Top

Cyber-crime, Malware

Extensive ‘Living Off the Land’ Hides Stealthy Malware Campaign

February 13, 2019

Via: Security Week

The latest campaign, discovered by the Cybereason Nocturnus Research team, uses an evolved variant of the malware that goes to great lengths to remain stealthy in what is described as a ‘massive spam campaign’. In a blog report published today, […]


Network security, Security

What Have We Learned About Data Protection After Another Year of Breaches?

February 13, 2019

Via: Security Intelligence

When the General Data Protection Regulation (GDPR) took effect last May, companies were seeking guidance and best practices to address their compliance challenges. Although this sense of urgency is beginning to diminish, the demand for data privacy controls will only […]


Network security, Security

The Costs of Cyberattacks Are Real

February 13, 2019

Via: Radware Blog

Customers put their trust in companies to deliver on promises of security. Think about how quickly most people tick the boxes on required privacy agreements, likely without reading them. They want to believe the companies they choose to associate with […]


Cloud security, Security, Threats & Malware, Vulnerabilities

Major Container Security Flaw Threatens Cascading Attacks

February 12, 2019

Via: Threat Post

runc, a building-block project for the container technologies used by many enterprises as well as public cloud providers, has patched a vulnerability that would allow root-level code-execution, container escape and access to the host filesystem. Discovered by researchers Adam Iwaniuk […]


Access control, Security

What is biometrics? And why collecting biometric data is risky

February 12, 2019

Via: CSO Online

Biometric authentication uses physical or behavioral human characteristics to digitally identify a person to grant access to systems, devices or data. Examples of these biometric identifiers are fingerprints, facial patterns, voice or typing cadence. Each of these identifiers is considered […]


Network security, Security

Is 2019 the year national privacy law is established in the US?

February 12, 2019

Via: Help Net Security

Data breaches and privacy violations are now commonplace. Unfortunately, the consequences for US companies involved can be complicated. A company’s obligation to a person affected by a data breach depends in part on the laws of the state where the […]


Cyber-crime, Malware

Linux Miner Removes Competing Malware From Infected Systems

February 11, 2019

Via: Security Week

The threat, which borrows code from previously seen malware, such as Xbash and KORKERDS, installs crypto-currency mining code onto the victim machine, and achieves persistence through implanting itself into the system and crontabs. As part of the attack, an initial […]


Hacker, Threats & Malware

How polls are hacked: What every business should know

February 11, 2019

Via: CSO Online

The news in January about Michael Cohen’s indictments covers some interesting ground for IT managers and gives security teams something else to worry about: He allegedly paid a big data firm Redfinch Solutions to rig two online polls in then-candidate […]


Data loss, Threats & Malware

Have we reached peak privacy? How good IAM and privacy can coexist

February 11, 2019

Via: CSO Online

Data privacy has made big headlines in the last 12 months. Wherever we look there is an article about a data breach, a data protection regulation update, or a colleague talking about data privacy. It may have all become too […]


Mobile security, Privacy protection

Update your iOS devices now against the FaceTime eavesdropping bug

February 8, 2019

Via: Hot for Security

Last week a bug became such big news that it broke out of the technology press, and into the mainstream media – generating headlines around the globe. The reason? A bizarre bug had been discovered in the way iPhones and […]