Thursday, August 16, 2018

What Drives Hackers to a Life of Cybercrime?

What Drives Hackers to a Life of Cybercrime?It likely comes as no surprise that cyber-criminals are financially motivated, but according to new research, many nefarious actors in the cyber world are also driven to a life of digital crime...

NSA Insider Teaches Next-Gen IT Strategies

NSA Insider Teaches Next-Gen IT StrategiesGiven the cybersecurity threats that present risks to individuals, organizations and government entities around the globe, cybersecurity professionals need to know how to defend against current and emerging threats. The new book Engineering Trustworthy Systems:...

Credential-Stealing Financial Trojan Targets Banks

Credential-Stealing Financial Trojan Targets BanksFinancial institutions have long been the target of cyberattack, and today researchers at Cyberbit announced they have discovered a new variant of Trickbot, a modular malware and well-known financial Trojan that targets customers of large...

Just 10% of UK Firms Have No Cyber Insurance

Just 10% of UK Firms Have No Cyber Insurance UK companies appear to be forging ahead globally when it comes to take-up of cyber insurance, although relatively few have full coverage, according to a new report from Ovum. Predictive analytics...

Microsoft Fixes 60 Flaws Including Two Zero-Days

Microsoft Fixes 60 Flaws Including Two Zero-DaysMicrosoft has fixed 60 vulnerabilities this monthly update round, including two zero-days and patches for the newly disclosed Intel L1TF bugs. August Patch Tuesday saw updates to fix two zero-days already publicly disclosed and...

Intel Reveals Three High Severity Memory Flaws

Intel Reveals Three High Severity Memory Flaws Intel has revealed details of a new set of Spectre-like vulnerabilities in its Core and Xeon processors which could allow malicious attackers to steal highly sensitive information from memory on PCs or...

For Google, No Tracking Means We Still Track You

For Google, No Tracking Means We Still Track YouGoogle is so intrigued by the places users go that it continues to track their locations even after users turn off the Location History, according to findings from a recent AP...

Stopping Russian Attacks on Candidate Websites

Stopping Russian Attacks on Candidate WebsitesAs the midterm elections grow closer, concerns for voting security continue to mount, particularly in light of research unveiled after this year’s Def Con security conference, which found that the websites of nearly one-third...

Hackers Target Instagram, Users Blame Russia

Hackers Target Instagram, Users Blame RussiaThe Facebook-owned photo-sharing application Instagram has reportedly fallen victim to an attack, which appears to have originated in Russia, according to news from The Sun. Both Mashable and Reddit have reported a surge in the...

Mobile App-Based Fraud Jumps in Q2

Mobile App-Based Fraud Jumps in Q2RSA Security has said it recovered over five million compromised cards from underground marketplaces and other sources in the last quarter, a 60% increase on the previous three months. The security vendor’s Quarterly Fraud Report...

Fax Attack: Researchers Warn of New Vector for Hackers

Fax Attack: Researchers Warn of New Vector for HackersSecurity researchers have been able to exploit vulnerabilities on all-in-one printers by sending a malicious fax, enabling then to infiltrate corporate networks. The vulnerabilities were discovered by Check Point in a common...

NHS Patient Data at Risk from Historic Breach: Report

NHS Patient Data at Risk from Historic Breach: ReportA historic breach at a third-party supplier has put the data of countless NHS patients at risk, according to a new report. An investigation by the Sunday Telegraph revealed a 2016 breach at...

Variant of KeyPass Trojan Takes Manual Control

Variant of KeyPass Trojan Takes Manual Control Multiple researchers have identified a dangerous new variant of KeyPass ransomware, featuring a manual-control functionality, and according to Kaspersky Lab, the modified version mainly targets developing countries. “For now, the most targeted regions...

More Than 10K Recorded Vulnerabilities in 2018

More Than 10K Recorded Vulnerabilities in 2018The number of recorded vulnerability disclosures continues to rise, with 10,644 published throughout the first half of 2018 by Risk Based Security’s VulnDB team. That total is reportedly 3,279 more vulnerabilities than those...

Firms at Mercy of Smarter, Faster Cyber-Criminals

Firms at Mercy of Smarter, Faster Cyber-CriminalsWith more than 100,000 vulnerabilities published on the CVE list, organizations are struggling to keep pace with patching, leaving almost all firms vulnerable to attack, according to the new Threat Landscape Report released...
The Register

Mozilla-endorsed security plug-in accused of tracking users

Web Security says there's nothing nefarious to its URL collection A security plug-in for the Firefox browser is under fire after users discovered it was collecting and uploading their online activity.…
The Register

Making money mining Coinhive? Yeah, you and nine other people

10 users controlling the bulk of cryptocoin generator funds Mining internet currency on websites with Coinhive scripts is a lucrative endeavor, but only for a handful of people.…
PC Mag

Google Launches Searchable Database on US Political Ads

The new site offers an eye-opening view of how online political ad spending through Google can work. It offers a breakdown on individual ad campaigns, including a catalog of what ads were served and to which demographic groups.

Intel Reveals New Spectre-Like Vulnerability

A new side-channel speculative execution vulnerability takes aim at a different part of the CPU architecture than similar vulnerabilities that came before it.

Miller & Valasek: Security Stakes Higher for Autonomous Vehicles

Car hacking specialists shift gears and work on car defense in their latest gigs - at GM subsidiary Cruise Automation.