition)

Daniel Miessler

This is UL Member Content Subscribe Already a member? Login No related posts.

article thumbnail

Interesting finds: Liberalism, machine learning, encryption and learning

Adam Shostack

The Economist Reflects on Liberalism is the sort of in-depth writing and thinking that makes the magazine so great: “ Reinventing Liberalism for the 21st century.” Evading Machine Learning Malware Classifiers , from the winner of the Defcon Machine Learning Static Evasion Competition. The general counsel of the NSA and former general counsel of the FBI have editorials on encryption.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

How to locate and close an open port in Linux

Tech Republic Security

Locating and blocking unwanted open ports in Linux should be a task every network admin knows how to do.

118
118
article thumbnail

ICT Supply-Chain Security

Schneier on Security

The Carnegie Endowment for Peace published a comprehensive report on ICT (information and communication technologies) supply-chain security and integrity. It's a good read, but nothing that those who are following this issue don't already know.

article thumbnail

Unsupervised Learning: No. 199

Daniel Miessler

[advanced_iframe src=”[link] width=”100%” height=”7000px”] No related posts.

article thumbnail

Hackers behind Uber and Lynda hacks plead guilty in data breaches

Security Affairs

Two hackers have pleaded guilty to hacking Uber and LinkedIn’s Lynda.com service in 2016 and attempted to extort money from the two companies. Brandon Charles Glover and Vasile Mereacre are two hackers that have pleaded guilty to hacking Uber and LinkedIn’s Lynda.com service in 2016. The defendants have also attempted to extort money from the companies requesting them to pay ‘bug bounties’ to avoid publicly disclose the data breaches.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

How to secure OneDrive files and folders with Personal Vault

Tech Republic Security

Learn how to make specific folders and files on OneDrive more secure by using Personal Vault.

116
116
article thumbnail

Halloween: The curse of data

Thales Cloud Protection & Licensing

We’ve all watched a horror film and said “why are you doing that?!” as the main characters walk aimlessly down to a basement filled with chain saws or shouted, “are you stupid?!!” as they decide that it’s a good idea to hitchhike alone in the dark. While these fictional horror stories are created simply to frighten the audience, real-world businesses are just as guilty of making naïve decisions when it comes to protecting sensitive data, but with very scary consequences that exist.

article thumbnail

How to Keep Your Siri, Alexa, and Google Assistant Voice Recordings Private

WIRED Threat Level

Alexa, Siri, and Google Assistant now all give you ways to opt out of human transcription of your voice snippets. Do it.

article thumbnail

CVE-2019-11043 exposes Web servers using nginx and PHP-FPM to hack

Security Affairs

asty PHP7 remote code execution bug exploited in the wild. Experts warn of a remote code execution vulnerability in PHP7, tracked as CVE-2019-11043, has been exploited in attacks in the wild. A remote code execution vulnerability in PHP7, tracked as CVE-2019-11043, has been exploited in attacks in the wild. On October 22, the security expert Omar Ganiev announced via Twitter the availability of a “freshly patched” remote code execution vulnerability in PHP-FPM , the FastCGI Process Manager

Hacking 95
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

How to avoid malware on Android in one easy step

Tech Republic Security

Jack Wallen offers up his best advice for avoiding malware on Android.

Malware 116
article thumbnail

Paving the Path to Better Data Discovery My Perspective on the Thales & Ground Labs Partnership

Thales Cloud Protection & Licensing

Today, I’m excited to share that Ground Labs , a market leader in data discovery has entered a strategic partnership with Thales. Our joint objective is to empower the discovery and remediation of sensitive data. Unlike alternative solutions that can leave sensitive data exposed or compromised, the joint solution will enable organizations to automatically find and classify sensitive data across heterogeneous environments, understand the risks, and mitigate them through policy-based remediation…a

Risk 86
article thumbnail

Russian Hackers Are Still Targeting the Olympics

WIRED Threat Level

Fancy Bear has attacked 16 anti-doping agencies around the world, indicating that its Olympics grudge is far from over.

Hacking 76
article thumbnail

CVE-2019-13720 flaw in Chrome exploited in Operation WizardOpium attacks

Security Affairs

One of the two flaws in Chrome addressed by Google, CVE-2019-13720, was exploited in a campaign that experts attribute to Korea-linked threat actors. This week Google released security updates to address two high severity vulnerabilities in the Chrome browser, one of which is a zero-day flaw actively exploited in attacks in the wild to hijack computers.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Hackers finding ways to exploit automotive software to overtake cars

Tech Republic Security

A new report from IntSights details the many ways cybercriminals break into a new generation of highly digitized cars.

Software 113
article thumbnail

Database Error Exposes 7.5 Million Adobe Customer Records

Dark Reading

The database was open for approximately one week before the problem was discovered.

66
article thumbnail

Congress Still Doesn't Have an Answer for Ransomware

WIRED Threat Level

As data hijackers continue to target local governments and hospitals, legislators remain stymied over how best to address the problem.

article thumbnail

Kaspersky researchers found a Chrome 0-day exploited in attacks in the wild

Security Affairs

Google released security updates to address two high severity flaws in Chrome, one of which is actively exploited in attacks in the wild to hijack computers. Google released security updates to address two high severity vulnerabilities in the Chrome browser, one of which is a zero-day flaw actively exploited in attacks in the wild to hijack computers.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!