Tuesday, March 19, 2019

Ars Technica

Google, Microsoft work together for a year to figure out new type of Windows flaw

Enlarge (credit: Marco Verch / Flickr) One of the more notable features of Google Project Zero's (GPZ) security research has been its 90-day disclosure policy. In general, vendors are given 90 days to address issues found by GPZ, after which the flaws will be publicly disclosed. But sometimes...

Epic says its Game Store is not spying on you

Enlarge / Despite what you may have read, Epic says this is not spyware. This week, certain corners of the gaming Internet have been abuzz with a bit of self-described "amateur analysis" suggesting some "pretty sketchy," spyware-like activity on the part of the Epic Game Store and...

An email marketing company left 809 million records exposed online

Enlarge / (GERMANY OUT) Leerstehendes Fabrikgebäude im Bonner Stadtteil Friesdorf. Vernagelte Eingangstüre mit zerschlagenen Scheiben (Photo by JOKER / Karl-Heinz Hick/ullstein bild via Getty Images) (credit: Ullstein Bild | Getty Images) By this point, you've hopefully gotten the message that your personal data can end...


Heavenly tech support

Pilot fish is helping his pastor fine-tune the church LAN when he notices that the day-care facility next door has a wide-open and unsecured Wi-Fi connection.Fish’s pastor wants to connect to the day-care center’s printer and print a document saying, “This is from your neighbors. You need to tighten...

Slack rolls out enterprise key management, but has no plans for end-to-end encryption

Slack has given large business customers control over the keys used to encrypt and decrypt data created in its team collaboration application. The enterprise key management (EKM) feature was initially unveiled at the company’s Frontiers event in San Francisco in September, ahead of a closed pilot project; it is now...

March 2019 Windows and Office patches poke a few interesting places

Patch Tuesday has come and gone, not with a bang but a whimper. As of this moment, early Wednesday morning, I don’t see any glaring problems with the 124 patches covering 64 individually identified security holes. But the day is yet young.There are a few patches of note.Two zero...


Does GDPR compliance reduce breach risk?

Compliance can be costly and often feels more like red tape and a barrier to business than anything that provides a benefit. A report by EY and the International Association of Privacy Professionals (IAPP) estimates that organizations have spend an average of $3 million to achieve compliance with the...

Cyber risk management challenges are impacting the business

There was quite a bit of banter about boardroom cybersecurity actions at this year’s RSA Security Conference. No surprise here; business executives understand what’s at stake and are asking CISOs to provide more cyber risk data and metrics, so they can work with them on intelligent risk mitigation strategies.This...

12 tips for effectively presenting cybersecurity to the board

Cybersecurity is a top concern for boards of directors.To read this article in full, please click here(Insider Story)

Dark Reading

6 Ways Mature DevOps Teams Are Killing It in Security

New survey shows where "elite" DevOps organizations are better able to incorporate security into application security.

The Case of the Missing Data

The latest twist in the Equifax breach has serious implications for organizations.

Norsk Hydro Shuts Plants Amid Ransomware Attack

The cyberattack, first detected on Monday night, has shut down Norsk's entire global network.

Stealing Corporate Funds Still Top Goal of Messaging Attacks

Cybercriminals focus on collecting credentials, blackmailing users with fake sextortion scams, and convincing privileged employees to transfer cash. The latter still causes the most damage, and some signs suggest it is moving to mobile.

Errata Security

Some notes on the Raspberry Pi

I keep seeing this article in my timeline today about the Raspberry Pi. I thought I'd write up some notes about it.The Raspberry Pi costs $35 for the board, but to achieve a fully functional system, you'll need to add a power supply, storage, and heatsink, which ends up...

A quick lesson in confirmation bias

In my experience, hacking investigations are driven by ignorance and confirmation bias. We regularly see things we cannot explain. We respond by coming up with a story where our pet theory explains it. Since there is no alternative explanation, this then becomes evidence of our theory, where this otherwise...

