Cybersecurity News


Voatz Delivers Multilayered Security to Protect Electronic Voting

SPONSORED CONTENT: While electronic voting has been plagued by fears of tampering or fraud, Voatz is looking to make the process more transparent and auditable, according to company founder Nimit Sawhney. He offers learning points from three recent pilots that highlight how governments can improve the integrity and better protect the voting process and its data.
05 August 2020

Voatz Delivers Multi-Layered Security to Protect Electronic Voting

SPONSORED CONTENT: While electronic voting has been plagued by fears of tampering or fraud, Voatz is looking to make the process more transparent and auditable, according to company founder Nimit Sawhney. He offers learning points from three recent pilots that highlight how governments can improve the integrity and better protect the voting process and its data.
05 August 2020

Russian Election Interference: What's Next?

Nate Beach-Westmoreland gives a look back at the past 10 years of Russian election interference and disinformation campaigns. What can we learn from the past and what should we expect as the 2020 US presidential election approaches?
05 August 2020

Black Hat: How hackers gain root access to SAP enterprise servers through SolMan

Researchers demonstrated how the SAP Solution Manager could provide a bridge to full server access.
05 August 2020

Building Cybersecurity Strategies in Sub-Saharan Africa

Evelyn Kilel and Laura Tich of Shehacks Ke discuss how they are working to build cybersecurity strategies that suit the needs and capabilities of developing nations.
05 August 2020

Twitter patches Android app to prevent exploitation of bug that can grant access to DMs

Actual bug resided in the Android 8 and Android 9 operating systems. Twitter updated its Android app to prevent exploitation.
05 August 2020

Attack of the Clone: Next-Gen Social Engineering

NeoEYED CTO Tamaghna Basu tells us how he created an AI bot to mimic him, how it could be used in social engineering attacks, and what the experience taught him about the value of true human connections.
05 August 2020

3 Tips for Securing Open Source Software

Maintaining myriad open source components can be tough. Here's how teams can begin to address open source security and continue to innovate.
05 August 2020

CISA Offers Tool for Career Navigation

The new Cyber Career Pathways Tool helps individuals understand the roles in cybersecurity and how to prepare for them.
05 August 2020

Black Hat: How your pacemaker could become an insider threat to national security

Implanted medical devices are an overlooked security challenge that is only going to increase over time.
05 August 2020

New EtherOops attack takes advantage of faulty Ethernet cables

EtherOops attack can be used to bypass network defenses and attack devices inside closed enterprise networks.
05 August 2020

Microsoft Teams Vulnerable to Patch Workaround, Researchers Report

Attackers could work around an earlier patch and use Microsoft Teams Updater to download binaries and payloads.
05 August 2020

High-Severity Android RCE Flaw Fixed in August Security Update

High-Severity Android RCE Flaw Fixed in August Security Update Google addressed high-severity and critical flaws tied to 54 CVEs in this month's Android security bulletin.
05 August 2020

NSA shares advice on how to limit location tracking

The intelligence agency warns of location tracking risks and offers tips for how to reduce the amount of data shared

The post NSA shares advice on how to limit location tracking appeared first on WeLiveSecurity

05 August 2020

Microsoft Teams Patch Bypass Allows RCE

Microsoft Teams Patch Bypass Allows RCE An attacker can hide amidst legitimate traffic in the application's update function.
05 August 2020

NSA Warns Smartphones Leak Location Data

NSA Warns Smartphones Leak Location Data The agency known for its own questionable surveillance activity advised how mobile users can limit others’ ability to track where they are.
05 August 2020

Cybersecurity Budget Rose in 2019, Uncertainty Prevails in 2020

Budgets rise as IT complexity continued to challenge companies, with identity and access management technology an increasingly common focus.
05 August 2020

Microsoft Paid $13.7M in Bug Bounty Rewards in 2019-2020

The 2019-2020 program year awarded 327 security researchers through 15 bounty programs, with a largest reward of $200,000.
05 August 2020

Why Confidential Computing Is a Game Changer

Confidential Computing is a transformational technology that should be part of every enterprise cloud deployment. It's time to start unlocking the possibilities together.
05 August 2020

DDoS Attacks Doubled in Q2 Compared with Prior Quarter

Most attacks were small, but the big ones got bigger than ever, Cloudflare says.
05 August 2020