Security

apple allegedly made nice with fbi by dropping icloud encryption plan

Apple allegedly made nice with FBI by dropping iCloud encryption plan

by Lisa Vaas In spite of Apple having turned over the shooter’s iCloud backups in the case of the Pensacola, Florida mass shooting last month, the US government has been raking it over the coals for supposedly not helping law enforcement in investigations. But according to a new allegation, Apple has been far more accommodating …

Apple allegedly made nice with FBI by dropping iCloud encryption plan Read More »

dating apps share personal data with advertisers study says

Dating Apps Share Personal Data with Advertisers and 3rd Parties

Dating Apps Are Sharing Your Personal Data with Third-Parties and Advertisers Some of the most popular dating services may be violating GDPR or other privacy laws Unbeknownst to their users, several popular dating apps, including Tinder, OkCupid, and Grindr, share detailed personal data on their users with third parties for advertising purposes, a study conducted …

Dating Apps Share Personal Data with Advertisers and 3rd Parties Read More »

big microsoft data breach 250 million records exposed

Big Microsoft data breach – 250 million records exposed

by Paul Ducklin Microsoft has today announced a data breach that affected one of its customer databases. The blog article, entitled Access Misconfiguration for Customer Support Databases, admits that between 05 December 2019 and 31 December 2019, a database used for “support case analytics” was effectively visible from the cloud to the world. Microsoft didn’t …

Big Microsoft data breach – 250 million records exposed Read More »

Ransomware Upgrades with Credential-Stealing Tricks

Enterprise VulnerabilitiesFrom DHS/US-CERT’s National Vulnerability Database CVE-2020-7227PUBLISHED: 2020-01-18 Westermo MRD-315 1.7.3 and 1.7.4 devices have an information disclosure vulnerability that allows an authenticated remote attacker to retrieve the source code of different functions of the web application via requests that lack certain mandatory parameters. This affects ifaces-diag.asp, system.asp, … CVE-2019-15625PUBLISHED: 2020-01-18 A memory usage vulnerability …

Ransomware Upgrades with Credential-Stealing Tricks Read More »

Data Awareness Is Key to Data Security

Traditional data-leak prevention is not enough for businesses facing today’s dynamic threat landscape. Data attacks reached an all-time high in 2019 as we continued to transform our lives digitally — moving our work, health, financial, and social information online. In response, businesses must meet hefty data and information protection regulatory and compliance requirements. There’s no …

Data Awareness Is Key to Data Security Read More »

Tinder to get panic button, catfish-fighting facial recognition

What do online file sharers want with 70,000 Tinder images?

by Danny Bradbury A researcher has discovered thousands of Tinder users’ images publicly available for free online. Aaron DeVera, a cybersecurity researcher who works for security company White Ops and also for the NYC Cyber Sexual Assault Taskforce, uncovered a collection of over 70,000 photographs harvested from the dating app Tinder, on several undisclosed websites. …

What do online file sharers want with 70,000 Tinder images? Read More »

5 major us wireless carriers vulnerable to sim swapping attacks

5 Major US Wireless Carriers Vulnerable to SIM Swapping Attacks

SIM Swapping Attacks 5 Vulnerable Major US Wireless Phone Carriers When it comes to protection against this insidious type of scam, the telcos’ authentication procedures leave a lot be desired, a study finds Five major US wireless carriers – AT&T, T-Mobile, Verizon, Tracfone and US Mobile – are susceptible to SIM swap scams, a danger …

5 Major US Wireless Carriers Vulnerable to SIM Swapping Attacks Read More »

phishing today deepfakes tomorrow training employees to spot this emerging threat

Phishing Today, Deepfakes Tomorrow: Training Employees to Spot This Emerging Threat

Cybercriminals are evolving their tactics, and the security community anticipates voice and video fraud to play a role in one of the next big data breaches — so start protecting your business now. Deepfake fraud is a new, potentially devastating issue for businesses. In fact, last year a top executive at an unidentified energy company …

Phishing Today, Deepfakes Tomorrow: Training Employees to Spot This Emerging Threat Read More »

Making Sense of Security

How to better protect your organization’s most valuable data

Many organizations underestimate the value of their data to skilled and organized cybercriminals, said security provider eSentire. Keeping up with cybercriminals can be a never-ending challenge for organizations and security professionals. As hackers and attackers come up with increasingly more clever and devious ways to infiltrate an organization, your critical and sensitive data becomes more …