A basic question about TCP

So on Twitter, somebody asked this question:I have a very basic computer networking question: when sending a TCP packet, is the packet ACK'ed at every node in the route between the sender and the recipient, or just by the final recipient?This isn't just a basic question, it is the basic...


Analysis Of Brexit-Centric Twitter Activity

This is a rather long blog post, so we’ve created a PDF for you to download, if you’d like to read it offline. You can download that from here. Executive Summary This report explores Brexit-related Twitter activity occurring between December 4, 2018 and February 13, 2019. Using the standard Twitter API,...

Why Social Network Analysis Is Important

I got into social network analysis purely for nerdy reasons – I wanted to write some code in my free time, and python modules that wrap Twitter’s API (such as tweepy) allowed me to do simple things with just a few lines of code. I started off with toy...

NRSMiner updates to newer version

More than a year after the world first saw the Eternal Blue exploit in action during the May 2017 WannaCry outbreak, we are still seeing unpatched machines in Asia being infected by malware that uses the exploit to spread. Starting in mid-November 2018, our telemetry reports indicate that the...


Dissecting a NETWIRE Phishing Campaign’s Usage of Process Hollowing

Introduction Malware authors attempt to evade detection by executing their payload without having to write the executable file on the disk. One of the most commonly seen techniques of this "fileless" execution is code injection. Rather than executing the malware directly, attackers inject the malware...

Breaking the Bank: Weakness in Financial AI Applications

Currently, threat actors possess limited access to the technology required to conduct disruptive operations against financial artificial intelligence (AI) systems and the risk of this targeting type remains low. However, there is a high risk of threat actors leveraging AI as part of disinformation campaigns...

Going ATOMIC: Clustering and Associating Attacker Activity at Scale

At FireEye, we work hard to detect, track, and stop attackers. As part of this work, we learn a great deal of information about how various attackers operate, including details about commonly used malware, infrastructure, delivery mechanisms, and other tools and techniques. This knowledge is...


How A Leading Cyber Security Company Uses Blockchain Technology To Prevent Data Tampering

The leading cyber security company, Acronis, explains how blockchain technology is being used to prevent data tampering, which has become a major threat for cyber security.

How Deception Technology Gives You The Upper Hand In Cybersecurity

Deception offers an effective way to detect attacks in progress, with no false positives. It alters the balance of power between attacker and target, giving companies the upper hand in combating both external and internal threats.

California Revives Stronger Net Neutrality Bill After Public Backlash

After outcry over a hollowed-out version, California lawmakers are moving forward with a restored bill to protect state consumers without federal rules.

Google Security

Open-sourcing Sandboxed API

Posted by Christian Blichmann & Robert Swiecki, ISE Sandboxing teamMany software projects process data which is externally generated, and thus potentially untrusted. For example, this could be the conversion of user-provided picture files into different formats, or even executing user-generated software code.When a software library parsing such data is...

Disclosing vulnerabilities to protect users across platforms

Posted by Clement Lecigne, Threat Analysis GroupOn Wednesday, February 27th, we reported two 0-day vulnerabilities — previously publicly-unknown vulnerabilities — one affecting Google Chrome and another in Microsoft Windows that were being exploited together.To remediate the Chrome vulnerability (CVE-2019-5786), Google released an update for all Chrome platforms on March...

Android Security Improvement update: Helping developers harden their apps, one thwarted vulnerability at a time

Posted by Patrick Mutchler and Meghan Kelly, Android Security & Privacy TeamHelping Android app developers build secure apps, free of known vulnerabilities, means helping the overall ecosystem thrive. This is why we launched the Application Security Improvement Program five years ago, and why we're still so invested in its...

Graham Cluley

Why real-time intelligence matters for managing third-party risk

Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support! As leading companies in every industry today are undergoing digital transformation, the lines are blurring between any one organization and its partners, suppliers, vendors, and other third...

