Saturday, July 11, 2020

Augmented Reality Will Compromise the Privacy and Safety of Attack Victims

In the coming years, new technologies will further invade every element of daily life with sensors, cameras and other devices embedded in homes, offices, factories and public spaces. A constant stream of data will flow between the digital and...

Ending the Cloud Security Blame Game

Like many things in life, network security is a continuous cycle. Just when you’ve completed the security model for your organization’s current network environment, the network will evolve and change – which will in turn demand changes to the...

Edge Computing Set to Push Security to the Brink

In the coming years, the requirement for real-time data processing and analysis will drive organizations to adopt edge computing in order to reduce latency and increase connectivity between devices – but adopters will inadvertently bring about a renaissance of...

Make It So: Accelerating the Enterprise with Intent-Based Network Security

Sometimes, it seems that IT and security teams can’t win. They are judged on how quickly they can deploy their organization’s latest application or digital transformation initiative, but they’re also expected to safeguard those critical applications and data in...

Threat Horizon 2022: Cyber Attacks Businesses Need to Prepare for Now

The digital and physical worlds are on an irreversible collision course. By 2022, organizations will be plunged into crisis as ruthless attackers exploit weaknesses in immature technologies and take advantage of an unprepared workforce. At the same time, natural...

Why the Latest Marriott Breach Should Make Us “Stop and Think” About Security Behaviors

Marriott International has experienced their second data breach after two franchise employee logins were used to access more than five million guest records beginning in January. Contact details, airline loyalty program account numbers, birth dates and more were collected...

Google Skips Chrome 82, Resumes Stable Releases

Google is on track to resume the roll-out of stable Chrome releases next week, but says it will skip one version of the browser. Last week, the Internet search giant said it was pausing upcoming releases of the browser, following...

Examining Potential Election Vulnerabilities: Are They Avoidable?

In the U.S and global communities, election security is a large concern because so many aspects of it can be insecure and open to attacks that may shift public opinion or be used for personal gain. Not only does...

Benchmarking the State of the CISO in 2020

Driving digital transformation initiatives while safeguarding the enterprise is a mammoth task. In some aspects, it might even sound counter-intuitive when it comes to opening up IT infrastructure, or converging IT and OT networks to allow external parties such...

Cyberattacks a Top Concern for Gov Workers

More than half of city and state employees in the United States are more concerned about cyberattacks than they are of other threats, a new study discovered. Conducted by The Harris Poll on behalf of IBM, the survey shows that over 50%...

Hackers Target Online Gambling Sites

Threat Actor Targets Gambling and Betting in Southeast Asia Gambling and betting operations in Southeast Asia have been targeted in a campaign active since May 2019, Trend Micro reports.  Dubbed DRBControl, the adversary behind the attacks is using a broad range of...

When Data Is Currency, Who’s Responsible for Its Security?

In a year that was all about data and privacy, it seems only fitting that we closed out 2019 in the shadow of a jumbo data leak where more than a billion records were found exposed on a single server. Despite...

SEC Shares Cybersecurity and Resiliency Observations

The U.S. Securities and Exchange Commission (SEC) this week published a report detailing cybersecurity and operational resiliency practices that market participants have adopted.  The 10-page document (PDF) contains observations from the SEC's Office of Compliance Inspections and Examinations (OCIE) that...

What Does Being Data-Centric Actually Look Like?

“Data-centric” can sometimes feel like a meaningless buzzword. While many companies are vocal about the benefits that this approach, in reality, the term is not widely understood. One source of confusion is that many companies have implemented an older approach...

The Big 3: Top Domain-Based Attack Tactics Threatening Organizations

Nowadays, businesses across all industries are turning to owned websites and domains to grow their brand awareness and sell products and services. With this dominance in the e-commerce space, securing owned domains and removing malicious or spoofed domains is...

Windows 10 Security Game-Changer As Microsoft Reveals New Hacker Protection

Microsoft is set to bring a powerful new security feature to Windows 10 that just might be a game-changer.

15 Billion Stolen Logins Are Circulating on the Dark Web

Plus: Facebook's Roger Stone takedown, the BlueLeaks server seizure, and more of the week's top security news.
The Hacker News

Exclusive: Any Chingari App (Indian TikTok Clone) Account Can Be Hacked Easily

Following vulnerability disclosure in the Mitron app, another viral TikTok clone in India has now been found vulnerable to a critical but easy-to-exploit authentication bypass vulnerability, allowing anyone to hijack any user account and tamper with their information, content,...

Is TikTok Seriously Dangerous—Do You Need To Delete It?

Here's the reality behind all the headlines...

iPhone User Sues LinkedIn For Reading Clipboard Data After iOS 14 Alert Revelations

The fallout from Apple's new iOS 14 privacy notification feature continues as one iPhone user files a class-action lawsuit against LinkedIn for silently reading clipboard data.