Cybersecurity News


Cyberbullying: How is it different from face‑to‑face bullying?

The digital age has added a whole new dimension to hurtful behavior, and we look at some of the key features that set in-person and online bullying apart

The post Cyberbullying: How is it different from face‑to‑face bullying? appeared first on WeLiveSecurity

28 February 2020

Report identifies the most dangerous mobile app store on the internet

And, no! It's not the Google Play Store.
28 February 2020

Clearview AI Customers Exposed in Data Breach

Customers for the controversial facial recognition company were detailed in a log file leaked to news organizations.
27 February 2020

Government Employees Unprepared for Ransomware

Data shows 73% are concerned about municipal ransomware threats but only 38% are trained on preventing these attacks.
27 February 2020

Google’s War on Android App Permissions, 60 Percent Successful

Google’s War on Android App Permissions, 60 Percent Successful An automated Google warning to Android app developers regarding mobile app permissions has cut the number of requests in half.
27 February 2020

Tense Talk About Supply Chain Risk Yields Few Answers

Tense Talk About Supply Chain Risk Yields Few Answers RSA panelists locked horns over whether the ban preventing US government agencies from doing business with Huawei is unfairly singling out the Chinese telecom giant.
27 February 2020

RSAC 2020: GM’s Transportation Future Hinges on Cybersecurity

RSAC 2020: GM’s Transportation Future Hinges on Cybersecurity CEO Mary T. Barra addressed the high stakes in rolling out self-driving cars and biometric-enhanced vehicles, where one cyber-event could derail plans for emerging automotive technologies.
27 February 2020

How We Enabled Ransomware to Become a Multibillion-Dollar Industry

As an industry, we must move beyond one-dimensional approaches to assessing ransomware exposures. Asking these four questions will help.
27 February 2020

Facebook sues SDK maker for secretly harvesting user data

Data analytics firm OneAudience allegedly paid app developers to include its SDK in their code so it could harvest data from Facebook users.
27 February 2020

Intel Analyzes Vulns Reported in its Products Last Year

A new Intel report looks at the more than 250 CVEs affecting Intel products in 2019.
27 February 2020

Intel fixed 236 bugs in 2019 and only 5% (11 bugs) were CPU vulnerabilities

Intel says that 60% of all security bugs fixed in 2019 were discovered internally, by employees.
27 February 2020

Facial recognition company Clearview AI hit by data theft

The startup came under scrutiny after it emerged that it had amassed 3 billion photos from social media for facial recognition software

The post Facial recognition company Clearview AI hit by data theft appeared first on WeLiveSecurity

27 February 2020

What Your Company Needs to Know About Hardware Supply Chain Security

By establishing a process and framework, you can ensure you're not giving more advanced attackers carte blanche to your environment.
27 February 2020

IoT Insecurity: When Your Vacuum Turns on You

IoT Insecurity: When Your Vacuum Turns on You From vacuum cleaners to baby monitors, the IoT landscape continues to be plagued by concerning security issues that lead to privacy threats.
27 February 2020

RSA 2020 – Hacking humans

What the human battle against biological viruses can teach us about fighting computer infections – and vice versa

The post RSA 2020 – Hacking humans appeared first on WeLiveSecurity

27 February 2020

Cisco patches incoming to address Kr00k vulnerability impacting routers, firewall products

There are no workarounds for the Wi-Fi communications bug.
27 February 2020

US government authorities fail to train employees on ransomware detection, prevention

New research suggests that the majority of state and local governments are not rising to the challenge of mitigating ransomware threats.
27 February 2020

Did someone file your taxes before you?

With tax season – and tax scams – in full swing, here’s how fraudsters can steal your tax refund, and how you can avoid becoming a victim

The post Did someone file your taxes before you? appeared first on WeLiveSecurity

27 February 2020

Android malware can steal Google Authenticator 2FA codes

A new version of the "Cerberus" Android banking trojan will be able to steal one-time codes generated by the Google Authenticator app and bypass 2FA-protected accounts.
27 February 2020

'Cloud Snooper' Attack Circumvents AWS Firewall Controls

Possible nation-state supply chain attack acts like a "wolf in sheep's clothing," Sophos says.
27 February 2020