Get the ECT News Network Editor's Pick Newsletter » View Sample | Subscribe
Welcome Guest | Sign In
TechNewsWorld.com
Ideoclick eBook
Alliances Formed to Plug Security Holes in the IoT
May 13, 2021
Advancements in 5G connectivity and accelerated digital transformation of business operations creates heightened risk and expanded attack surfaces for security teams to harden and protect. Now, efforts by several internet industry groups are focused on new measures to fix inherent security weaknesses with the rapidly expanded use of IoT devices for enterprises and consumers.
Bolt-On Security the Linux Way
May 12, 2021
In this piece, I aim to provide a range of simple but effective options for encrypting a small number of files. In particular, these options are salient for use cases like tax filing, where users are sending sensitive documents to recipients with an unknown degree of technical proficiency. Fond as I am of PGP, I'll bet you your refund check that your accountant doesn't know the first thing about using it.
Two-Thirds of CISOs Admit They're Not Ready to Face a Cyberattack
May 12, 2021
The 2021 edition of Proofpoint's Voice of the CISO report -- based on a survey of more than 1,400 CISOs in 14 countries -- found 66 percent of the executives acknowledged their organizations were unprepared to handle a targeted cyberattack this year. In addition, more than half the CISOs admitted they are more concerned about the repercussions from a cyberattack this year than they were in 2020.
Allow App to Track? Most iOS 14.5 Users Tap Fuggedaboutit!
May 11, 2021
More than 90 percent of U.S. users of the latest version of Apple's mobile operating system iOS 14.5 are taking advantage of a new feature to block an application's ability to track their activity on their phones. Worldwide, 88 percent of users shut down app tracking on their iPhones. This is bad news for advertisers.
Outdated Windows Users Flout Computing Safety
May 4, 2021
A recent study by Kaspersky revealed that nearly one quarter of PCs still run Microsoft Windows 7, which stopped receiving mainstream support in January 2020. Using an end-of-life operating system that no longer receives security updates is akin to driving a car with a brake light on, suggested Oliver Tavakoli, CTO at Vectra AI.
Microsoft, Intel Team Up to Clamp Down on Cryptominers
April 28, 2021
As cryptocurrency values continue to rise, cryptojacking becomes more attractive to cybercriminals. Now, a powerful hardware-based threat detection technology is being integrated into a Microsoft enterprise security product to help protect businesses from cryptojacking malware. The action integrates Intel Threat Detection Technology with Microsoft Defender for Endpoint.
Cybercops Scrub Botnet Software From Millions of Computers
April 27, 2021
The notorious Emotet botnet software began uninstalling itself from some one million computers Sunday. The uninstall command was part of an update sent to the infected computers by law enforcement servers in the Netherlands after Emotet's infrastructure was compromised in January during a multinational operation mounted by eight nations.
DuckDuckGo Unwraps Google FLoC Blocker
April 20, 2021
DuckDuckGo has announced an add-on to the Chrome browser that blocks Google's new scheme to provide marketers with information for targeting advertising at Internet users. The scheme called FLoC -- Federated Learning of Cohorts -- is being tested in Chrome, in some cases without the knowledge of the browser's users.
How Fixable Is the Unsafe Internet?
April 15, 2021
A recent study from Consumer Reports' Digital Lab reveals that 96 percent of Americans agree that more should be done to protect consumer privacy. But don't expect to see a whole new alternative Internet emerging any year soon. Instead, you will see a focus on software offerings built around privacy and security rather than hardware.
DNS Flaws Expose Millions of IoT Devices to Hacker Threats
April 14, 2021
A set of flaws in a widely used network communication protocol that could affect millions of devices has been revealed by Forescout Research Labs and JSOF Research. The nine vulnerabilities discovered by security researchers dramatically increase the attack surface of at least 100 million Internet of Things devices, exposing them to potential attacks that could take the devices offline or to be hijacked by threat actors.
Fortune 500s Hit by MS Exchange Breach Maybe Still Unaware
April 13, 2021
Jonathan Cran, founder and CEO of Intrigue, a cybersecurity startup based in Austin, Texas, used his company's network security tools to compile a list of Fortune 500 companies still exposed to last month's Microsoft Exchange breach. Potentially, many of those companies may not know their networks are compromised.