Aluminium plants hit by cyber-attack, global company turns to manual operations

Norsk Hydro, one of the world’s largest producers of aluminium, says that it is battling an “extensive cyber-attack” that first hit its systems on Monday evening and then escalated overnight. Read more in my article on the Hot for Security blog.

Google Play is flooded with hundreds of unsafe anti-virus products

A new study has closely examined whether 250 security products for Android smartphones are capable of protecting users at all. The results are in… and disturbing. Read more in my article on the Hot for Security blog.

IBM Security

Why You Should Integrate IoT Security Into Your Vulnerability Management Program

It’s safe to say that the internet of things (IoT) is mature enough that it’s on everyone’s radar by now. The IoT as we know it has been around for more than a decade, but it wasn’t until about five years ago that organizations started integrating the IoT as...

The Biggest Stories From RSAC 2019: What Scares the Cybersecurity Experts?

RSAC 2019 has officially wrapped. The reported attendance at San Francisco’s Moscone Center was more than 42,500, but to anyone who was there, it seemed like there was at least 60,000 security professionals on the ground. Whether or not you attended, there was no possible way to take in...

How Patch Posture Reporting Improves Security Landscapes

Vulnerability identification and remediation are critical to maintaining a secure environment. Today, most organizations are using one or multiple vulnerability scanning tools to identify vulnerabilities on endpoints such as business critical servers, laptops and desktops. They also have processes in place to apply security patches (provided by platform or...

Info Security Buzz

What Mounting Cybersecurity Threats Mean For Your Business

Hacking has always been a problem for businesses and governments around the world. They have tried to upset the balance and induce fear amongst people while, simultaneously, trying to either get rich or win loyalty. Some major attacks on the biggest companies around the globe have left our confidence...

The Three Big Ways iOS App Development Will Change In The Next Five Years

I have always loved Heraclitus’ teaching of, “No man ever steps in the same river twice.” It is a reminder of the impermanence of life. Though the Greek who lived 2500 years ago was speaking in broad terms, he very well could have been speaking about iOS app development....

The Biometric Smart Card: Connecting The Digitally Excluded

Digital inclusion is the ability of individuals to access and use information and communication technologies (ICT). Even in today’s hyper-connected and technologically advanced world, there are still those who struggle to access basic IT and are being excluded as a result. In fact, according to recent research, 11.5m people...

Infosec Island

1 Million Apps Patched in Android Security Improvement Program

Over its five-year lifetime, the Android Application Security Improvement Program helped over 300,000 developers to fix more than 1,000,000 apps on Google Play, Google says. The program was launched to help the Android ecosystem thrive by helping developers improve the security of their applications and eliminate vulnerabilities from them. Through this...

The Role of Analytics in Protecting Healthcare Data Privacy and Security

Healthcare has traditionally had a weaker security profile than most other industries. On the one hand, it is a favorite target for ransomware attacks, and for hackers looking to steal confidential patient records that have a high resale value on the black market. On the other, healthcare experiences more...

WINDSHIFT Hackers Target Government Agency in the Middle East

A recently discovered threat actor was observed targeting a Middle Eastern government agency on several occasions over the course of last year, Palo Alto Networks security researchers reveal.  Referred to as WINDSHIFT, the surveillance-focused threat actor is believed to have remained unnoticed for a long time, and to have hacked other...

Infosecurity Magazine

US Orgs Not Ready to Comply with CCPA

US Orgs Not Ready to Comply with CCPAProtecting consumer privacy has become a top priority for legislators as candidates launch their 2020 campaigns and try to win over voters. According to research findings revealed in the new CCPA and GDPR Compliance Report, however, US companies haven't made privacy regulations...

Consumers Donate Data with Recycled Electronics

Consumers Donate Data with Recycled ElectronicsWith the rapid turnover of technology, many consumers willingly trade in, sell or donate their old electronics, often times without ensuring that all of their data has been wiped clean, according to new findings from Rapid7. In a recent experiment conducted by Rapid7’s Josh Frantz,...