How to better protect your organization’s most valuable data Read More »

an identity management spin on shaggys hit song

An Identity Management Spin on Shaggy’s Hit Song

Wondering how this guy could be so clumsy? So is he. [youtube https://www.youtube.com/watch?v=5uVuW7VhIsA] Source: Emirates NBD What security-related videos have made you laugh? Let us know! Send them to [email protected]. Beyond the Edge content is curated by Dark Reading editors and created by external sources, credited for their work. View Full Bio View Original Article HERE

The Five: Ransomware Attacks - Making Sense of Security

The Five: Ransomware Attacks

The Five: Ransomware Attacks Cyber-attacks that threaten to publish a victim’s data or block access to it unless a ransom is paid have grown internationally since 2012. Sodinokibi and Travelex Hackers attacked Travelex’s network on New Year’s Eve, stealing customer data including dates of birth, credit card information, and national insurance numbers. The ransomware gang …

The Five: Ransomware Attacks Read More »

malware in the cloud protecting yourself based on your cloud environment

Malware in the Cloud: Protecting Yourself Based on Your Cloud Environment

In some ways, the cloud has made security management easier, as many cloud providers have taken the responsibilities traditionally associated with local server management out of your hands. But in other ways, the security management conversation has become more confusing for decision makers, as “cloud” is a very broadly defined term and could speak to …

Malware in the Cloud: Protecting Yourself Based on Your Cloud Environment Read More »

Discovering Careers in Cybersecurity

We were excited to celebrate National Cybersecurity Career Awareness Week (NCCAW), November 11-16, 2019. Technology and cybersecurity play a vital role in many facets of our lives. Our growing dependence on the internet and the convenience of technology comes with unique challenges. Attackers are constantly trying to steal sensitive data and cripple systems, such as …

Discovering Careers in Cybersecurity Read More »

FTC Issues Biennial Report to Congress on the National Do Not Call Registry

The Federal Trade Commission has issued its biennial report to Congress focusing on the use of the National Do Not Call (DNC) Registry by both consumers and businesses and other organizations over the past two years. This year’s report includes: 1) a summary of current Registry operations; 2) a summary of the impact on the …

FTC Issues Biennial Report to Congress on the National Do Not Call Registry Read More »

NSA congratulates Centers of Academic Excellence (CAE)

NSA Congratulates Centers of Academic Excellence (CAE)

FORT MEADE, Md., Dec. 13, 2019 — NSA Congratulates Centers of Academic Excellence (CAE) The NSA congratulates these Centers of Academic Excellence as they recognize the following list of academic institutions. The following academic institutions were recognized as designated or re-designated CAE schools at the November 2019 NICE conference: On November 20, 2019, NSA celebrated …

NSA Congratulates Centers of Academic Excellence (CAE) Read More »

ftc obtains record 191 million settlement from university of phoenix to resolve ftc charges it used deceptive advertising to attract prospective students

FTC Obtains Record $191 Million Settlement from University of Phoenix to Resolve FTC Charges It Used Deceptive Advertising to Attract Prospective Students

The University of Phoenix (UOP) and its parent company, Apollo Education Group, will settle for a record $191 million to resolve Federal Trade Commission charges that they used deceptive advertisements that falsely touted their relationships and job opportunities with companies such as AT&T, Yahoo!, Microsoft, Twitter, and The American Red Cross. Under the settlement unanimously …

FTC Obtains Record $191 Million Settlement from University of Phoenix to Resolve FTC Charges It Used Deceptive Advertising to Attract Prospective Students Read More »

hackers steal 49 million in cryptocurrency exchange upbit ethereum

Hackers Steal $49 million in Cryptocurrency Exchange Upbit Ethereum

South Korean cryptocurrency exchange Upbit today said hackers could steal $49 million in Ethereum. On 27 November, the crypto-coins were moved from Upbeat Ethereum Hot Wallet to an unknown wallet, announced Doo-myeon’s CEO Lee Seok-woo who operates Upbit. In a publication on the Upbit website, the hackers, Seokwoo, disclosed 342,000 ETH (Ethereum), equivalent to approximately …

Hackers Steal $49 million in Cryptocurrency Exchange Upbit Ethereum Read More »

Scroll to Top