Sat.Jun 09, 2018 - Fri.Jun 15, 2018

article thumbnail

Thomas Dullien on Complexity and Security

Schneier on Security

For many years, I have said that complexity is the worst enemy of security. At CyCon earlier this month, Thomas Dullien gave an excellent talk on the subject with far more detail than I've ever provided. Video. Slides.

206
206
article thumbnail

Librarian Sues Equifax Over 2017 Data Breach, Wins $600

Krebs on Security

In the days following revelations last September that big-three consumer credit bureau Equifax had been hacked and relieved of personal data on nearly 150 million people , many Americans no doubt felt resigned and powerless to control their information. But not Jessamyn West. The 49-year-old librarian from a tiny town in Vermont took Equifax to court.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mobile security advances to stopping device exploits ? not just detecting malicious apps

The Last Watchdog

The most profound threat to corporate networks isn’t the latest, greatest malware. It’s carbon-based life forms. Humans tend to be gullible and impatient. With our affiliations and preferences put in play by search engines and social media, we’re perfect patsies for social engineering. And because we are slaves to convenience, we have a propensity for taking shortcuts when it comes to designing, configuring and using digital systems.

Mobile 182
article thumbnail

Data Provided by the Estonian Central Criminal Police is Now Searchable on Have I Been Pwned

Troy Hunt

Running Have I Been Pwned (HIBP) has presented some fascinating insights into all sorts of aspects of how data breaches affect us; the impact on the individual victims such as you and I, of course, but also how they affect the companies involved and increasingly, the role of government and law enforcement in dealing with these incidents. Last week I had an all new situation arise related to that last point and I want to explain it properly here so it makes sense if someone finds themselves in th

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Russian Censorship of Telegram

Schneier on Security

Internet censors have a new strategy in their bid to block applications and websites: pressuring the large cloud providers that host them. These providers have concerns that are much broader than the targets of censorship efforts, so they have the choice of either standing up to the censors or capitulating in order to maximize their business. Today's Internet largely reflects the dominance of a handful of companies behind the cloud services, search engines and mobile platforms that underpin the

Internet 175
article thumbnail

How Microsoft's Windows Red Team Keeps PCs Safe

WIRED Threat Level

Microsoft's Windows red team probes and prods the world's biggest operating system through the eyes of an adversary.

111
111

More Trending

article thumbnail

Weekly Update 90

Troy Hunt

Wow wow wow! What a week! This video is going out a couple of days late but if ever I had a good excuse for it, this week is the one. Scott and I are in Oslo this week having just flown in from London where we collectively scooped up 3 awards, one each at the European Blogger Awards and the big one (quite literally - the thing weights several kilos), the SC Award for Best Emerging Technology courtesy of Report URI.

InfoSec 128
article thumbnail

New iPhone OS May Include Device-Unlocking Security

Schneier on Security

iOS 12, the next release of Apple's iPhone operating system, may include features to prevent someone from unlocking your phone without your permission: The feature essentially forces users to unlock the iPhone with the passcode when connecting it to a USB accessory everytime the phone has not been unlocked for one hour. That includes the iPhone unlocking devices that companies such as Cellebrite or GrayShift make, which police departments all over the world use to hack into seized iPhones.

Passwords 173
article thumbnail

World Cup 2018: How to Secure Your Devices When Traveling in Russia

WIRED Threat Level

Russia expects as many as 2 million visitors during the 2018 World Cup, most of whom should take extra precautions against the country's many cyber risks.

article thumbnail

GUEST ESSAY: 3 key ingredients to stress-free compliance with data handling regulations

The Last Watchdog

The variety of laws and regulations governing how organizations manage and share sensitive information can look like a bowl of alphabet soup: HIPAA, GDPR, SOX, PCI and GLBA. A multinational conglomerate, government contractor, or public university must comply with ten or more, which makes demonstrating regulatory compliance seem like a daunting, even impossible, undertaking.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Threat Model Thursday: Chromium Post-Spectre

Adam Shostack

Today’s Threat Model Thursday is a look at “ Post-Spectre Threat Model Re-Think ,” from a dozen or so folks at Google. As always, I’m looking at this from a perspective of what can we learn and to encourage dialogue around what makes for a good threat model. What are we working on? From the title, I’d assume Chromium, but there’s a fascinating comment in the introduction that this is wider: “ any software that both (a) runs (native or interpreted) code f

Software 100
article thumbnail

10 Security Projects CISOs Should Consider: Gartner Analyst

eSecurity Planet

Gartner analyst lists 10 security projects CISOs should consider this year - and 10 they should have already done.

