Cybersecurity News
Congress asks Juniper for the results of its 2015 NSA backdoor investigation
Thirteen US government officials ask Juniper to publish the findings of its 2015 investigation.Senators ask Juniper for the results of its 2015 NSA backdoor investigation
Thirteen US senators ask Juniper to publish the findings of its 2015 investigation.When Your Biggest Security and Privacy Threats Come From the Ones You Love
Research examines the risks and design challenges of accounting for privacy threats in intimate relationships.Misconfigured Databases Targeted Hours After Deployment
Researchers left a poorly configured database open on the Internet to learn who would connect to it and what they would steal.Rate of Ransomware Attacks in Healthcare Slows in H1 2020
But lull is unlikely to continue for long, some security experts say.Employees Stream Entertainment on Enterprise Systems During Pandemic
Employees aren't limiting use of their work computers to business purposes while working from home.Helping Remote Workers Overcome Remote Attacks

Snake Ransomware Delivers Double-Strike on Honda, Energy Co.

Vast hack‑for‑hire scheme targeted thousands of people, organizations
An obscure Indian company operated a scheme targeting banks, non-profits, politicians and journalists all over the world, a report says
The post Vast hack‑for‑hire scheme targeted thousands of people, organizations appeared first on WeLiveSecurity
Critical Intel Flaws Fixed in Active Management Technology

The Telehealth Attack Surface
Amid the surge in digital healthcare stemming from the coronavirus pandemic, security is taking a backseat to usability.What to Know About the Approved Scanning Vendor Program
New vulnerabilities, security holes and bugs are being discovered daily. It is vital to have Internet-facing systems scanned regularly for vulnerabilities to help identify new threats so they can be addressed as soon as possible. Gill Woodcock, VP Global Head of Programs, answers common questions about the Approved Scanning Vendor program.
Fake COVID-19 Contact-Tracing Apps Infect Android Phones
Researchers find 12 Android applications disguised as official COVID-19 contact tracing apps installing malware onto devices.Slovak police seize wiretapping devices connected to government network
Slovak police also arrest four people, including the head of the government agency responsible for managing the government network.Asset Management Mess? How to Get Organized

Microsoft ships hefty patch load this month
The latest Patch Tuesday knocks out a record-high number of vulnerabilities, including new bugs in the SMB protocol
The post Microsoft ships hefty patch load this month appeared first on WeLiveSecurity
Efficient Security Testing Requires Automation, but Humans Are Needed Too
An annual survey of penetration testers finds that although machines can quickly find many classes of vulnerabilities, human analysts are still necessary to gauge the severity of discovered issues.Jenkins team avoids security disaster after partial user database loss
Loophole caused by deleted user database could have allowed threat actors to hijack the user accounts of Jenkins plugin authors.Encryption Utility Firm Accused of Bundling Malware Functions in Product
