Cybersecurity News


Apple’s ‘Find My’ Network Exploited via Bluetooth

Apple’s ‘Find My’ Network Exploited via Bluetooth The ‘Send My’ exploit can use Apple's locator service to collect and send information from nearby devices for later upload to iCloud servers.
13 May 2021

Five Critical Password Security Rules Your Employees Are Ignoring

Five Critical Password Security Rules Your Employees Are Ignoring According to Keeper Security’s Workplace Password Malpractice Report, many remote workers aren’t following best practices for password security.
13 May 2021

Verizon DBIR 2021: "Winners" No Surprise, But All-round Vigilance Essential

Verizon's Data Breach Investigations Report (DBIR) covers 2020 -- a year like no other. Phishing, ransomware, and innovation caused big problems.
13 May 2021

Pipeline Update: Biden Executive Order, DarkSide Detailed and Gas Bags

Pipeline Update: Biden Executive Order, DarkSide Detailed and Gas Bags FBI/CISA warn about the RaaS network behind the Colonial hack, Colonial restarts operations, and researchers details groups that rent the ransomware.
13 May 2021

Fake Android, iOS apps promise lucrative investments while stealing your money

Hundreds of malicious cryptocurrency, stock, and banking apps have been discovered by researchers.
13 May 2021

Identity Theft

Identity theft is when someone steals information about you and then uses that information to pretend to be you and commit crimes, such as credit card fraud. One of the key steps to protecting yourself is monitoring your financial, credit score and credit card accounts. The sooner you detect fraud in any of these accounts, the sooner you can minimize the damage.
13 May 2021

Despite Heightened Breach Fears, Incident Response Capabilities Lag

Many organizations remain unprepared to detect, respond, and contain a breach, a new survey shows.
12 May 2021

Researchers Unearth 167 Fake iOS & Android Trading Apps

The apps are disguised as financial trading, banking, and cryptocurrency apps from well-known and trusted organizations.
12 May 2021

Putting The Spotlight on DarkSide

Incident responders share insight on the DarkSide ransomware group connected to the recent Colonial Pipeline ransomware attack.
12 May 2021

66% of CISOs Feel Unprepared for Cyberattacks

More than half of CISOs surveyed are more concerned about a cyberattack in 2021 than in 2020, researchers report.
12 May 2021

Researchers Flag e-Voting Security Flaws

Researchers Flag e-Voting Security Flaws Paper ballots and source-code transparency are recommended to improve election security.
12 May 2021

Vulnerable Protocols Leave Firms Open to Further Compromises

Companies may no longer have Internet-facing file servers or weakly secured Web servers, but attackers that get by the perimeter have a wide-open landscape of vulnerability.
12 May 2021

Telegram Fraudsters Ramp Up Forged COVID-19 Vaccine Card Sales

Telegram Fraudsters Ramp Up Forged COVID-19 Vaccine Card Sales A new type of fraud is spiking across the platform: Selling fake vax records to people who want to lie their way into places where proof of vaccine is required.
12 May 2021

Hashes, Salts, and Rainbow Tables: Confessions of a Password Cracker

Understanding a few basics about how password crackers think and behave could help you keep your users safer.
12 May 2021

Gig Workers Paid $500 for Payroll Passwords

Gig Workers Paid $500 for Payroll Passwords Argyle is paying workers to help hack payroll providers, researchers suspect.
12 May 2021

‘FragAttacks’: Wi-Fi Bugs Affect Millions of Devices

‘FragAttacks’: Wi-Fi Bugs Affect Millions of Devices Wi-Fi devices going back to 1997 are vulnerable to attackers who can steal your data if they're in range.
12 May 2021

1 million risky apps rejected or removed from Apple’s App Store in 2020

Apple also claims to have foiled US$1.5 billion worth of potentially fraudulent transactions

The post 1 million risky apps rejected or removed from Apple’s App Store in 2020 appeared first on WeLiveSecurity

12 May 2021

Cybersecurity: What Is Truly Essential?

Cybersecurity: What Is Truly Essential? In an effort to protect their organizations, security professionals can overdo it. The result often works against them.
12 May 2021

Why You Should Be Prepared to Pay a Ransom

Companies that claim they'll never pay up in a ransomware attack are more likely to get caught flat-footed.
12 May 2021

The Long Road to Rebuilding Trust after 'Golden SAML'-Like Attacks

Eradicating 'privileged intruders' from the network in the aftermath of an attack poses major challenges, experts say.
12 May 2021