CISO 91
article thumbnail

Alleged Silk Road Adviser Roger Clark Extradited To the US

WIRED Threat Level

Roger Clark allegedly served as Ross Ulbricht's Silk Road consigliere. Friday, the feds announced his extradition from Thailand.

111
111
article thumbnail

Meet 'Bro': The Best-Kept Secret of Network Security

Dark Reading

This often overlooked open source tool uses deep packet inspection to transform network traffic into exceptionally useful, real-time data for security operations.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Bypass Glitch Allows Malware to Masquerade as Legit Apple Files

Threatpost

Malware can to worm its way onto Macs thanks to a recently discovered code-signing bypass flaw.

Malware 64
article thumbnail

Leopard Spots and Zebra Stripes: Fraud and Behavioral Analytics

Thales Cloud Protection & Licensing

Did you know that every zebra has its own unique stripe pattern? Just like a human fingerprint, every zebra can be identified by their distinctive set of stripes. Luckily, zebras don’t use mobile devices, or manufacturers would be hard at work on stripe recognition technology. But they’d also be working to supplement their stripe recognition and biometrics with behavioral analytics.

article thumbnail

Encrypted Messaging Apps Have Limitations You Should Know

WIRED Threat Level

As recent events have shown, using an encrypted messaging app like WhatsApp or Signal is no privacy panacea.

article thumbnail

Modern Cybersecurity Demands a Different Corporate Mindset

Dark Reading

Very few organizations have fully incorporated all relevant risks and threats into their current digital strategy, research finds.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

New Banking Trojan Can Launch Overlay Attacks on Latest Android Versions

Threatpost

While other malware families have been searching for new overlay techniques for Android 7 and 8, MysteryBot appears to have found a solution.

Banking 53
article thumbnail

Pen Testing Toolkit: White Hat Tools to Improve Web Application Penetration Testing

NopSec

Many of our clients at NopSec have mature web application security programs with their own internal white hat penetration testing personnel. Performing penetration testing in coordination with an agile software development team presents unique challenges as the speed of feature development can make thorough testing of the application difficult to achieve.

article thumbnail

Senators Demand Answers From Amazon on Echo's Snooping Habits

WIRED Threat Level

Jeff Flake and Chris Coons sent Jeff Bezos a letter Thursday with nearly 30 questions about how the company handles user data and privacy.

108
108
article thumbnail

23,000 Compromised in HealthEquity Data Breach

Dark Reading

HealthEquity, which handles more than 3.4 million health savings accounts, was breached when an intruder accessed an employee's email.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

U.S. Intelligence Cautions World Cup Travelers on Mobile Use

Threatpost

World Cup travelers should leave their mobile phones, laptops and tablets behind.

Mobile 50
article thumbnail

Leopard Spots and Zebra Stripes: Big Data and Identity Management

Thales Cloud Protection & Licensing

The expression “a leopard cannot change its spots” maintains that it is challenging to alter ones’ inherent nature — not only who you are but also what defines you. Your spots, in this case, include your ways, habits, and behaviors. In this age of big data, the concept is fitting, because this kind of information is increasingly being used to identify individuals and even machines.

article thumbnail

How NATO Defends Against the Cyberattacks

WIRED Threat Level

Opinion: The NATO Secretary General explains how the alliance manages the dark side of the web.

106
106
article thumbnail

Why CISOs Need a Security Reality Check

Dark Reading

We deserve a seat at the executive table, and we'll be much better at our jobs once we take it.

CISO 73
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Apple Removes iPhone USB Access Feature, Blocking Out Hackers, Law Enforcement

Threatpost

The move escalates tensions between the phone giant and federal law enforcement when it comes to mobile security.

Mobile 49
article thumbnail

Container and Kubernetes Security: It's Complicated

eSecurity Planet

While there are a lot of things that containers do to help improve security, there are still some missing pieces.

45
article thumbnail

Feds Bust Dozens of Nigerian Email Scammers, but Your Inbox Still Isn’t Safe

WIRED Threat Level

The arrest of dozens of alleged Nigerian email scammers and their associates is a small, but important, first step toward tackling an enormous problem.

105
105
article thumbnail

DDoS Amped Up: DNS, Memcached Attacks Rise

Dark Reading

China and the US are the world's leading sources of distributed denial-of-service botnet attacks.

DNS 71
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!