An advanced persistent threat group, active since at least 2016 and suspected in exploiting multiple attacks around the globe, is reportedly targeting institutions in Europe and Russia, according to a report released today from NETSCOUT Arbor. On 13 August NETSCOUT’s ASERT team identified new spear-phishing campaign activity from the financially motivated hacking group Cobalt. Given that
Month: August 2018
For 57% of enterprise organizations in our latest survey on cloud adoption, IT infrastructure took the form of a hybrid cloud, i.e. a mix of public cloud infrastructure-as-a-service (IaaS) and some form of private cloud data center. At McAfee, we spend a lot of time speaking about the benefits of using public cloud infrastructure providers
Instagram has announced that its users will soon be able to secure their accounts with third-party authentication apps. The move is part of a three-pronged plan that is intended to bolster user trust and safety on the photo-sharing platform Prior to the announcement of this much-anticipated change, the photo-sharing platform supported only SMS-based two-factor authentication
Google just made its Titan Security Key available on its store for $50. First announced last month at Google Cloud Next ’18 convention, Titan Security Key is a tiny USB device—similar to Yubico’s YubiKey—that offers hardware-based two-factor authentication (2FA) for online accounts with the highest level of protection against phishing attacks. Google’s Titan Security Key
VNTANA CEO Ashley Crowder calls the company’s technology, “the world’s first scalable, affordable and interactive hologram.” The startup’s tech hasn’t certainly wowed crowds in recent recent years. In 2016, it collaborated with Microsoft on HOLLAGRAM, beaming in a live hologram of MS executives during a HOLLAGRAM for a keynote at HackSC. The company’s technology has
The marriage of art and technology has the potential to stamp out art forgery, making it a thing of the past by using blockchain technology, according to Thomas Crown Art. The art-tech agency, established by art dealer Stephen Howes and technology expert Ian McLeod, has created smART (Smart Art). In an effort to eradicate counterfeit and
by Paul Ducklin There’s a useful sense of privacy from sitting in such a way that other people can’t see your laptop from behind. When you’re working on your laptop facing other people, it follows that they’re looking at the back of your screen, so they can’t see exactly what you’re up to. Whether you’re
MGM Resorts International operates 27 resort properties worldwide, including more than 420 bars and restaurants and 282 retail establishments. SVP, Chief Information Security Officer Scott Howitt oversees security for the entire global enterprise, which encompasses 20,000 endpoints, various operating systems, and applications that span the gaming, hospitality, entertainment, food and beverage, retail and hotel industries.
For Android, malware detections were down 27% compared to the first half of 2017; for iOS, they decreased 15% compared to the same period last year Mobile security plays an increasingly important role in the protection of information assets, and this applies to both home and corporate users. So, this publication will focus on analyzing the
Air Canada has confirmed a data breach that may have affected about 20,000 customers of its 1.7 million mobile app users. The company said it had “detected unusual log-in behavior” on its mobile app between August 22 and 24, during which the personal information for some of its customers “may potentially have been improperly accessed.”
Valimail, an enterprise email security firm, announced that it will offer its email protections for free to relevant government workers and campaigns through the 2018 midterms. That offer covers state election boards, voting system vendors and major party U.S. election campaigns, including congressional, statewide and gubernatorial candidates. The company will also offer the same email
In a distributed-denial-of-service (DDoS) attack that began on Sunday, 26 August, and extended into today, Spain’s central bank was knocked offline. While Banco de Espana struggled to fight off the attack, business operations were not disrupted, according to Reuters. “We suffered a denial-of-service attack that intermittently affected access to our website, but it had no
The discovery was made barely two days after the release of a patch that fixes the critical flaw in the web application framework Researchers have discovered freely available proof-of-concept (PoC) code that can be used to exploit a critical security hole in the Apache Struts 2 web application framework shortly after the vulnerability was disclosed
A security researcher has publicly disclosed the details of a previously unknown zero-day vulnerability in the Microsoft’s Windows operating system that could help a local user or malicious program obtain system privileges on the targeted machine. And guess what? The zero-day flaw has been confirmed working on a “fully-patched 64-bit Windows 10 system.” The vulnerability
Microsoft today announced a couple of AI-centric updates for OneDrive and SharePoint users with an Office 365 subscription that bring more of the company’s machine learning smarts to its file storage services. All of these features will launch at some point later this year. With the company’s Ignite conference in Orlando coming up next month,
Google recently announced a new detection model that removes bad Android apps from the Google Play Store. How does… this system work and what type of bad Android apps is it stopping? The introduction of app stores was a paradigm shift from the traditional model of installing and maintaining software and applications on an endpoint.