Apple, Microsoft Top Orgs Used in Spear Phishing

Apple, Microsoft Top Orgs Used in Spear PhishingAs spear-phishing tactics continue to evolve, attackers are using these threats with greater frequency and severity, making spear-phishing attacks the top threat vector for many organizations, according to a new report from Barracuda Networks. Despite increased awareness of the types of threats they...

Krebs on Security

Why Phone Numbers Stink As Identity Proof

Phone numbers stink for security and authentication. They stink because most of us have so much invested in these digits that they’ve become de facto identities. At the same time, when you lose control over a phone number — maybe it’s hijacked by fraudsters, you got separated or divorced,...

Ad Network Sizmek Probes Account Breach

Online advertising firm Sizmek Inc.  says it is investigating a security incident in which a hacker was reselling access to a user account with the ability to modify ads and analytics for a number of big-name advertisers. In a recent posting to a Russian-language cybercrime forum, an individual who’s been...

Patch Tuesday, March 2019 Edition

Microsoft on Tuesday pushed out software updates to fix more than five dozen security vulnerabilities in its Windows operating systems, Internet Explorer, Edge, Office and Sharepoint. If you (ab)use Microsoft products, it’s time once again to start thinking about getting your patches on. Malware or bad guys can remotely...

Naked Security

CIA bribery scam – crooks offer to erase child abuse evidence for $10,000

This scam is both intimidating and disturbing - the crooks are presenting themselves as corrupt CIA officials who will take a bribe.

Microsoft won’t patch Windows registry warning problem

A security researcher has found a way to tinker with Windows’ core settings while persuading users to accept the changes.

Gargantuan Gnosticplayers breach swells to 863 million records

Another 26m records stolen from another six online companies brings this hacker's total number of records to 863m from 38 websites.

Court: Embarrassing leaks of internal Facebook emails are fishy

The leaks point to a plot, a Calif. court said, ordering pikini app maker Six4Three to hand over its lawyers' chats with the ICO.

PC Mag

Germany’s Anti-Black Market Bill May Threaten Tor Network

The new bill is designed to close a loophole in local laws, which made it difficult to punish the operators of black market websites. But privacy experts fear the same bill will criminalize anyone who supports the dark web's infrastructure, such as the Tor network.

Bootleg Ariana Grande Album Used to Spread Malware Via WinRAR Flaw

The rigged copy of 'Thank U, Next' was designed to exploit a newly discovered flaw in WinRAR, a popular file compression tool. Unpacking the album with vulnerable versions of WinRAR can secretly deliver malware to your PC's Startup Folder.

Pro-Trump App Threatens Expert for Finding Flaw in Code

The app, 63red Safe, has been grabbing headlines as Yelp-like service that can help conservatives find businesses and restaurants that'll welcome all political beliefs. But the app's code also contains a flaw that can leak user's data, according to a French security researcher.

SC Magazine

Norwegian aluminum producer Norsk Hydro hit by an unspecified cyberattack

Norwegian aluminum producer Norsk Hydro was hit by a cyber attack which began Monday evening and escalated into the night. The Norwegian National Security Authority (NSM) declined to comment on what type of attack it was but said the extent of the attack is still being assessed and that it’s...

Glitch exposes Sprint customer data to other users

A bug has allowed some Sprint customers to see the personal data of other customers from their online accounts. The information visible includes names, cell phone numbers as well as calls made by other users and, and a Tech Crunch report cited one customer saying, “I was able to click each one...

Authorities had OK to use Broidy’s hands, face to unlock phones confiscated in raid

Federal agents raiding the offices of former Republican National Committee (RNC) Deputy Finance Chair Elliot Broidy last year looking for details on his dealings with a number of people, including “Trump administration associates,” were authorized to use the fundraiser’s hands and face to unlock phones whose contents were protected...

Schneier on Security


Good article on the Triton malware which targets industrial control systems.

