Tuesday, March 19, 2019

Businesses failing to meet California Consumer Privacy Act compliance goals

Set to go into effect on January 1, 2020, the CCPA will affect lots of companies doing business in California, but 86% have yet to meet compliance goals.

The 3 least secure programming languages

These coding languages have the most open source vulnerabilities, according to a WhiteSource report.

How to prevent spear phishing attacks: 8 tips for your business

Spear phishing attacks, including business email compromise and brand impersonation, are on the rise, according to Barracuda.

5 ways to properly secure new technology

Automating security and system standards eliminates the potential for human error.

Avoid these Google Play Store apps that promise to update your Android phone

Apps in the Google Play Store purport to upgrade your phone to Android 9.0 Pie, but an app cannot perform that task.

DDoS attacks on the rise: Largest attack ever hit 1.7 Tb/second

Hackers are increasingly trying to steal data instead of money from victims, according to Positive Technologies.

Slack’s new enterprise-grade security tool lets you add encryption keys for more data control

Slack Enterprise Key Management offers more security for Enterprise Grid users in regulated industries.

Facebook-Cambridge Analytica privacy scandal: Your data still isn’t secure

On the one-year anniversary of the Facebook-Cambridge Analytica data privacy scandal, Dan Patterson advises companies to stay vigilant and keep data locked down and secure.

How an unsecured Elasticsearch server exposed customer order information and passwords

Chinese e-commerce giant Globalegrow left personally identifiable information and account credentials exposed, leading security researchers to call them "delusional."

How to view passwords in Android Chrome

When you can't remember a password for a website you know Chrome saved, never fear. You can view it with these tips.

​Securing the mobile enterprise means thinking outside the VPN box

As employees access clouds and apps untethered to corporate networks, managers must create new security architectures.

Cryptocurrency mining attacks still major security risk, despite closure of Coinhive

Cryptojacking attacks can be executed in more ways than JavaScript files in browsers, and cryptocurrency mining is moving to cloud services, according to AT&T Cybersecurity.

Businesses don’t get how AI cybersecurity tools work, but plan to use them anyway

Some 71% of businesses plan to use AI and machine learning in their security tools this year, though over half aren't sure what that tech really does, according to Webroot.

How to generate SSH keys on macOS Mojave

macOS is capable of working with SSH keys. Jack Wallen shows you how to generate the necessary keys and copy them to a server.

How to wipe your USB drive before throwing it away

Data was found on 68% of secondhand flash drives sold in the US, according to a Comparitech report. Here's how to secure your data for disposal.
SC Magazine

Norwegian aluminum producer Norsk Hydro hit by an unspecified cyberattack

Norwegian aluminum producer Norsk Hydro was hit by a cyber attack which began Monday evening and escalated into the night. The Norwegian National Security Authority (NSM) declined to comment on what type of attack it was but said the extent...
SC Magazine

Glitch exposes Sprint customer data to other users

A bug has allowed some Sprint customers to see the personal data of other customers from their online accounts. The information visible includes names, cell phone numbers as well as calls made by other users and, and a Tech Crunch report cited...

6 Ways Mature DevOps Teams Are Killing It in Security

New survey shows where "elite" DevOps organizations are better able to incorporate security into application security.
The Register

Ransomware drops the Lillehammer on Norsk Hydro: Aluminium giant forced into manual mode after systems scrambled

Norway the power and metals wrangler could have seen this one coming Norwegian power and metals giant Norsk Hydro is battling an extensive ransomware infection on its computers.…

Old Tech Spills Digital Dirt on Past Owners

Researcher buys old computers, flash drives, phones and hard drives and finds only two properly wiped devices out of 85 examined.