Cybersecurity News


Researchers propose method to track coronavirus through smartphones while protecting privacy

The concept itself is quite simple but could be invaluable in shielding the general public from privacy violations.
03 April 2020

How to prevent ZoomBombing from your Zoom video conference

  By William Knowles @c4i Senior Editor InfoSec News April 3, 2020 It seems lately not an hour goes by without news of another ZoomBombing happening, just as I was preparing this story comes this headline from Vermont Senate committee Zoom hearing derailed by porn hacker A Vermont Senate Committee on Agriculture Zoom hearing, which was […]
03 April 2020

A hacker has wiped, defaced more than 15,000 Elasticsearch servers

Hacker tries to pin the blame on Night Lion Securty, a US cyber-security firm.
03 April 2020

Hacking forum gets hacked for the second time in a year

Forum where hackers sold and bought hacked accounts gets hacked itself.
02 April 2020

Phishers Try 'Text Direction Deception' Technique to Bypass Email Filters

With COVID-19 concerns running high, attackers are trying new tactics to get to users.
02 April 2020

A Day in The Life of a Pen Tester

Two penetration testers share their day-to-day responsibilities, challenges they encounter, and the skills they value most on the job.
02 April 2020

Google Squashes High-Severity Flaws in Chrome Browser

Google Squashes High-Severity Flaws in Chrome Browser Google is rolling out the newest Chrome browser version, 80.0.3987.162, in the coming days.
02 April 2020

Bad Bots Build Presence Across the Web

Bots that mimic human behavior are driving a growing percentage of website traffic while contributing to an avalanche of misinformation.
02 April 2020

Work from home: Securing RDP and remote access

As work from home is the new norm in the coronavirus era, you’re probably thinking of enabling remote desktop connections for your off-site staff. Here’s how to do it securely.

The post Work from home: Securing RDP and remote access appeared first on WeLiveSecurity

02 April 2020

Companies Are Failing to Deploy Key Solution for Email Security

A single -- albeit complex-to-deploy -- technology could stop the most expensive form of fraud, experts say. Why aren't more companies adopting it?
02 April 2020

Prioritizing High-Risk Assets: A 4-Step Approach to Mitigating Insider Threats

Sound insider threat detection programs combine contextual data and a thorough knowledge of employee roles and behaviors to pinpoint the biggest risks.
02 April 2020

5 Ways Enterprises Inadvertently Compromise Their Network Security

Is your organization carelessly leaving its networks vulnerable to invasion? Check out these five common oversights to see if your resources are at risk.
02 April 2020

Twitter discloses Firefox bug that cached private files sent or received via DMs

Private files sent via DMs were cached inside Firefox browsers for as long as a week, even after users logged off.
02 April 2020

A Hacker's Perspective on Securing VPNs As You Go Remote

As organizations rush to equip and secure their newly remote workforce, it's important to keep things methodical and purposeful
02 April 2020

Zoom Removes Data-Mining LinkedIn Feature

Zoom Removes Data-Mining LinkedIn Feature The feature, criticized for "undisclosed data-mining," is only the latest privacy faux pas for Zoom this month.
02 April 2020

Name That Toon: The Devil You Know?

Name That Toon: The Devil You Know? Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
02 April 2020

In COVID-19 Scam Scramble, Cybercrooks Recycle Phishing Kits

In COVID-19 Scam Scramble, Cybercrooks Recycle Phishing Kits Old phishing kits are being pressed into service to keep up with the unprecedented volume of new scams that exploit the pandemic.
02 April 2020

‘War Dialing’ Tool Exposes Zoom’s Password Problems

As the Coronavirus pandemic continues to force people to work from home, countless companies are now holding daily meetings using videoconferencing services from Zoom. But without the protection of a password, there's a decent chance your next Zoom meeting could be "Zoom bombed" -- attended or disrupted by someone who doesn't belong. And according to data gathered by a new automated Zoom meeting discovery tool dubbed "zWarDial," a crazy number major corporations are setting up meetings without passwords enabled.
02 April 2020

‘Zoom is malware’: why experts worry about the video conferencing platform

‘Zoom is malware’: why experts worry about the video conferencing platform

The company has seen a 535% rise in daily traffic in the past month, but security researchers say the app is a ‘privacy disaster’

As coronavirus lockdowns have moved many in-person activities online, the use of video conferencing platform Zoom has quickly escalated. So, too, have concerns about its security.

In the last month, there was a 535% rise in daily traffic to the Zoom.us download page, according to an analysis from web analytics firm SimilarWeb. Its app for iPhone has been the most downloaded app in the country for weeks, according to the mobile app market research firm Sensor Tower. Even politicians and other high-profile figures, including the British prime minister, Boris Johnson, and the former US federal reserve chair Alan Greenspan, use it for conferencing as they work from home.

Related: Coronavirus and app downloads: what you need to know about protecting your privacy

Continue reading...
02 April 2020

44M Digital Wallet Items Exposed in Key Ring Cloud Misconfig

44M Digital Wallet Items Exposed in Key Ring Cloud Misconfig Millions of IDs, charge cards, loyalty cards, gift cards, medical marijuana ID cards and personal information was left exposed to the open internet.
02 April 2020