Application security, Security, Threats & Malware, Vulnerabilities
August 11, 2020
Via: DataBreach TodayHeads-up on the existence of a serious security problem affecting many Android devices for which no fix is yet available, short of ditching any vulnerable gear. Researchers at Check Point Software Technologies have counted 400 flaws in Qualcomm’s Digital Signal […]
August 3, 2020
Via: DataBreach TodayIs Microsoft coming to TikTok’s rescue? It appears that’s a very strong possibility following President Donald Trump’s threat Friday to ban the app in the U.S. In a statement late Sunday, Microsoft says it’s discussing acquiring a portion of TikTok. […]
Threats & Malware, Vulnerabilities
July 30, 2020
Via: Security WeekFirmware security company Eclypsium revealed on Wednesday that billions of Windows and Linux devices are affected by a potentially serious vulnerability that can be exploited to install stealthy and persistent malware. The firm says the weakness affects devices that use […]
Threats & Malware, Vulnerabilities
July 27, 2020
Via: DataBreach TodayThree botnet families are battling it out, seeking vulnerable home routers to take over and use as proxies, researchers at the security firm Trend Micro say. Residential routers are a prime target for cybercriminals. Most households have one, and due […]
July 20, 2020
Via: DataBreach TodayThe hijacking of more than 130 high-profile Twitter accounts last week is extraordinary in at least one respect: that it didn’t happen sooner. As online companies have improved their security protections to prevent account hijacking, attackers have looked for new […]
June 8, 2020
Via: DataBreach TodayThe global COVID-19 pandemic has created a new series of cybersecurity challenges for election officials across the U.S., including concerns about the security of mail-in ballots and whether attackers will target vulnerable networks for those local election workers still working […]
Threats & Malware, Vulnerabilities
May 11, 2020
Via: Security WeekThe new attack method, dubbed Thunderspy, was discovered by Björn Ruytenberg of the Eindhoven University of Technology in the Netherlands. The researcher has discovered a total of 7 vulnerabilities related to improper firmware verification, weak device authentication, the use of […]
April 21, 2020
Via: CSO OnlineThe average enterprise, according to many estimates, has between 200-500 individual security products installed, ranging from multiple products deployed on user endpoint devices, all the way up to large scale network monitoring and protection software/appliances, as well as cloud-based service […]
March 17, 2020
Via: DataBreach TodayAfter a week of ups and downs, Wall Street took another plunge on Monday, bringing technology companies and cybersecurity firms along for the ride for what turned out to be one of the worst U.S. stock market days in history. […]
Cloud security, Network security, Security
March 10, 2020
Via: DataBreach TodayMonday is a day that Wall Street – and cybersecurity firms – are not likely to forget anytime soon. With the twin threats of COVID-19 spreading throughout the world and oil prices plummeting nearly 34 percent due to a dispute […]
March 6, 2020
Via: Help Net SecurityMore than 50 percent of security and IT leaders agree that they are very concerned about the security of corporate endpoints given the prevalence of sophisticated attack vectors like ransomware, disruptionware, phishing and more, according to a survey from RSA […]
Threats & Malware, Vulnerabilities
January 31, 2020
Via: Help Net SecurityOrganizations are not making progress in reducing their endpoint security risk, especially against new and unknown threats, a Ponemon Institute study reveals. 68% IT security professionals say their company experienced one or more endpoint attacks that compromised data assets or […]
January 31, 2020
Via: DataBreach TodayFacing intense criticism, anti-virus software maker Avast on Thursday said it will shut down Jumpshot, its data collecting side business. The Avast subsidiary has been funneling to marketers detailed internet browsing activity from the firm’s security products and browser extensions. […]
Threats & Malware, Vulnerabilities
January 30, 2020
Via: Security WeekDMA is designed to allow hardware components or peripheral devices to directly access system memory, independently of the operating system and the CPU. The feature, however, can be abused for malicious purposes by an attacker who has gained access to […]
January 14, 2020
Via: Computer WeeklyHackers spent an average of 95 days moving around inside business networks before launching their attacks in 2019, up 10 days on 2018, as increasingly organised criminal groups become adept at hiding their activities from defenders in targeted attacks. This […]
February 26, 2018
Via: Security IntelligenceThere has been a critical skills shortage in cybersecurity for years. In fact, Cisco estimated that there are currently 1 million unfilled cybersecurity positions around the world. Given the rapid expansion of networks, the growing threat surface, continuous attacker innovation […]
Access control, Cyber-crime, Network security
December 18, 2017
Via: Help Net SecurityThe compromise of a single enterprise endpoint can ultimately lead to a wider security incident, ransomware outbreak, data breach, costly remediation and rebuilding of lost reputation. Most organizations know this, but still struggle to obtain visibility into and control over […]
November 8, 2017
Via: Security IntelligenceWhen it comes to securing their environments, IT professionals have a critical decision to make: Should they wait until after malicious actors strike to react to security incidents, or should they address threats proactively to stop attacks before they happen? […]
September 19, 2017
Via: Help Net Security54% of respondents to a Ponemon Institute study that involved more than 1,000 IT professionals said negligent employees were the root cause of a data breach. The study found that strong passwords and biometrics continue to be an essential part […]
August 15, 2017
Via: Security IntelligenceTo match the ongoing shift to cloud as a means of increasing agility when delivering services, the architectures supporting these services are also evolving. The cloud IT space is full of terminology such as infrastructure-as-code, highly scalable architectures and microservices […]