In April of this year, the US Federal Bureau of Investigations (FBI) warned government contractors that their employees are being targeted on social media by foreign intelligence services, with the …
Insecure password memory aids: A passwordless future could be the solution
A new survey by Okta shows that many employees are open to passwordless authentication. For example, 70% of employees think that the adoption of biometrics would benefit their organization. According …
Continue Reading about Insecure password memory aids: A passwordless future could be the solution
Cyber Weaknesses That Led to Breaches at NASA’s JPL Persist, Says IG
A new report[pdf] by the NASA inspector general exposes major shortcomings in the cybersecurity posture of the NASA Jet Propulsion Laboratory, as a result of which the research center "has experienced …
Continue Reading about Cyber Weaknesses That Led to Breaches at NASA’s JPL Persist, Says IG
Hacker Steals Customer Payment Info in EatStreet Data Breach
On May 3, a threat actor gained unauthorized access to the payment card information of an unknown number of customers of Eatstreet, a popular online food ordering service. The company discovered the …
Continue Reading about Hacker Steals Customer Payment Info in EatStreet Data Breach
Only Quarter of IaaS Users Can Audit Config Settings
A new McAfee report shows that moving to the cloud often has security benefits for organizations, but there are some major drawbacks as well. According to the survey, 87% of organizations “experience …
Continue Reading about Only Quarter of IaaS Users Can Audit Config Settings
Modular Backdoor Can Spread Over Local Network
A new report by Kaspersky provides insight into Plurox, a highly sophisticated piece of malware first discovered in February. Plurox is a modular backdoor capable of distributing itself across …
Continue Reading about Modular Backdoor Can Spread Over Local Network
Business travelers, beware: Hackers looking over your shoulder can cause data breaches
A new 3M survey underlines the threat of visual hacking, which is when a threat actor obtains sensitive personal or company data by simply looking over someone's shoulder. Visual hacking is a major …
Security firm claims it can unlock any iPhone
Security firm Cellebrite claims it has found a way to unlock iPhones and other devices running iOS 7 to iOS 12.3. The company says that it can "bypass or determine locks and perform a full file system …
Continue Reading about Security firm claims it can unlock any iPhone
Kremlin Warns of Cyberwar After Report of U.S. Hacking Into Russian Power Grid
In response to a recent New York Times report claiming that US intelligence officials have been targeting Russian power grid control systems in offensive operations, a spokesman for Russian President …
US Govt Achieves BlueKeep Remote Code Execution, Issues Alert
The Cybersecurity and Infrastructure Security Agency (CISA) is urging users to patch the highly critical BlueKeep security flaw (CVE-2019-0708) that impacts Remote Desktop Protocol (RDP) …
Continue Reading about US Govt Achieves BlueKeep Remote Code Execution, Issues Alert