Class-action lawsuit plaintiffs claim US health insurer Premera Blue Cross intentionally destroyed evidence despite ongoing litigation.
The gift card platform of the retail chain has been targeted by a cyberattack.
A pact of five nation states dedicated to a global “collect it all” surveillance mission has issued a memo calling on their governments to demand tech companies build backdoor access to their users’ encrypted data — or face measures to force compa ...
Security researchers have spotted a new strain of IoT malware that has been growing in sophistication and silently infecting more and more devices online.
A new verification system for all tech-support advertisers aims to block scammers.
Verification programme aims to weed out the miscreants Google has placed restrictions on tech support ads after admitting it's increasingly hard to tell promos for legit services from deceptions.…
An advanced threat actor has been associated with China’s Ministry of State Security via two individuals and a Chinese firm.
New privacy policy comes into force on October 3, requiring developers to detail how they collect and use data.
WMIC-based payloads highlight how attackers are turning to innocuous system processes to compromise Windows machines.
Proof-of-concept code detailing related exploits has been released to the public.
SonarSnoop technique transforms smartphones into mini sonar systems to track a user's finger across the screen and steal phone unlock patterns.
The peculiar malware asks victims for a "tip" in return for a decryption key.
Almost 60% of breaches had an insider element in 2017 More than half of all healthcare data breaches reported during 2017 could be traced back to people on the inside of victim organisations, according to an annual study by Verizon.…
Back to spreadsheets after transformation.
Can't tell the difference between scammers and legit providers.
Official statements from the Five Country Ministerial meeting make it clear: Voluntarily build lawful access into encrypted messaging systems, or else. It's not a good look.
Linus Torvalds thinks Intel has gotten better about keeping the Linux open-source community in the loop with CPU security problems, but it started out really badly. And it's still not fair that Linux has to fix hardware problems.
Tech companies get Faustian interception choice.
Also: Belarus barely brushes botnet builder's bankroll Another week has come and gone. This one included some Fortnite flaws, a nasty Intel bug, and a voting machine maker whining about hacking contests.…
Open source trusted execution component expected this fall At some point this fall, a team of researchers from MIT's CSAIL and UC Berkeley's EECS aim to deliver an initial version of an open source, formally verified, secure hardware enclave based on RISC ...
Fantasy sports outfit looks to hunt down group that bombarded its site A US sports gaming company is asking permission to unmask 10 people it believes were behind a massive DDoS attack on its website earlier this month.…
Another giant squid washed up on a beach, this time in Wellington, New Zealand. Is this a global trend? As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines he ...
Opinion: To sign up for Google's Advanced protection program, you must buy security keys from a Chinese vendor. Security questions have since been raised considering current intelligence laws in China.
On Thursday, September 6, starting at 10:00 am CDT, I'll be doing a Reddit "Ask Me Anything" in association with the Ford Foundation. It's about my new book, but -- of course -- you can ask me anything. No promises that I will answer everything....
This is a current list of where and when I am scheduled to speak: I'm giving a book talk on Click Here to Kill Everybody at the Ford Foundation in New York City, on September 5, 2018. The Aspen Institute's Cybersecurity & Technology Program is holding a ...
A new study shows that device identities need a level of protection that they're not getting from most organizations.
The Magecart group is likely behind the most prolific card-stealing operation seen in the wild to date.
This week's news includes a Microsoft zero-day flaw and Yahoo's recent email privacy snafu.
John McAfee-backed crypto-coin wallet eats humble pie Bitfi finally and reluctantly retracted its unhackable claim last night in the face of a new cold boot attack.…
Unlike its browser competitors, Firefox will soon start blocking tracking cookies by default in the name of consumer privacy.
Authenteq combines verified online identity with blockchain-based ID storage and end-to-end encryption to create the troll-killing Trollteq.
New Booz Allen Hamilton report advises companies to include printers in their overall security strategy.
There are three reasons today's security talent pool is neither scalable nor effective in addressing the rapid evolution of cyberattacks.
Five Eyes to tech: We have ways of making you comply The Five Eyes nations have told the tech industry to help spy agencies by creating lawful access solutions to encrypted services – and warned that governments can always legislate if they don't.…
Porridge for pic purloiner The last of the four hackers collared for stealing and leaking people's private nude photos from their online accounts back in 2014 has been sentenced to eight months' imprisonment.…
Researchers at Check Point examined this recent form of ransomware and found it relatively easy to crack.
Yet another way of eavesdropping on someone's computer activity: using the webcam microphone to "listen" to the computer's screen.
Only a third believe it would be difficult or impossible to carry out a successful insider attack.
The former Chief Commercial Officer tipped off his family in advance of poor financial results.
Emails hiding dodgy scripts designed to plant backdoors A notorious hacking group suspected in attacks across dozens of countries has launched a campaign against banks in eastern Europe and Russia.…
Color me surprised.