CAs Reissue Over One Million Weak Certificates

Turns out that the software a bunch of CAs used to generate public-key certificates was flawed: they created random serial numbers with only 63 bits instead of the required 64. That may not seem like a big deal to the layman, but that one bit change means that the...

Friday Squid Blogging: A Squid-Related Vacation Tour in Hawaii

You can hunt for the Hawaiian bobtail squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here.


Checklist 129: The Internet of Things and Other Things

On this week’s Checklist by SecureMac: Congress nibbles at the Internet of Things, Out of sight is not off the grid and A show worthy of a security conference. The post Checklist 129: The Internet of Things and Other Things appeared first on SecureMac.

iPhone Prototypes Find Their Way to Hackers and Researchers Alike

Have you ever wondered about how hackers or security researchers can figure out where the hidden flaws in iOS lay? For years, that’s been a big question, from concerns about how companies such as Cellebrite and GrayKey found their way into iOS to how researchers were able to examine...

Google Shares Details about a New macOS Vulnerability

On Friday, March 1, 2019, Google’s Project Zero announced that it had discovered a “high severity” vulnerability in Apple’s macOS operating system. The Project Zero team constantly works to find vulnerabilities in software and code from other companies and developers. When Project Zero does identify a weakness, it notifies...

Security Affairs

Aluminum producer Norsk Hydro hit by a massive cyber attack

The giant of aluminum producers, Norway’s Norsk Hydro, announced on Tuesday that it had been hit by a cyber-attack of unknown origin. One of the biggest Aluminum producer, the Norwegian Norsk Hydro, suffered an extensive cyber attack. “Hydro became victim of an extensive cyberattack in the early hours of Tuesday,...

EU adopts EU Law Enforcement Emergency Response Protocol for massive cyberattacks

Europol announced the EU Law Enforcement Emergency Response Protocol new protocol for law enforcement agencies in the European Union and abroad to handle major cross-border cyberattacks. Europol announced the adoption of a new protocol for law enforcement bodies in the EU and abroad to respond to major cyber cross-border cyberattacks. The...

Slack Launched Encryption Key Addon For Businesses

Slack announced today to launch encryption keys that will help businesses to protect their data. Slack announced today to launch encryption keys that will help businesses to protect their data. Staying safe is the toughest job in this risky online world. With the exponential growth of online...


Industrial Cybersecurity Firm Nozomi Launches Research Department

Industrial cybersecurity solutions provider Nozomi Networks on Tuesday announced the formal launch of the company’s research department, Nozomi Networks Labs. read more

Cloudflare Launches New HTTPS Interception Detection Tools

Security services provider Cloudflare on Monday announced the release of two new tools related to HTTPS interception detection.  read more

Mobile App Security Firm Blue Cedar Raises $17 Million

Blue Cedar, a San Francisco-based company that specializes in securing mobile applications, on Tuesday announced that it raised $17 million in a Series B funding round. read more


Businesses failing to meet California Consumer Privacy Act compliance goals

Set to go into effect on January 1, 2020, the CCPA will affect lots of companies doing business in California, but 86% have yet to meet compliance goals.

The 3 least secure programming languages

These coding languages have the most open source vulnerabilities, according to a WhiteSource report.

How to prevent spear phishing attacks: 8 tips for your business

Spear phishing attacks, including business email compromise and brand impersonation, are on the rise, according to Barracuda.

The Guardian

Beware of digital manipulation ahead of the EU elections | Eleonora Nestola

Personal information is being used to target voters – and the EU commission isn’t doing enough to build safeguardsOn 11 July last year the UK Information Commissioner’s Office (ICO)published its first report on the Cambridge Analytica scandal. This is a date I will never forget, a date that substantially...

Optus privacy breach: names, addresses and details revealed in sim card glitch

Some mobile users were able to see records of other users when logging in to phone serviceOptus has scrambled to contact customers whose personal details were revealed in a system glitch affecting pre-paid mobile sim card activation and the company’s account website.Some customers have reported being able to see...

