Threats & Malware, Vulnerabilities
March 18, 2024
Via: Security WeekThe research focused on WebGPU, an API that enables web developers to use the underlying system’s GPU to carry out high-performance computations in a web browser. By leveraging this API, they have demonstrated an attack that works entirely from the […]
July 26, 2021
Via: Help Net SecurityAccording to Aqua Security’s 2021 Cloud Native Security Practitioner study, only 3% recognize that a container, in and of itself, is not a security boundary, indicating that the default security capabilities of containers are overestimated. This result is especially alarming […]
November 9, 2018
Via: Security IntelligenceMore than ever, customers understand their right to data privacy. As major brands continue to lose sensitive data to cybercriminals in high-profile cloud security failures, customer trust in companies across industries is fading. Only 25 percent of consumers believe most […]
Threats & Malware, Vulnerabilities
October 31, 2017
Via: Dark ReadingAs a security team, you are what you measure. The problem is that too many security teams are counting vulnerabilities, not measuring risk. It’s time we examine how vital it is for security teams to establish risk-based metrics, while offering […]
September 18, 2017
Via: Help Net SecurityThe technology industry has always had a big problem with hype, with marketing teams, analysts and the media alike tending to fixate on the next big thing that will revolutionise our lives. Artificial intelligence is the latest technology to be […]
September 12, 2017
Via: CSO OnlineYes, there will be some tax and banking fraud as a result of the gargantuan data breach at Equifax. The biggest impact, however, will be felt by enterprises that rely on credit reporting bureaus to verify the identity of people […]
September 11, 2017
Via: Help Net SecurityAround half of industry practitioners see the risk of silent cyber exposure – potential cyber-related losses due to silent coverage from insurance policies not specifically designed to cover cyber risk – as growing over the coming year, according to Willis […]
September 8, 2017
Via: Help Net SecurityA new SANS survey found that ransomware, insider threats and denial of service are considered the top three threats organizations face when it comes to securing sensitive data. According to the study, 78 percent of respondents report encountering two or […]
September 7, 2017
Via: Help Net SecurityThe Dragonfly hacking group is back – or should we say it probably never went away – and is still interested in penetrating the networks of European and US companies in the energy sector. Even worse, their efforts have been […]
September 5, 2017
Via: Naked SecurityShould central banks be worried about cryptocurrency – Bitcoin, Ethereum, Zcash, Monero and hundreds of others? Perhaps more important, should you – the average, privacy-conscious person or even the not-so-average Dark Web drug dealer – be worried? That depends in […]
September 4, 2017
Via: We Live SecurityA spambot has leaked more than 700 million email addresses and passwords publicly in a huge data breach. The data dump occurred thanks to a misconfigured spambot, dubbed ‘Onliner’, and was discovered by a Paris-based security researcher known as Benkow. […]
August 1, 2017
Via: Russel EdwardsThe idea that smartphone cameras may represent cybersecurity risks is not new. Smartphone-induced risks have plagued researchers from the beginning of this trendy devices’ rise. In time, specialists analyzed various scenarios. More recently, an official incident determined a new wave […]
March 17, 2017
Via: Kaspersky BlogThe rapid growth in the use of applications has significantly added to the digital clutter that exists on people’s digital devices: for example, users typically install 12 Android apps every month but delete only 10, in effect adding two apps […]
March 3, 2017
Via: Naked SecurityThe robot industry has become better at building eye-catching demonstration machines than securing them, consultancy IOActive has concluded after pen-testing some famous examples. After a process described as “not even a deep, extensive security audit”, Hacking Robots Before Skynet uncovered 50 vulnerabilities […]
February 23, 2017
Via: Tao SecurityFirst, although you can reliably detect a problem, you may not be able to do anything about it. The security team may lack the authority, or technical capability, to implement a preventive action. Second, although you can reliably detect a […]
February 1, 2017
Via: Russel EdwardsCyber security automation may represent a relief for specialists. With its unmatched potential of big data processing, automation in this field is the only foreseeable counteraction once the global-scale Internet of Everything provides a new playing field for hackers everywhere. […]
January 30, 2017
Via: Naked SecurityVoice-activated, internet-connected personal assistants are all the rage these days. Ask a group of friends what they got for Christmas and at least one will tell you how much they love their new Amazon Echo, Google Home or some equivalent. […]
January 30, 2017
Via: Help Net SecurityEight out of ten US consumers have a home data network and more than a third of them connect entertainment systems, gaming consoles and other smart devices to the Internet, increasing the risk of home cyber attacks, according to The […]
Application security, Mobile security
January 27, 2017
Via: Security WeekResearchers have analyzed hundreds of virtual private network (VPN) applications for Android and determined that many of them introduce serious privacy and security risks. A team of experts from the University of California, Berkeley, the Data 61 research unit at […]
January 26, 2017
Via: WiredAs part of a broader look at President Donald Trump’s acclimation to the White House, the New York Times noted on Wednesday that Trump still uses his personal, consumer-grade Android smartphone in the White House. That’s worrying. Even if you’re […]