Security news that informs and inspires

All Articles

658 articles:

Include Deepfakes in Incident Response Plans

Deepfakes aren't just weird political videos. Enterprises should be concerned about how deepfakes could impact their reputation and financial health and include them in incident response plans.

Incident Response, Disinformation

Demand for Cyber Insurance Is High, and So Are the Risks

As organizations grapple with soaring costs of cyberattacks, many are asking insurance companies for help reducing risks. But insurance providers are also hedging their bets because cyber insurance is so risky.

Cybersecurity Insurance

Capital One Breach Does Not Mean the Cloud is Insecure

Financial services organizations and many other enterprises have hesitated to go all in the cloud, citing concerns about depending on a third-party to protect the data, and the Capital One breach may encapsulate their fears. But the fact is, the cloud provides security benefits, so long as proper controls are put in place.

Cloud, Data Breaches

Capital One Breach Highlights Challenges of Insider Threats

The breach of Capital One data on Amazon Web Services is a insider threat story. Defending from malicious insiders is a different ballgame than from outsiders.

Insider Threat, Data Breaches

Enterprises May Not Know Which Devices Have URGENT/11 Flaws

VxWorks is the operating system no one has ever heard of, but it is widely used in industrial control systems, robotics and automation, industrial control systems, and Internet of Things. The URGENT/11 group of vulnerabilities in these devices can be exploited remotely.

Vulnerability, Internet of Things, Patching, Critical Infrastructure Security

Being on the Latest Windows Version Can Thwart Zero Days

Zero day vulnerabilities exploited in the wild is never good news, but if the user's machine is running the latest version of the operating system, the chances are good that the attack won't be successful against that machine, according to a Microsoft security engineer.

Microsoft, Vulnerability, Windows, Software Security

BlueKeep Exploit on Sale, Now We Wait

What a week for BlueKeep watchers. Chinese-language slide deck appears on GitHub with details on how to use the BlueKeep vulnerability, Immunity includes a working exploit in its penetration testing kit, and the WatchBog cryptocurrency-mining botnet now has a scanner looking for vulnerable Windows machines with Remote Desktop enabled.

Malware, Exploit Sales

Kazakhstan HTTPS Interception a ‘Dangerously Misguided Policy’

The Kazakhstan government's efforts to intercept HTTPS connections and eavesdrop on secure traffic is a dangerous policy, experts say.

Privacy

Government Targets Encrypted Messaging Apps in Going Dark Argument

Law enforcement officials and lawmakers asking the technology industry to provide backdoors into encryption products is not anything new, but U.S. Attorney General William Barr did something past officials hadn't done before: Barr specified that the backdoors and workarounds should be in encrypted messaging apps.

Government, Encryption, End To End Encryption

Equifax Settles Data Breach Lawsuits

Equifax settled the various lawsuits from federal and state regulators and consumers related to its 2017 data breach for up to $700 million. Hefty price tag not withstanding, the data for 147-million victims is still out there and there's not much consumers can do about it.

Data Breaches, Finance, Government

Slack Reveals New Details on 2015 Compromise

Four years after an intrusion, Slack has discovered new details about the incident and moved to reseat many users' passwords.

Data Breaches, Passwords

Microsoft Warns Political Orgs of Attacks

There has been a lot of discussion about protecting voting systems so that ballots can’t be changed or manipulated over the past two years, but the attacks Microsoft warned about are not related to the voting process.

Microsoft, Government

Privacy Badger Starts Blocking Google Analytics

The EFF's Privacy Badger browser extension is now blocking Google Analytics through a change to detect cookie sharing.

Privacy

Persistent Cookies Can Prove Troublesome for AWS

A researcher found that some AWS authentication cookies remain valid for up to 12 hours even after a user has changed the password and logged out.

2FA, Cloud

Deciphering Spy Game

Zoe Lindsey, Dennis Fisher and Pete Baker break down the espionage classic Spy Game.

Podcast