0 Comments
An American restaurant chain has warned of a possible data breach after detecting unauthorized activity in a computer system used to process payments. Church’s Chicken launched an investigation after noting the suspicious behavior at the end of October. The company has stated that any previous unauthorized third-party access that may have occurred has been halted.  “Although
0 Comments
The rise of mobile ushered in a new era of cybersecurity threats and altered the nature of endpoint security. Whereas enterprises typically managed traditional endpoints, such as laptops, today’s system admin of mobile is the end user. But even this shift in user and technical composition pales in comparison to the rise of connected devices,
0 Comments
The highest court in Pennsylvania has ruled that the state’s law enforcement cannot force suspects to turn over their passwords that would unlock their devices. The state’s Supreme Court said compelling a password from a suspect is a violation of the Fifth Amendment, a constitutional protection that protects suspects from self-incrimination. It’s not an surprising
0 Comments
The US Commonwealth of the Northern Mariana Islands (CNMI) is to welcome its first ever cybersecurity business next year. In a statement released today and published in the Marianas Variety, the CNMI Departments of Commerce and Labor announced that an unnamed US-based cybersecurity firm will open its newest Security Operations Center on CNMI’s largest island, Saipan, in
0 Comments
by John E Dunn For fans of DNS-over-HTTPS (DoH) privacy, it must feel like a dam of resistance is starting to break. Mozilla Firefox and Cloudflare were the earliest adopters of this controversial new way to make DNS queries private by encrypting them, followed not long after by the weight of Google, which embedded DoH
0 Comments
ESET researchers have discovered a new downloader with a novel, not previously seen in the wild installation technique DePriMon is a malicious downloader, with several stages and using many non-traditional techniques. To achieve persistence, the malware registers a new local port monitor – a trick falling under the “Port Monitors” technique in the MITRE ATT&CK
0 Comments
Human rights charity Amnesty International is the latest to call for reform of surveillance capitalism — blasting the business models of “surveillance giants” Facebook and Google in a new report which warns the pair’s market dominating platforms are “enabling human rights harm at a population scale”. “[D]despite the real value of the services they provide,
0 Comments
Over 100,000 people were targeted by a large-scale summer threat campaign using fake IRS websites.  The extensive phishing campaign was discovered by researchers at cloud security solutions provider Akamai. Akamai’s research team recorded threat actors using hundreds of different domains and URLs to impersonate the Internal Revenue Service of the United States over a two-month period
0 Comments
by Lisa Vaas WhatsApp’s pitch: Simple. Secure. Reliable messaging. Needed marketing addendum: Hole. Update. Now. Evil. MP4s. Facebook on Thursday posted a security advisory about a seriously risky buffer overflow vulnerability in WhatsApp, CVE-2019-11931, that could be triggered by a nastily crafted MP4 video. It’s rated as a high-risk vulnerability – 7.8 – on the
0 Comments
What an irony — someone hacked the official website of the Monero cryptocurrency project and quietly replaced legitimate Linux and Windows binaries available for download with malicious versions designed to steal funds from users’ wallets. The latest supply-chain cyberattack was revealed on Monday after a Monero user spotted that the cryptographic hash for binaries he
0 Comments
Lucence Diagnostics, a genomic medicine startup that develops non-invasive tests for cancer screening, announced today that it has raised a $20 million Series A led by IHH Healthcare, one of the world’s largest integrated private healthcare groups. Other participants included SGInnovate and returning investors Heliconia Capital (a subsidiary of Temasek Holdings), Lim Kaling and Koh
0 Comments
A study conducted by cloud-based email security company Red Sift has found that only 12.5% of America’s top 100 retailers have taken steps to prevent fraudulent emails from landing in their customers’ inboxes. The worrying finding emerged after Red Sift researchers looked into the DMARC status of companies featured in STORES Magazine’s Top 100 Retailers for 2019, along with their subsidiaries. 
0 Comments
When software-defined WAN was first introduced, it quickly became synonymous with WAN transformation. If you were going to fix the ills of wide area networking, the road led through SD-WAN. But, in truth, SD-WAN ignores many other networking and security challenges that face the digital business. A new architecture is taking hold that some analysts