Sat.Jul 16, 2022 - Fri.Jul 22, 2022

article thumbnail

“Cybersecurity For Dummies” Second Edition Now Available

Joseph Steinberg

The second edition of Cybersecurity For Dummies , Joseph Steinberg’s best-selling introductory-level book about cybersecurity, is now available. Like its first-edition counterpart, CyberSecurity For Dummies: Second Edition is written for general audiences, and can help people of all backgrounds stay cyber-secure, regardless of their technical skillsets.

article thumbnail

Facebook Is Now Encrypting Links to Prevent URL Stripping

Schneier on Security

Some sites, including Facebook, add parameters to the web address for tracking purposes. These parameters have no functionality that is relevant to the user, but sites rely on them to track users across pages and properties. Mozilla introduced support for URL stripping in Firefox 102 , which it launched in June 2022. Firefox removes tracking parameters from web addresses automatically, but only in private browsing mode or when the browser’s Tracking Protection feature is set to strict.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Massive Losses Define Epidemic of ‘Pig Butchering’

Krebs on Security

U.S. state and federal investigators are being inundated with reports from people who’ve lost hundreds of thousands or millions of dollars in connection with a complex investment scam known as “ pig butchering ,” wherein people are lured by flirtatious strangers online into investing in cryptocurrency trading platforms that eventually seize any funds when victims try to cash out.

Scams 339
article thumbnail

Weekly Update 305

Troy Hunt

I broke Yoda's stick! 3D printing woes, and somehow I managed to get through the explanation without reverting to a chorus of My Stick by a Bad Lip Reading (and now you'd got that song stuck in your head). Loads of data breaches this week and whilst "legacy", still managed to demonstrate how bad some practices remain today (hi Shadi.com 👋).

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

What Exactly is CyberSecurity?

Joseph Steinberg

CyberSecurity. The word may sound simple enough to easily define; but, in reality, it is not. From a practical standpoint, cybersecurity means quite different things to different people in different situations, a phenomenon that leads not only to extremely varied cybersecurity policies, procedures, and practices, but also to different understandings of the word cybersecurity itself.

article thumbnail

Critical Vulnerabilities in GPS Trackers

Schneier on Security

This is a dangerous vulnerability: An assessment from security firm BitSight found six vulnerabilities in the Micodus MV720 , a GPS tracker that sells for about $20 and is widely available. The researchers who performed the assessment believe the same critical vulnerabilities are present in other Micodus tracker models. The China-based manufacturer says 1.5 million of its tracking devices are deployed across 420,000 customers.

More Trending

article thumbnail

If You're Not Paying for the Product, You Are. Possibly Just Consuming Goodwill for Free

Troy Hunt

How many times have you heard the old adage about how nothing in life is free: If you're not paying for the product, you are the product Facebook. LinkedIn. TikTok. But this isn't an internet age thing, the origins go back way further, originally being used to describe TV viewers being served ads. Sure, TV was "free" in that you don't pay to watch it (screwy UK TV licenses aside), but running a television network ain't cheap so it was (and still is) supported by adver

article thumbnail

Why Businesses Must Address Risks of Quantum Computing NOW Rather Than Wait Until Problems Arrive

Joseph Steinberg

There is little doubt that quantum computing will ultimately undermine the security of most of today’s encryption systems , and, thereby, render vulnerable to exposure nearly every piece of data that is presently protected through the use of encryption. What remains uncertain, however, is when the day of so-called “quantum supremacy” will arrive. As such, many organizations have hesitated to start preparing for the quantum era – after all, they reason, there are enough fires to fight now, and li

Risk 326
article thumbnail

Russia Creates Malware False-Flag App

Schneier on Security

The Russian hacking group Turla released an Android app that seems to aid Ukrainian hackers in their attacks against Russian networks. It’s actually malware, and provides information back to the Russians: The hackers pretended to be a “community of free people around the world who are fighting russia’s aggression”—much like the IT Army.