Mumsnet reports itself to regulator over data breach

Company apologises after bug meant users were able to log into accounts of strangersMumsnet has reported itself to the information commissioner after a data breach resulted in users accidentally logging into the accounts of strangers.A botched upgrade to the software the forum runs on meant that for three days,...

The Hacker News

Android Q — Google Adds New Mobile Security and Privacy Features

Google has recently released the first beta version of Android Q, the next upcoming version of Google's popular mobile operating system, with a lot of new privacy improvements and other security enhancements. Android Q, where Q has not yet been named, offers more control over installed apps, their access and...

Ransomware Attack Forces Aluminum Manufacturer to Shutdown Systems Worldwide

Photo by Terje Pedersen / NTB scanpix One of the world's largest producers of aluminum has been forced to shut down several of its plants across Europe and the U.S. after an "extensive cyber attack" hit its operations, leaving companies' IT systems unusable. According to a press release shared by Aluminum...

Libssh Releases Update to Patch 9 New Security Vulnerabilities

Libssh2, a popular open source client-side C library implementing the SSHv2 protocol, has released the latest version of its software to patch a total of nine security vulnerabilities. The Libssh2 library is available for all major distributors of the Linux operating systems, including Ubuntu, Red Hat, Debian, and also comes...

The Register

Ransomware drops the Lillehammer on Norsk Hydro: Aluminium giant forced into manual mode after systems scrambled

Norway the power and metals wrangler could have seen this one coming Norwegian power and metals giant Norsk Hydro is battling an extensive ransomware infection on its computers.…

Sorry, Linux. We know you want to be popular, but cyber-crooks are all about Microsoft for now

Oh, and Flash! Arrrrrggghhh Eight out of the ten most exploited vulnerabilities tracked by threat intelligence biz Recorded Future in 2018 targeted Microsoft products – though number two on its list was, surprise surprise, a Flash flaw.…

PuTTY in your hands: SSH client gets patched after RSA key exchange memory vuln spotted

Bunch of bugs stomped with version 0.71 Venerable SSH client PuTTY has received a pile of security patches, with its lead maintainer admitting to the The Register that one fixed a "'game over' level vulnerability".…

The Security Ledger

Podcast Episode 138: Hacker President? Joseph Menn of Reuters talks Beto and Cult of the Dead Cow

In this exclusive podcast interview with Security Ledger, Reuters investigative technology journalist Joseph Menn talks about his upcoming book on the iconic hacking group Cult of the Dead Cow and his discovery that U.S. presidential candidate Beto O'Rourke of Texas was an early member. The post Podcast Episode 138: Hacker...

RSA Recap: CTO Zulfikar Ramzan talks about Trust, Zero Trust and the Debate over Going Dark

I talk with Zulfikar Ramzan, Chief Technology Officer (CTO) at RSA Security* about the major trends at this year's RSA Conference including the growing focus on digital risk and trust, the debate around encryption, law enforcement and "going dark" and what people mean when they talk about "zero trust"...

Whack-a-Fraud: EU’s Crackdown Could Increase U.S. Payments Scams

U.S. providers should be "on alert" for an increase in payments fraud experts warn. The European Union's (EU's) new Payment Services Directive (PSD2) raises the bar for security and may cause cybercriminals to focus on targets in this country. The post Whack-a-Fraud: EU’s Crackdown Could Increase U.S. Payments Scams appeared...


Old Tech Spills Digital Dirt on Past Owners

Researcher buys old computers, flash drives, phones and hard drives and finds only two properly wiped devices out of 85 examined.

Researcher Says NSA’s Ghidra Tool Can Be Used for RCE

Researchers have released a proof-of-concept showing how a XXE vulnerability can be exploited to attack Ghidra project users.

Norsk Hydro Calls Ransomware Attack ‘Severe’

When asked if the company plans to pay the ransom, its CFO said its main strategy is to use the backup data stored in the system.