Negligent employees remain the number one cause of data breaches at small businesses across America. So why do small businesses continue to struggle with good cyber security practices and what can they do to correct those habits?
Bypassing permission protection on network info Security researchers have found a way to sniff Android system broadcasts to expose Wi-Fi connection information to attackers.…
Magentocore.net scrapes payment data from site visitors.
If the security community could tell you just one thing, it’s that “nothing is unhackable.” Except John McAfee’s cryptocurrency wallet, which was only unhackable until it wasn’t — twice. Security researchers have now developed a second attack ...
Cryptojacking miners and fileless malware see biggest growth in first half of 2018.
The conference's temporary network operations center provides a snapshot of what is possible when a variety of professionals work together.
Attackers increasingly are distributing malware that can be used for a variety of different tasks, Kaspersky Lab says.
CEOs only make up 2.2% of business email compromise targets, a sign most victims are further down the corporate ladder.
A threat actor been spotted on a number of honeypots looking to download and execute malicious cryptomining malware.
Hackers shouldn't quit their day scams if they want to eat Cryptojacking, the hijacking of computing resources to mine cryptocurrency, turns out to be both relatively widespread and not particularly profitable, according to a paper published by code boffi ...
With a census just two years away, the Census Bureau has a cybersecurity problem. That’s a key takeaway from the congressional watchdog, the Government Accountability Office, which oversees the government’s spending. In a new report published Thursday ...
Latest campaign by the hard-to-kill cybercrime group hides malicious code behind legitimate files, Windows processes.
The open-source tool lets penetration testers gather credentials by convincing targets to open a Microsoft WCX file.
Armed with the information, adversaries can explore and attack the local WiFi network, or identify and physically track any Android device.
The campaign uses double infection points and two command-and-control servers.
Underground forums alight with Struts chat, we hear A recently uncovered critical vulnerability in Apache Struts is already being exploited in the wild.…
The Cobalt Group is suspected of vast numbers of attacks which have caused over a billion in damages -- and they're not done yet.
The privacy issue is a problem for a lot of people. I see it differently.
Don’t worry, they’re only in charge of catching visa and passport fraud A branch of the US State Department charged with detecting visa fraud was found to ignoring basic information security practices.…
The Qualcomm Life Capsule Datacaptor Terminal Server and the Becton Dickinson Alaris TIVA Syringe Pump allow remote access without authentication.
Nearly 250 iCloud accounts, including those of several celebrities, were compromised in the 2014 attack.
Air Canada said 20,000 mobile app users have had passport information exposed; and millions have been affected by a breach at Asian hotel giant Huazhu.
I've previously written about people cheating in marathon racing by driving -- or otherwise getting near the end of the race by faster means than running. In China, two people were convicted of cheating in a pigeon race: The essence of the plan involved ...
The four-year-old security flaw has reared its head once again but this time medical equipment, and not routers, are at risk.
A vulnerability in the Android operating system can be used to track users without their knowledge.
Microsoft and Proofpoint servers ushered in 15,656 malware attachments Inhouse email filters still miss millions of attacks – including malware attachments, impersonation and malicious links – the latest quarterly stats from cloud provider Mimecast ha ...
Passport details belonging to thousands of customers may have been exposed in the incident.
Google isn’t one to shy away from bold claims. “We have had no reported or confirmed account takeovers since implementing security keys at Google,” a spokesperson told TechCrunch. And it’s probably true. Think of a security key as like a two-fact ...
Some 500 million pieces of customer data is believed to have been compromised, including that of 150 million accounts currently on sale in the dark web for 8 Bitcoins.
This report, offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future. Read the report today!
130 million could be impacted by Huazhu Group hack China’s largest hotel chain is investigating an apparent data theft that is said to involve as many as half a billion pieces of information.…
The relentless march of security breaches may cause some individuals to drop their guard, but there's more to the story than that.
More than half of professionals think they have a good shot at a successful insider attack.
The key security controls, and the effort to create them.
BusyGasper is rudimentary spyware with a bevy of novel twists that is highly effective at collecting and exfiltrating data from Android phones.
The service gleans information from receipts, travel itineraries, trade confirmations for online brokerages, Uber messages, auto-loan confirmations, promotions and much more.
Although WebAssembly technology promises both better performance and better security to developers, it also creates a new risk for native exploits in the browser.
Security experts confirm the privilege escalation vulnerability in Microsoft Windows still works.
Vault, QuintessenceLabs, and Ziroh Labs have joined forces to build a system for strong encryption of user data for government.
New report cites higher volume and increased sophistication of threats to the sector.
Clumsy Canucks app poutine passport data in hacker's hands Air Canada is advising customers to reset the passwords on their mobile app after the airline detected a potential network break-in.…
Valimail, an enterprise email security firm, announced that it will offer its email protections for free to relevant government workers and campaigns through the 2018 midterms. That offer covers state election boards, voting system vendors and major part ...
Mobile app hit in cyberattack that compromised 20K user accounts.
