Tuesday, March 31, 2020

FBI warns about Zoom bombing as hijackers take over school and business video conferences

Teleconferences are being disrupted by internet trolls shouting profanity and racist remarks and posting pornographic and hate images.

Two Exabeam employees at RSA conference who tested positive for COVID-19 are recovering

Exabeam's employees are recovering from coronavirus. Both tested positive for COVID-19 after attending RSA in San Francisco.

Keep these privacy considerations in mind when using Zoom at home for work collaboration

The platform allows a host to monitor users' activities while screen sharing, as well as access to a participant's device information and other details.

How to better secure your Microsoft Remote Desktop Protocol connections

Microsoft's Remote Desktop Protocol has been saddled with security bugs and weaknesses, which means you need to take certain precautions when using RDP for remote connections.

IBM providing 9 free public cloud business services to customers during coronavirus pandemic

With companies sending employees home to work during the COVID-19 threat, IBM offers a range of tools to support critical IT applications.

Phishing emails claim recipient has been infected with coronavirus

A new phishing campaign is using the fear of being infected as a way to spread malware, as spotted by security trainer KnowBe4.

Coronavirus-themed spam surged 14,000% in two weeks says IBM

Since February, spam exploiting the novel coronavirus has jumped by 4,300% and 14,000% in the past 14 days, according to IBM X-Force, IBM's threat intelligence group.

Cyberattacks rank as the biggest data protection concern facing SMBs

World Backup Day is March 31, and while cyberattacks are a potential threat to their data, many SMBs say they don't have a data backup or disaster recovery process, according to data protection company Infrascale.

COVID-19: Security risks are increasing as more people work from home

A security expert offers tips on how to keep employees safe in this work-from-home environment during the coronavirus pandemic.

The dark web: Where coronavirus fraud, profiteering, malware, and scams are discussed

COVID-19 is fueling new dark web conversations about cybercriminal activity, says cyber intelligence company Sixgill.

Security policies explain step-by-step solutions for strengthening IT defenses

These TechRepublic Premium resources offer a comprehensive solution from responding to a data breach to explaining company-wide security responsibilities.

Top 5 remote access threats

When working from home, it's important to understand the security risks. Tom Merritt lists five remote access threats so you can secure your system.

How to use an iPhone or Android device as the security key for your Google account

Your smartphone can act as your security key to authenticate your Google credentials on the web. Learn how to set that up on an Android device or an iPhone.

Coronavirus: What business pros need to know

The coronavirus is spurring questions and concerns in the tech industry. Get tips on telecommuting, interviewing and hiring, travel, and cybersecurity, as well as the latest news about COVID-19.

How to protect your organization and remote workers against ransomware

Phishing emails and unsecure remote desktop protocol access are two common types of attack methods used to spread ransomware, says cyber breach firm Beazley Breach Response Services.

Huawei’s Worrying New China Problem Just Got Worse: Here’s Why

Huawei used its 2019 results to threaten retaliation against the U.S. But the company now has serious problems closer to home.

Palantir, The $20 Billion, Peter Thiel-Backed Big Data Giant, Is Providing A Coronavirus Monitoring Tool To The CDC

Palantir will help the Centers for Disease Control keep on top of ventilator and mask needs to treat coronavirus victims, sources say.

Defense Evasion Dominated 2019 Attack Tactics

Researchers mapped tactics and techniques to the MITRE ATT&CK framework to determine which were most popular last year.

Watering-Holes Target Asian Ethnic Victims with Flash Update Decoy

About 10 compromised websites employ a multi-stage, targeted effort to fingerprint and compromise victims.

OpenWRT is vulnerable to attacks that execute malicious code

Enlarge (credit: OpenWRT) For almost three years, OpenWRT—the open source operating system that powers home routers and other types of embedded systems—has been vulnerable to remote code-execution attacks because updates were delivered over an unencrypted channel and digital...