Tuesday, February 18, 2020

How to report a phishing or spam email to Microsoft

Microsoft can analyze dangerous emails to determine why those messages made it past your spam filters.

MIT finds massive security flaws with blockchain voting app

Researchers say hackers can alter, stop, or expose how an individual user has voted through the Voatz app.

Voatz defends blockchain solution for its voting via app

The for-profit company wants to make absentee voting easier for members of the military, people with disabilities, and older adults, but its biggest test included only 15,000 voters.

Cybercriminals flooding web with coronavirus-themed spam and malware

Hackers have expanded their exploitation of the outbreak fears with hundreds of scams and operations.

How banks can protect their customers from coronavirus-themed phishing emails

The coronavirus, which has already led to the deaths of more than 1,000 people, is a topic that scammers are corrupting for their own purposes.

Android facial recognition is more secure than you think

After running real-world tests of Android's facial recognition on a Pixel 4, Jack Wallen shares his theory of why some people are so concerned about facial recognition.

Man tries to sell Jimmy Wales on blockchain for Wikipedia’s security problems–Wales doesn’t buy it

Commentary: It takes hubris to tell Jimmy Wales, the founder of Wikipedia, how to store data.

IoT device security: 5 tips for enterprises

There are now billions of IoT devices in businesses across the world, prompting the need for increased security measures to protect them.

Key components of the CEO’s agenda for the digital enterprise

CEOs are generally from a finance/business track, rather than a technology one--why their traditional agenda and practices must change.

Report: 9 times out of 10, hackers can attack website visitors

A Positive Technologies study finds 82% of web application vulnerabilities lie in the source code.

Only 17% of global organizations are considered cyber resilience “leaders”

New Accenture study says organizations need to think beyond securing just their own enterprises and take better steps to secure their vendor ecosystems.

Chinese cyber criminals are getting more organized and dangerous

Hackers are adopting organized crime tactics to make billions from victims all over the globe.

Why password management is critical to mitigating data breaches

The Identity Theft Resource Center warns that businesses of all sizes should be vigilant about data security. The COO offers advice about passwords, cloud security, and patch management.

Data breaches up 17% in 2019 over previous year

The Identity Theft Recource Center warns that businesses of all sizes should be vigilant about data security.

Cloud computing security: These two Microsoft tools can help you battle shadow IT

Finding what cloud services employees are using is only half the battle: integrating Microsoft Cloud App Security and Defender Advanced Threat Protection means you can track, block or audit cloud app usage.

Sensitive plastic surgery images exposed online

Researchers at VPN advisory company vpnMentor have found yet another online data exposure caused by a misconfigured cloud database.

Lenovo, HP, Dell Peripherals Face Unpatched Firmware Bugs

A lack of proper code-signing verification and authentication for firmware updates opens the door to information disclosure, remote code execution, denial of service and more.

12 hottest new cybersecurity startups at RSA 2020

Starting on February 24, the RSA Conference (RSAC) 2020 gives security vendors old and new a chance to demonstrate their capabilities. The event has become an attractive venue for startups to make their debut. This year’s crop will be...

Hundreds of Millions of PC Components Still Have Hackable Firmware

The lax security of supply chain firmware has been a known concern for years—with precious little progress being made.

Remote Wipe Plugin Bug Hits 200,000+ WordPress Sites

Remote Wipe Plugin Bug Hits 200,000+ WordPress SitesSecurity researchers are warning of a new plugin vulnerability which is exposing over 200,000 WordPress sites to the risk of being remotely wiped by an attacker. The problem lies with versions 1.3.4 and...