Security news that informs and inspires

All Articles

2327 articles:

A Buyers’ Market: Healthcare Data in Underground Markets

Bundles of personal data records are referred to as fullz on the underground marketplaces by criminals. The data can include names, addresses, phone numbers, social security numbers (SSNs) and date of birth, all of which can be used for medical fraud, impersonation or even extortion. Stolen healthcare information is valued the highest.

Healthcare, Medical Data, Data Breaches

Dude, Where’s My Car With My Lunch?

"If it bleeds, it leads..." We have a perverse fascination with autonomous vehicles, especially when they fail, and even more so when there is a fatality.

CISO

Google Rolls Out New Defense Against Spectre and Meltdown

Chrome now includes a new feature called Site Isolation that can help defend against speculative execution attacks in the browser.

Google

How iOS 11.4.1 Stops USB Attacks and Bad Emojis

In its latest release of iOS, Apple has included a new feature called Restricted Mode that can prevent USB-based attacks.

Apple

Biometric Privacy on the Line in Illinois Case

A case before the Illinois Supreme Court is looking like a key test of how companies are allowed to collect and use consumers' biometric information.

Privacy

DNC Security Checklist a Good First Step for Defense

For organizations worried about phishing attacks and the prospect of losing control over their files the checklist from the Democratic National Committee is a good starting point to improve baseline security practices.

Phishing

Facebook Says It’s Ending Most Integration Partnerships

Facebook said in a long response to lawmakers that it had so-called integration partnerships with 52 companies, but it has ended most of them already.

Privacy, Facebook

New CA Focus on EV Certs Won’t Stop Phishing

The CA Security Council's London Protocol attempts to address the problem of phishing sites with legitimate SSL/TLS certificates, but the initiative perpetuates the myth that the pricier EV certificates are more secure than DV certificates.

SSL Certificates, TLS, Encryption, Certificate Authority

California Privacy Law Is the New Standard

The new privacy bill in California allows consumers to control what data companies collect from them and how that information is used.

Privacy

New All-Female VC Fund Focuses on Cloud-Native Security

Security veteran Chenxi Wang's new venture capital fund Rain Capital plans to focus on cloud-native security services and products. Rain Capital will also seek out female and minority founders solving challenging security problems.

Cloud, Funding

Tough California Data Privacy Bill Set for Vote

A new data privacy act would allow consumers to stop companies from selling their personal data.

Privacy

Twitter Adds Support for Yubikeys

Twitter now supports the use of hardware security keys for two-factor authentication, a much stronger option for users.

2fa, Twitter

Wi-Fi Security Gets Much-Needed Update With WPA3

WPA3 brings new security features to wireless networks, including better password security.

Wireless Security

STARTTLS Everywhere Aims to Secure Email on a Large Scale

A new project from the EFF offers a quick path to a more secure email ecosystem.

Privacy, Encryption, Tools

Supreme Court Ruling on Location Data Leaves Open Key Questions

In a 5-4 decision, the Supreme Court said law enforcement needs to obtain a search warrant before it can access historical cell phone location records, but stopped short of making a ruling on how other types of third-party data collection should be handled.

Government, Privacy, Surveillance