Intrigue Funded to Develop New Attack Surface Management Platform
April 13, 2021
Startup information security firm Intrigue has announced a US$2 million seed round led by LiveOak Venture Partners for a new attack service management platform that helps secure enterprise networks. The Intrigue tools scan all public, exposed attack surfaces inside and outside a company. The seed funding will also support the security and developer communities contributing to Intrigue Core.
Fraud Awareness Kit Puts Businesses on Notice: It's Tax Scam Season
April 7, 2021
Businesses fearful their workers may be targeted by fraudsters will want to take a look at the free Tax Scam Awareness Kit offered by Proofpoint. The kit, for both Windows and macOS, includes materials for an employee education campaign about tax fraud, three educational videos, an infographic, answers to frequently asked questions about tax scams, and a tax scam flyer.
Google's Vested Interest in Linux Security
April 7, 2021
Google is now paying developers more money to work on securing their Linux kernels this year. The gesture may well be the start of the company's bid to enforce a tighter grip on open source. Google's action comes on the heels of rising threats to Linux that unfolded in the last year, as hackers pivot to new strategies like writing malware strains in the Go programming language.
Hacker Recycles Data on Half a Billion Facebook Users
April 6, 2021
A rich cache of data on some 533 million Facebook users was posted to a hacker forum over the weekend and is available to download for practically free. In a statement provided to TechNewsWorld by Facebook, the company said it is confident the posted information is old data that originated from a weakness in its contact importer feature that was discovered and fixed in August 2019.
Consumer Password Hassles Linked to Lost Revenue
March 31, 2021
Lost customers and revenues are caused by password sharing and friction created at websites by onerous authentication procedures, according to a new report. The report explained that if accounts are being shared by multiple users, service providers are less likely to accurately monitor usage and are unable to correctly personalize their offerings.
Cybersecurity Fears Trigger Migration From the Public Cloud
March 26, 2021
Cloud cybersecurity -- or a lack of it -- is feeding a frenzy of companies out of the public cloud. A similar concern about managing compliance obligations is keeping organizations from moving to the cloud in general. However, much of the growing concerns over cloud cybersecurity result from experiences with public and private cloud platforms. A trend toward hybrid cloud computing could be an approach to better ensure data security.
Advance Strategies to Eliminate E-Commerce Chargebacks
March 19, 2021
Half of consumers who originally planned to return to their pre-pandemic in-store shopping routines once coronavirus is under control now plan to stick with online shopping. That shift in preferences means that e-commerce merchants must keep up with trending ways to market, sell, and prevent fraud. Let's look at a few of the most important developments and see where they're going.
Young Adults, Seniors Over 75 Most Susceptible to Cyber Fraud: Report
March 18, 2021
The most vulnerable cybercrime victims are young adults and adults over 75, according to the latest research revealed in the LexisNexis Risk Solutions biannual Cybercrime Report. The report reveals how unprecedented global change in 2020 created new opportunities for cybercriminals around the world, particularly as they targeted new users of online channels.
New Threat Report Finds Email Prime Vehicle for Malware
March 16, 2021
Malicious online actors used email as their prime vehicle for delivering malware to their victims in the last quarter of 2020. The HP-Bromium Threat Insights Report found that 88 percent of malware was delivered by email into its targets' inboxes, many times evading measures at email gateways to filter out the infected correspondence.
Microsoft Confident Exchange Hack Is State-Sponsored Operation
March 10, 2021
Microsoft on Monday reported that multiple malicious actors were taking advantage of vulnerabilities in its Exchange software last week to attack systems at organizations that have failed to patch the flaws. The company attributed the attacks "with high confidence" to Hafnium, a group believed to be state-sponsored and operating out of China.
Apple's New Privacy Framework Pressures the Digital Ad Market
February 26, 2021
Apple's plan to release its App Tracking Transparency (ATT) privacy enhancement feature in early spring has set the ad industry on its ear. ATT requires apps to get a consumer's authorization before tracking them or the devices they are using. Ray Wang, principal analyst and founder at Constellation Research, told the E-Commerce Times that "at least 40 percent of consumers will say no."