A coalition of privacy groups are calling on lawmakers to fill the vacant positions on the government’s surveillance oversight board, which hasn’t fully functioned in almost two years. The Privacy and Civil Liberties Oversight Board, known as PCLOB, i ...
The Schneider Electric PowerLogic PM5560 and Modicon M221 are both susceptible to attack via an array of high-severity flaws.
Having the right set of broad data is the linchpin to effective threat-hunting.
Updates include a new feature to verify the authenticity of popular accounts and a means of integrating two-factor authentication.
Threatpost talks to a Google Cloud expert about the top issues users face when securing data in the cloud.
Researchers dissect methods behind Indian cyber-heist Security researchers have taken a deep dive into the cyber attack on the SWIFT/ATM infrastructure of Cosmos Bank, the recent victim of a $13.5m cyber-heist.…
Surprise! Sensitive info held on misconfigured MongoDB server Document-reading software flinger ABBYY exposed more than 203,000 customer documents as the result of a MongoDB server misconfiguration.…
The solution: When security teams see something in cyberspace, they need to say something.
Asacub trojan has quietly been going about its business for years, stealing funds from hundreds of thousands of victims - but it can also be easily avoided.
The right know-how can turn the search engine for Internet-connected devices into a powerful tool for security professionals.
Air Canada has confirmed a data breach on its mobile app, which the airline said may affect 20,000 people — or 1 percent — of its 1.7 million app users. The company said it had “detected unusual log-in behavior” occurring between August 22-24. Ac ...
The attack allows snooping of data from environments that are highly secure or air-gapped using infrared signals from smart bulbs.
Interesting story of a CIA intelligence network in China that was exposed partly because of a computer-security failure: Although they used some of the same coding, the interim system and the main covert communication platform used in China at this time ...
Under Telegram's new privacy policy, it could hand over user IP and phone details given the right court order.
Man-in-the-Disk technique able to add malicious files to a device's external storage A newfound way to hack Android using a technique dubbed "Man-in-the-Disk&quo
t; is central to the recent security flap about Fortnite on the mobile platform.…
Founder Cody Wilson insists that a recent court injunction is still being obeyed, despite the launch.
The malware is currently being distributed through the RIG exploit kit.
Step 1: let the higher-ups know Just when it looked as if the US Democratic National Committee (DNC) had finally got one over on the phishing hackers that had been owning it since 2016, the triumph was torn away by a moment of rebellious fakery.…
It's hardly an example of legislative clarity, but the proposed amendments are intended to address key privacy concerns around the disclosure of personal medical information.
"God Mode" requires special USB debugging connector The security researchers who found a way to compromise Intel's Management Engine last year have just released proof-of-concept exploit code for the now-patched vulnerability.…
Simple script captures where people click on competitor sites.
NSA code cracker says no, hackers performing a service Voting machine vendor ES&S says it did not cooperate with the Voting Village hacking competition at DEF CON because it worried the event posed a national security risk.…
Some key security vendors - including Microsoft, Google, Cloudflare - are offering pro bono services and tools for election jurisdictions and campaigns this election season. But will it help?
Several developer tools capture a screen as an app crashes and send it to a third-party server creating a risk of corporate data leakage.
While ransomware is still popular, fileless and PowerShell attacks are the threats to watch this year.
You’re not the only one reading your emails. A deep dive in The Wall Street Journal on Tuesday dug out new details on a massive email scanning operation by Oath, the Verizon-owned subsidiary that’s the combined business of AOL and Yahoo. The email sca ...
The photo sharing platform said it will soon support two-factor authentication apps from third parties.
Hundreds of workers' details revealed, including detailed medical data.
Tool intended to help small businesses understand their risk and how well they're being addressed.
Facebook failed to fully sanitize error data returned by a public facing web app.
Surprise: Microsoft is enabling Gmail users to collaborate with others using Azure Active Directory B2B without requiring them to have a Microsoft account.
Most security teams today still don't know whether a user at the end of a remote connection is a hacker, spy, fraudster -- or even a dog. An SDP can change that.
A Windows task scheduler API function does not check permissions - so any potential local bad actor can alter them to gain elevated privileges.
Western Oz infosec audit report was shocking, but only 'cos it made public Internal cybersecurity audits rarely make it to the public domain, but when they do it’s often an eye-popping read.…
The number of complaints filed with the UK data protection watchdog has more than doubled since the introduction of new European regulations. There were 6,281 complaints filed with the Information Commissioner’s Office between May 25 when the new GDPR r ...
"When the Russian military is using free stuff, you know how good that stuff is"
The system classifies security incidents and splits national incident response into three separate teams.
If you're after an away ticket, now you know who to call Fat-fingered staff at London football team West Ham United have upset some fans following a ticket confirmation email bungle.…
In 2018, mobile communication platforms such as WhatsApp, Skype and SMS have far less protection against app-based phishing than email.