Malware 288
article thumbnail

Cyber Safety Review Board classifies Log4j as ‘endemic vulnerability’

Tech Republic Security

CSRB has released a report saying that the Log4j exploit is here to stay long-term, meaning businesses should be ready in case of a cyber attack. The post Cyber Safety Review Board classifies Log4j as ‘endemic vulnerability’ appeared first on TechRepublic.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Honey Trapping Baddies (or just nosey people)

Javvad Malik

I was recently reminded of this headline from a few years ago where a couple left their bikes unlocked to lure thieves and then proceeded to beat them up with baseball bats. I don’t advocate violence, and nor do I approve of vigilante behaviour. But police around the world use this trick all the time. They will leave cars and wait for thieves to try to steal them.

article thumbnail

Google ads lead to major malvertising campaign

Malwarebytes

Fraudsters have long been leveraging the shady corners of the internet to place malicious adverts, leading users to various scams. However, every now and again we see a campaign that goes mainstream and targets some of the world’s top brands. Case in point, we recently uncovered a malvertising chain abusing Google’s ad network to redirect visitors to an infrastructure of tech support scams.

Scams 145
article thumbnail

Crooks stole $375k from Premint NFT, it is one of the biggest NFT hacks ever

Security Affairs

Threat actors hacked the popular NFT platform, Premint NFT and stole 314 NFTs. The popular NFT platform, Premint NFT, was hacked, the threat actors compromised its official website and stole 314 NFTs. According to the experts from blockchain security firm CertiK, this is one of the biggest NFT hacks on record. The analysis of the experts revealed that the threat actors planted a malicious JavaScript code to premint.xyz.

Hacking 145
article thumbnail

Why North Korean cybercriminals are targeting businesses with ransomware

Tech Republic Security

Microsoft says a ransomware gang calling itself H0lyGh0st may be sponsored by the North Korean government as a way for the country to offset its struggling economy. The post Why North Korean cybercriminals are targeting businesses with ransomware appeared first on TechRepublic.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Radware Employs Blockchain Technologies to Thwart Bots

Security Boulevard

Radware this week revealed it added blockchain technologies to its Bot Manager platform to thwart attacks designed to evade completely automated public Turing tests to tell computers and humans apart—better known as CAPTCHA challenges. Dr. David Aviv, CTO for Radware, said that while a CAPTCHA challenge can be an effective way to determine if an. The post Radware Employs Blockchain Technologies to Thwart Bots appeared first on Security Boulevard.

article thumbnail

Air-gapped systems leak data via SATA cable WiFi antennas

Bleeping Computer

An Israeli security researcher has demonstrated a novel attack against air-gapped systems by leveraging the SATA cables inside computers as a wireless antenna to emanate data via radio signals. [.].

Wireless 145
article thumbnail

New Luna ransomware targets Windows, Linux and ESXi systems

Security Affairs

Kaspersky researchers discovered a new ransomware family written in Rust, named Luna, that targets Windows, Linux, and ESXi systems. Researchers from Kaspersky Lab detailed a new ransomware family named Luna, which is written in Rust and is able to target Windows, Linux, and ESXi systems. Luna ransomware is the third ransomware family that is written in Rust language, other malware strains are BlackCat and Hive.

article thumbnail

How to create an effective incident report

Tech Republic Security

Learn what incident report templates are, eight steps on how to write an incident report and five software solutions for creating effective incident reports. The post How to create an effective incident report appeared first on TechRepublic.

Software 179
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Salt Security Increases Visibility Into API Security

Security Boulevard

Salt Security today extended its security platform for application programming interfaces (APIs) to include the ability to visually depict API call sequences, create attack simulations before APIs are released into production and gain insights into attacker behaviors and patterns. Elad Koren, chief product officer for Salt Security, said the latest version of the Salt Security.

article thumbnail

An Easier Way to Keep Old Python Code Healthy and Secure

The Hacker News

Python has its pros and cons, but it's nonetheless used extensively. For example, Python is frequently used in data crunching tasks even when there are more appropriate languages to choose from. Why? Well, Python is relatively easy to learn. Someone with a science background can pick up Python much more quickly than, say, C.