ThreatList: DDoS Attack Sizes Drop 85 Percent Post FBI Crackdown

The FBI's crackdown on 15 DDoS-for-hire sites appears to have had an impact on DDoS attacks, the average size for which dropped 85 percent in the fourth quarter of 2018, a new report found.


New Sextortion Scam Tries to Scare Users with Fake CIA Investigation

Extortionists have launched a new sextortion scam campaign that leverages a fake Central Intelligence Agency (CIA) investigation to try to scare users. In an email I obtained from a wary user, the scammers pose as a fake CIA technical collection officer named Roxana Mackay. This character claims in the...

Spam Campaign Uses Recent Boeing 737 Max Crashes to Push Malware

A spam campaign is using two recent crashes involving Boeing 737 Max aircraft to distribute malware to unsuspecting users. Discovered by 360 Threat Intelligence Center, a research division of 360 Enterprise Security Group, the campaign sends out attack emails that come from “info@isgec.com” with the subject line “Fwd: Airlines...

Attackers Sending Fake Copyright Infringement Notices to Instagram Users

Digital attackers are targeting high-profile Instagram users with fake copyright infringement notifications in a bid to hijack their accounts. Detected by Kaspersky Lab, this scheme begins when an Instagram influencer receives an email notification informing them that their “account will be permanently deleted for copyright infringement.” The email notice...

Troy Hunt

Weekly Update 130

Presently sponsored by: Twilio: Passwords are no longer enough. Two-factor authentication improves security, implement fast with 'Twilio's Authy API.'Well that was a hell of a week of travel. Seriously, the Denver situation was just an absolute mess but when looking at the video from the day I was meant...

These Cookie Warning Shenanigans Have Got to Stop

Presently sponsored by: Live Workshop! Watch the Varonis DFIR team investigate a cyberattack using our data-centric security stackThis will be short, ranty and to the point: these warnings are getting ridiculous: I know, tell you something you don't know! The whole ugly issue reared its head again on...

Weekly Update 129

Presently sponsored by: Twilio: If you only offer 2FA via SMS, your customers are at risk. Learn about our Authy API and how to better protect your user accounts.Heaps of stuff going on this week with all sorts of different bits and pieces. I bought a massive new stash...

We Live Security

You should pick your Android security app wisely, test shows

It’s prudent to get a security solution for your device, but a test by AV-Comparatives shows why you need to choose judiciously The post You should pick your Android security app wisely, test shows appeared first on WeLiveSecurity

I didn’t see what you did, redux

Cyberblackmail/sextortion again raises its not-so-pretty little head The post I didn’t see what you did, redux appeared first on WeLiveSecurity

Week in security with Tony Anscombe

Asian game developers again targeted in supply-chain attacks distributing malware. Facebook suffer most severe outage ever. Plus, over 2 billion records exposed by email marketing firm The post Week in security with Tony Anscombe appeared first on WeLiveSecurity


The Evidence That Could Impeach Donald Trump

Nancy Pelosi’s comments about impeachment acknowledge a political reality: Nothing the Mueller probe has revealed so far has moved the GOP substantially.

Here’s What It’s Like to Accidentally Expose the Data of 230M People

The owner of Exactis, a 10-person firm that exposed a database including nearly every American, tells the story of his company's downfall.

Beto O’Rourke Belonged to an Infamous ’90s Hacker Group

Facial recognition, DuckDuckGo on Chrome, and more security news this week.

Most Android Antivirus Apps Are Garbage

Fraudulent and ineffective antivirus apps persist on the Google Play Store, and it's unclear whether they'll ever totally go away.


Severe security bug found in popular PHP library for creating PDF files

Vulnerability patched last year, but many websites and web apps will most likely remain vulnerable for years.

EU government websites infested with third-party adtech scripts

Ironic as it may be, EU websites might not be compliant with the EU's own data protection rules.

Aluminum producer switches to manual operations after ‘extensive cyber-attack’

Norway's Norsk Hydro said a cyber-attack on late Monday night crippled its IT systems.