Saturday, November 17, 2018

Smartphones: A Double-edged Sword for Terrorists

Bombs and guns aside, a smartphone can be a powerful weapon in the hands of a terrorist -- but it can also provide intelligence services with the tools to track them down. Three years ago to the day, the Paris...

Does Not Compute: Japan Cyber Security Minister Admits Shunning PCs

A Japanese minister in charge of cyber security has provoked astonishment by admitting he has never used a computer in his professional life, and appearing confused by the concept of a USB drive. read more

AWS Adds New Feature for Preventing Data Leaks

Amazon announced this week that a new feature designed to prevent data leaks has been added to Amazon Web Services (AWS). read more

Google Scours the Internet for Dirty Android Apps

Google is analyzing all the apps that it can find across the Internet in an effort to keep Android users protected from Potentially Harmful Applications (PHAs). read more

Europol, Diebold Nixdorf to Share Information on Cyber Threats

Europol on Friday announced that it has signed a cybersecurity-focused memorandum of understanding (MoU) with Diebold Nixdorf, one of the world’s largest providers of ATM and point-of-sale (PoS) services. read more

Many ATMs Can be Hacked in Minutes: Report

Many automated teller machines (ATMs) lack adequate security mechanisms and can be compromised in minutes using various methods, according to a new report from vulnerability assessment firm Positive Technologies.  read more

Google Helps G Suite Admins Enforce Strong Passwords

Google this week announced new features to G Suite designed to help administrators enforce rigorous password requirements and increase security. read more

BlackBerry to Acquire Cylance for $1.4 Billion in Cash

BlackBerry on Friday announced that it has agreed to acquire next-generation endpoint security firm Cylance for US $1.4 billion in cash. read more

Trend Micro, Moxa Form New IIoT Security Company

Cybersecurity firm Trend Micro and industrial networking solutions provider Moxa on Thursday announced plans to form a joint venture corporation focusing on securing industrial internet of things (IIoT) environments. read more

Dridex/Locky Operators Unleash New Malware in Recent Attack

The threat actor(s) behind many Dridex and Locky campaigns have been using a new Remote Access Trojan (RAT), Proofpoint security researchers warn.  read more

Data Protection Firm Cognigo Raises $8.5 Million

Cognigo, a Tel Aviv, Israel-based startup focused on data protection and compliance, this week announced that it has completed an $8.5 million Series A round of funding.  read more

Firefox Alerts Users When Visiting Breached Sites

Mozilla has added a new feature to Firefox to alert users when they visit a website that has been part of a data breach in the past.  read more

Adversaries Take Advantage of the Seams. Let’s Close Them.

Adversaries are Increasingly Masterful at Taking Advantage of Seams Between Technologies and Teams to Infiltrate Organizations read more

‘Tis the Season for Mobile Threats

Keeping Your Organization Safe From Mobile Threats During the Holidays read more

Report Shows Increase in Email Attacks Using .com File Extensions

Leesburg, VA-based anti-phishing firm Cofense (formerly PhishMe) has discovered an uptick in the use of .com file extensions in phishing emails.  read more

GreatHorn Expands Email Security Platform

Waltham, MA-based GreatHorn has expanded its machine-learning phishing protection system into a complete email security platform. "This major new expansion of the Company's flagship solution," it announced on November 14, "addresses every potential stage of a phishing attack with integrated...

OPM Security Improves, But Many Issues Still Unresolved: GAO

The U.S. Office of Personnel Management (OPM) has improved its security posture since the data breaches disclosed in 2015, but many issues are still unresolved, according to a report published this week by the Government Accountability Office (GAO). read more

What Does Your Cloud Strategy Include, and Are You Transitioning Securely?

Organizations Need the Right Technologies and Talent in Place to Ensure a Secure Transition to the Cloud read more

Congress Passes Bill Creating Cybersecurity Agency at DHS

The U.S. House of Representatives this week passed a bill that creates a new cybersecurity agency at the Department of Homeland Security (DHS). read more
SC Magazine

Instagram flaw exposes user passwords

A security flaw in Instagram’s recently released “Download Your Data” tool could have exposed some user passwords, the company reportedly told users. The tool, revealed by Instagram right before the GDPR regulation went into effect, is designed to let users...

Julian Assange Charges, Japan’s Top Cybersecurity Official, and More Security News This Week

Safer browsing, more bitcoin scams, and the rest of the week's top security news.
The Register

SMS 2FA database leak drama, MageCart mishaps, Black Friday badware, and more

Plus, why is Kaspersky Lab getting into chess? Roundup  What a week it has been: we had the creation of a new government agency, a meltdown flashback, and of course, Patch Tuesday.…

Is retaining a cybersecurity attorney a good idea for your business?

Cybersecurity is so complicated that businesses, large and small, are retaining legal counsel specializing in security. Learn two more steps businesses should take before a cyberattack hits.

Machine Learning Can Create Fake ‘Master Key’ Fingerprints

Researchers have refined a technique to create so-called DeepMasterPrints, fake fingerprints designed to get past security.