141
141
article thumbnail

Trojanized Password Crackers Targeting Industrial Systems

Dark Reading

Tools purporting to help organizations recover lost passwords for PLCs are really droppers for malware targeting industrial control systems, vendor says.

Passwords 141
article thumbnail

FBI warns of phony cryptocurrency apps aiming to steal money from investors

Tech Republic Security

Cybercriminals are creating fake cryptocurrency investment apps designed to defraud US investors and exploit investment firms, cautions the FBI. The post FBI warns of phony cryptocurrency apps aiming to steal money from investors appeared first on TechRepublic.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Orgs Struggling to Balance Security and End-User Experience

Security Boulevard

A survey of 503 IT professionals conducted by the market research firm Dimensional Insight on behalf of Broadcom Software highlighted the degree to which organizations are struggling to balance security against customer experience. The survey found more than half of respondents (54%) prioritize security over the end-user experience. However, 46% also conceded they have bypassed.

Marketing 141
article thumbnail

A week in security (July 11 – July 17)

Malwarebytes

Last week on Malwarebytes Labs: Elden Ring maker Bandai Namco hit by ransomware and data leaks Predatory Sparrow massively disrupts steel factories while keeping workers safe New variant of Android SpyJoker malware removed from Play Store after 3 million+ installs China’s Tonto Team increases espionage activities against Russia Endpoint security for Mac: 3 best practices Low-income consumers preyed on by fake ISP during pandemic, FCC says Ransomware rolled through business defenses in Q2 2022 Co

article thumbnail

Several apps on the Play Store used to spread Joker, Facestealer and Coper malware

Security Affairs

Google blocked dozens of malicious apps from the official Play Store that were spreading Joker, Facestealer, and Coper malware families. Google has removed dozens of malicious apps from the official Play Store that were distributing Joker, Facestealer, and Coper malware families. Researchers from security firms Pradeo discovered multiple apps spreading the Joker Android malware.

Malware 139
article thumbnail

Best VPN services for SMBs

Tech Republic Security

VPNs are an essential component in small and medium-sized businesses' cybersecurity toolkit. Here's how leading VPN services for SMBs compare. The post Best VPN services for SMBs appeared first on TechRepublic.

VPN 176
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

HavanaCrypt Ransomware Poses as Google Update

Security Boulevard

Ransomware remains popular in large part because it works. In that sense, it’s not surprising, although it is alarming, that Trend Micro found it had detected and blocked more than 4.4 million ransomware threats stretching across email, URL and file layers during Q1 of 2022—and discovered a new family dubbed HavanaCrypt. The activity in the. The post HavanaCrypt Ransomware Poses as Google Update appeared first on Security Boulevard.

article thumbnail

Windows 11 now blocks RDP brute-force attacks by default

Bleeping Computer

Recent Windows 11 builds now come with the Account Lockout Policy policy enabled by default which will automatically lock user accounts (including Administrator accounts) after 10 failed sign-in attempts for 10 minutes. [.].

article thumbnail

DNS-over-HTTP/3 in Android

Google Security

Posted by Matthew Maurer and Mike Yu, Android team To help keep Android users’ DNS queries private, Android supports encrypted DNS. In addition to existing support for DNS-over-TLS, Android now supports DNS-over-HTTP/3 which has a number of improvements over DNS-over-TLS. Most network connections begin with a DNS lookup. While transport security may be applied to the connection itself, that DNS lookup has traditionally not been private by default: the base DNS protocol is raw UDP with no encrypt

DNS 137
article thumbnail

Raytheon highlights its role in cybersecurity

Tech Republic Security

Company officials discussed wide-ranging issues including the talent shortage, quantum computing and implementing zero trust during a webinar with reporters Wednesday. The post Raytheon highlights its role in cybersecurity appeared first on TechRepublic.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!