Unfortunately for small-to-medium-sized businesses (SMBs), many employees remain ignorant to the reality of cyber threats, making decisions that continue to put the company at risk, according to a new study from Switchfast Technologies. The study found that one in three business owners do not have safeguards in place to combat cyber breaches and 60% of
by Lisa Vaas The Democratic National Committee (DNC), on Wednesday: We’ve been spearphished! The committee called the FBI about what it said was a fake login page designed to intercept usernames and passwords that would get attackers into the party’s voter database. The DNC, early on Thursday morning: False alarm! It was a test, but
Election security has again been called into question after millions of Texas voter records were left exposed. A file discovered by Flash Gordon, a New Zealand-based data breach hunter, was left on an unsecured server without a password, according to TechCrunch. Of the 15.2 million total registered Texas voters, an astounding 14.8 million records were left
Apple last week suggested that Facebook remove its Onavo security app from the App Store due to privacy rule violations. On Wednesday, Facebook complied. Onavo, an Israel-based company that Facebook acquired in 2013, has been raising eyebrows for months. Facebook had been pushing people to download the virtual private network (VPN) app for “protection” without
How To Safely Post Images Of Your Kids Online I’m not a big sharer online but I do love popping up a few pics of an important family milestone on Facebook. Whether it’s a child starting a new school, an amazing family holiday or a hilarious birthday pic, sharing family snaps online is a great
Security researchers from Google have publicly disclosed an extremely serious security flaw in the first Fortnite installer for Android that could allow other apps installed on the targeted devices to manipulate installation process and load malware, instead of the Fortnite APK. Earlier this month, Epic Games announced not to make its insanely popular game
The cybersecurity team at T-Mobile discovered and halted an attack after a malicious actor had gained unauthorized access to the personal information of some customers during an ongoing security breach that the company disclosed on 20 August. While no financial data, passwords or social security numbers were compromised, T-Mobile wrote, “You should know that some
by Danny Bradbury The US government stepped up its attack on dark web criminals this week, announcing the arrests of several alleged drug traffickers that used hidden online services. The Department of Justice announced the arrests, along with some charges and guilty pleas, as part of Operation Darkness Falls, a joint initiative involving several government
People who use the popular social networking app Snapchat, understand what happens after three consecutive days of messaging the same person. A little flame automatically shows up next to that person’s name signaling that a Snapstreak is officially on. And, keeping that streak alive, is a bigger deal than you might guess. From that day
A former NSA contractor, who pleaded guilty to leaking a classified report on Russian hacking of the 2016 U.S. presidential election to an online news outlet last year, has been sentenced to five years and three months in prison. Reality Winner, a 26-year-old Georgia woman who held a top-secret security clearance and worked as a
Today, there was a little bit of a skirmish between two professional YouTubers. Our dear old friend Logan Paul and KSI had an actual boxing match at the Manchester Arena where 15,000 tickets were sold (!!!!!!!!) for an event that ultimately ended in a draw and vows for a rematch. The action onstage wasn’t the
What’s next for robotics? At at Disrupt SF, we’ll be joined by four experts to discuss how new technologies are changing the field. Those experts include Peter Barrett, founder and CTO and Playground, a venture fund and design studio focused on hardware startups. Barrett is a 30-year veteran of the tech industry, whose accomplishments include
On the heels of Iran driving a disinformation campaign on Facebook, researchers have discovered a spoofed university login page that appears to be part of a larger credentials theft campaign believed to be the work of COBALT DICKENS, a threat group associate with the Iranian government. According to the Counter Threat Unit (CTU) research team
by John E Dunn The third most popular mobile network in the US, T-Mobile, has suffered a data breach that affected more than two million of its customers. According to the company’s website, on 20 August 2018, T-Mobile’s inhouse security team noticed unusual activity that was immediately “shut down.” Data potentially compromised before the shutdown
- 1
- 2
- 3
- …
- 7
- Next Page »