Successful Phishers Make Slim Gains in 2020
February 24, 2021
Catastrophic events, like a pandemic, coupled with hasty technological change such as many people forced to work from home immediately, have been a rich environment in the past for phishers, who use deception to infect machines with malware, steal credentials, and invade corporate networks. However, malicious actors achieved only a marginal increase in success in 2020, according to a recent report.
Lessons Learned From the SolarWinds Supply Chain Hack
February 23, 2021
In a recent Linux Foundation blog post titled "Preventing Supply Chain Attacks like SolarWinds," the foundation's Director of Open Source Supply Chain Security, David A. Wheeler, adamantly pushed the need for software developers to embrace the LF's security recommendations. Given the magnitude of the SolarWinds hack, LinuxInsider asked Wheeler to dive deeper into how supply chain security standards might benefit from the LF's latest advice.
Silver Sparrow Malware Hatched on 30,000 Macs
February 23, 2021
Nearly 30,000 Macs have been infected with a new malware strain. Discovered by researchers at Red Canary, the malware has been sitting on it hosts waiting for a payload that never arrived. In a statement provided to TechNewsWorld, Apple said that upon discovering the malware, it revoked the certificates of the developer accounts used to sign the packages, preventing new machines from being infected.
How Biometric Authentication Methods Will Revamp the Commerce Experience
February 17, 2021
As they become more prominent, consumers will enjoy shopping experiences that no longer rely on payments from a piece of plastic with a four-digit pin. Instead, consumers will use unique motion sensors in smartphone devices to passively authenticate people using their walking behavior and other contextual biometric signals. Some of these contactless procedures are already being deployed.
The Future of Cybersecurity in 2021 and Beyond
February 16, 2021
Cybersecurity experts predict that in 2021 there will be a cyberattack incident every 11 seconds. This is nearly twice what it was in 2019, and four times the rate five years ago in 2016. The rapidly growing increase in cyberattacks worldwide comes at a hefty cost for businesses in order to better protect their computer networks from intrusions. Cyberattacks not only are increasing in frequency, but they are costing victims larger financial losses.
Hacker Attempts to Poison Florida City's Water Supply
February 10, 2021
A cyber intruder broke into the computer network of the water treatment system of Oldsmar, Fla. and attempted to poison it with lye. News of the attack was made public Monday by officials of Oldsmar, who revealed the attack was foiled by an operator at the facility within minutes of its launch. The Oldsmar plant provides water to businesses and about 15,000 residents.
Is 2021 the Year Cyberattacks Force Privacy Laws to Grow Some Teeth?
February 4, 2021
Cyberattacks are increasing in frequency, ramping up the data privacy threats they pose to government agencies and businesses alike. Governments both domestic and foreign need to step up efforts to pass legislation that bolsters technological defenses this year, warn privacy groups. Stiffer privacy laws are gradually being reviewed and signed into the U.S. market. But that process is mostly taking place at the state level.
Ubuntu Core 20 Brings Better Industrial IoT Control
February 2, 2021
Canonical on Feb. 2 made available Ubuntu Core 20. This new Ubuntu Core version boasts notable new device security innovations. Given the increasing numbers and sophistication of attacks by individual and state-sponsored cybercriminals, Canonical's efforts should be welcomed by both IoT device makers and their customers, according to Charles King, principal analyst at Pund-IT.
See More Articles in Security Section >>
Contact Center AI Explained by Pop Culture
What was your initial reaction to news of the Colonial Pipeline cyberattack?
It demonstrates that all critical infrastructure sectors are at high risk of disruption by cybercriminals.
Everyone will be paying for this attack in the form of higher energy costs.
Governments need to work more closely with private industries to protect networks for the sake of public safety.
It's a global problem. An international alliance must be formed to hold the perpetrators accountable and prevent future attacks.
Ekata Pro Insight Identity Review
Contact Center AI Explained by Pop Culture
Waylay IO