Month: August 2019

0 Comments
There’s no doubt that Apple’s self-polished reputation for privacy and security has taken a bit of a battering recently. On the security front, Google researchers just disclosed a major flaw in the iPhone, finding a number of malicious websites that could hack into a victim’s device by exploiting a set of previously undisclosed software bugs.
0 Comments
Brookline has become the third Massachusetts municipality to call for a ban on the use of facial recognition technology by a municipal government.  The proposed ban, put forward in a warrant article by town meeting member Amy Hummel, is likely to be considered by town representatives in November. A statement in support of Hummel’s proposal was issued
0 Comments
These days it seems that there is a scam for every season, and back-to-school is no different. From phony financial aid, to debt scams, and phishing emails designed to steal your identity information, there are a lot of threats to study up on. Of course, many of these scams are just different twists on the
0 Comments
If you were trying to sneak in a quick game on Xbox Live during your Friday afternoon lunch break and found that you can’t get online: don’t worry, you’re not alone. While Microsoft’s Xbox Live Status page still says all things are good to go, reports are pouring in of an outage keeping many users
0 Comments
Fileless malware, BEC, digital extortion and ransomware attacks all grew significantly between 2018 and the first six months of this year, according to new data from Trend Micro. The security giant blocked over 26.8 billion threats in the first half of the year, over 90% of which were email-borne, according to its mid-year roundup report,
0 Comments
As data breaches and ransomware attacks continue to dominate the headlines, so too do stories about the shortage of trained information security professionals. There is a link: The cybersecurity skills shortage means that the skilled human assets needed to fight hackers’ increasingly sophisticated and damaging attacks are just not available, leaving everyone less safe. Recent
0 Comments
by Alice Duckett Episode 6 of the Naked Security Podcast is now live! This week, host Anna Brading is joined by Mark Stockley and Paul Ducklin to discuss jailbreaking iPhones [2’50”], sophisticated Instagram phishing [14’02”] and the latest social media hoax [28’23”]. As always, we love answering your cybersecurity questions on the show – simply
0 Comments
They may not be saying so, but your senior analysts are exhausted. Each day, more and more devices connect to their enterprise networks, creating an ever-growing avenue for OS exploits and phishing attacks. Meanwhile, the number of threats—some of which are powerful enough to hobble entire cities—is rising even faster. While most companies have a
0 Comments
The cost of global data breaches to victim organizations will rise to over $5 trillion by 2024 as regulatory fines take hold and firms become more dependent on digital systems, according to new predictions from Juniper Research. The figures come from the UK-based market watcher’s latest report, The Future of Cybercrime & Security: Threat Analysis,
0 Comments
Cybersecurity researchers have discovered over 80 Magecart compromised e-commerce websites that were actively sending credit card information of online shoppers to the attackers-controlled servers. Operating their businesses in the United States, Canada, Europe, Latin America, and Asia, many of these compromised websites are reputable brands in the motorsports industry and high fashion, researchers at Aite
0 Comments
The Daily Crunch is TechCrunch’s roundup of our biggest and most important stories. If you’d like to get this delivered to your inbox every day at around 9am Pacific, you can subscribe here. 1. Peloton files publicly for IPO Peloton previously filed a confidential S-1, but now its IPO documents have been revealed publicly, showing
0 Comments
by Danny Bradbury Source code management site GitHub is the latest company to support WebAuthn – a new standard that makes logging into online services using a browser more secure. WebAuthn is short for Web Authentication and it’s a protocol that lets you log into an online service by using a digital key. It’s a
0 Comments
Trump said in July that some U.S. suppliers would be allowed to sell to Huawei while it remains blacklisted, but so far no vendors have been allowed to do so. Reuters reports that more than 130 applications have been submitted by companies that want to do business with Huawei, but the U.S. Commerce Department has
0 Comments
Apple has released a new iOS security update designed to fix a jailbreak bug which it previously addressed and then accidentally rolled back. The flaw itself, CVE-2019-8605, is a use-after-free vulnerability credited to Ned Williamson working on the Google Project Zero team. The flaw, which could allow an attacker to execute arbitrary code with system
0 Comments
Tanner Harding Reporter, Products Content Published: 26 Aug 2019 Puppet has launched Puppet Remediate — its first vulnerability remediation product. The product aims to reduce the time from vulnerability detection to remediation by unifying infrastructure and vulnerability data, quickly identifying which infrastructure resources are being impacted and taking immediate action to remediate vulnerabilities. Key features