Security

Cyber Security Reviews – Security will bring to our readers whats happening on the Security scene around the world.

0 Comments
Google just unsealed information about an apparently exploitable bug in WhatsApp that could have allowed a malevolent caller to take over your device. Just answering a call could have been enough to land you in trouble. Project Zero researcher Natalie Silvanovich found a buffer overflow that could be triggered by data transmitted as part of
0 Comments
Centrify has spun out its Identity-as-a-Service (IDaaS) service into a new company, which it has named Idaptive. The move will allow Centrify to move its focus to privileged access, as part of its strategy around the zero trust concept, while Idaptive’s offering includes single single-on, adaptive multi-factor authentication, enterprise mobility management and user behavior analytics
0 Comments
The United States and UK authorities have joined Amazon and Apple in contesting a blockbuster story last week that Chinese spies implanted tiny chips onto supply chain components used in the tech giants’ products. The Bloomberg story, which cites 17 unnamed sources including three at Apple and four US officials, claimed that the microchips were
0 Comments
A regional US fast food chain has become the latest victim of the notorious Fin7 hacking group after a breach of card data involving countless customers. The FBI informed Pacific North West chain Burgerville on August 22 that it had been a target of the group, also known as Carbanak. It was believed that the
0 Comments
Credential phishing campaigns, in which high-profile individuals are unwittingly falling victim to malicious actors who are looking to gain access into business systems, have proven to be a successful attack vector. According to a new Menlo Security report, Understanding a Growing Threat: Credential Phishing, credential phishing is a quickly growing cyber-attack and is increasingly becoming
0 Comments
A security vendor has discovered nearly 200 domains spoofing legitimate UK news sites in order to spread fake news. DNS security firm DomainTools ran a search on five of the UK’s most popular sites: BBC News, Sky News, ITV News and the websites of the Guardian and the Daily Mail newspapers. It discovered 197 domains
0 Comments
by Lisa Vaas Step aside Amazon, drone deliveries are already a thing in prisons. There are many things that conspirators on the outside can do drone-wise: drop mobile phones, chargers, batteries, drugs, knives, memory cards, earphones, saws, or even drills. There are also many ways for those drone drops to be duds: sometimes they crash
0 Comments
by Mark Stockley Over the summer I decided to give my kids an old Apple laptop to share. We use laptops for school homework from time to time but my kids spend most of their screen time poking and swiping tablets. I wanted to broaden their horizons a little: do a bit of coding; a
0 Comments
US financial services firms suffered three-times more data breaches in the first six months of 2018 than during the same period in 2016, according to new data from Bitglass. The security vendor aggregated data from the Identity Theft Resource Center (ITRC) and the Privacy Rights Clearinghouse (PRC) to gain insight for its Financial Breach Report
0 Comments
by Danny Bradbury Hackers are taking over high-profile Instagram users’ accounts and holding them to ransom, it was revealed this week. At least four influencers have lost control of their accounts and received demands to send bitcoin for their return, but in some cases the attackers retained control or deleted the accounts. Motherboard reported that
0 Comments
The Information Commissioner’s Office (ICO) has fined Bupa Insurance Services Limited (Bupa) £175,000 for its failure to protect the personal information of its customers. Had the timing of the breach been different, Bupa would have faced fines under the General Data Protection Regulations (GDPR), but the security incident occurred prior to those regulations going into
0 Comments
A call for new cybersecurity leadership came from Massachusetts governor Charlie Baker at yesterday’s 2018 Massachusetts Cybersecurity Forum. Hosted by Gov. Baker, the forum brought together more than 200 of the state’s foremost practitioners from the public and private sectors. The forum included thought leaders from cybersecurity companies, universities and research and development centers to
0 Comments
by John E Dunn Researchers have discovered that several leading Android-based password managers can be fooled into entering login credentials into fake phishing apps. Password managers can be used to create, store, enter and autofill passwords into apps and websites. As well as allowing users to maintain scores of strong passwords, password managers can also
0 Comments
by Anna Brading Facebook has suffered a data breach affecting almost 50 million accounts. Another 40 million have been reset as a “precautionary step”. What’s happened? In a post on the site earlier today, Facebook’s VP of Product Management, Guy Rosen, said that the breach was discovered on Tuesday 25 September 2018. Attackers exploited a
0 Comments
PKI use is increasing due to the growing impact of the Internet of Things (IoT). According to research by Thales e-Security and the Ponemon Institute of 1688 IT and security practitioners, 44% said that IoT was the most important trend driving the adoption of applications using PKI as a core enterprise asset and a root
0 Comments
A third (31%) of UK firms would dump suppliers if their negligence caused a major cyber-incident, according to a new study from Beaming. The business ISP interviewed over 500 company bosses to find out more about their attitudes to cybersecurity, and revealed a refreshingly no-nonsense attitude when it comes to managing supply chains. Aside from those