Raymond Tec 550x104 Transparent
At the Intersection of Technology and Real Life
Social Links
  • Twitter
  • Facebook
  • Instagram
  • LinkedIn
  • Google Play
  • iTunes
  • Spotify
  • Stitcher Radio
  • TuneIn
  • Podcast
  • Syndicated Stories

WannaCry: How the Widespread Ransomware Changed Cybersecurity

Michael York Reading, PA Security Intelligence, Syndicated Stories


If I had polled cybersecurity experts on their way to work on May 12, 2017, most of them would have said they knew a major cybersecurity event loomed.

Yet, on that day no one expected that they were walking into the perfect storm — in the form of WannaCry ransomware, the most damaging cyberattack to date — when they traveled by car, train or ferry to their respective offices that spring morning.

Our devices, systems and networks are more and more interconnected — meaning viruses can much more easily move between systems than they’d been able to in the past. But without a major event in recent memory, most of us (even a cybersecurity journalist like myself) became a bit complacent. When you combined these factors with the number of active devices and systems, the stage was set.

WannaCry Destroyed Systems Across the Globe

This ransomware attack was the biggest cybersecurity event the world had ever seen in part because the impact was wider than the outbreak itself. It created huge aftershocks across enterprises, politics, the hacker community and cybersecurity culture.

Even after the kill switch was found, the virus continued to ravage every system and all the data it touched — attacking computer systems of 300 organizations in 150 countries.

Even after the kill switch was found, the virus continued to ravage every system and all the data it touched — attacking computer systems of 300 organizations in 150 countries.

Russia suffered the single highest number of infection attempts of any country worldwide, according to the BBC. Most mission-critical servers were not affected, however, as they ran a Soviet-era software known as Elbrus. However, technical immunity didn’t stop the virus from spreading to computers across the country. It took down endpoints at the interior ministry, railways, banks and the massive Megafon mobile carrier.

What Was it Like to Face WannaCry?

Covering WannaCry live left me intrigued and full of questions, even years later. Whenever the attack became a topic of conversation over the past three years, I heard the same theme repeated: WannaCry was overwhelming and changed the way we approach cybersecurity and view risks to businesses.

For me, that sentiment was too broad for an event of this magnitude. I had specific questions. What was it like to be a security professional on May 12, 2017? What was the total impact to businesses and governments around the world? How did what we learned that day shape our current business, technology and cybersecurity landscape?

I also wondered how having the whole world watching the event — through social media and digital news sites — changed both the response and the overall impact. Business leaders and members of the public watched the news coverage, and no one knew exactly what was happening. Nearly everyone agreed it seemed ominous. I was also curious if this added to the public panic or helped solve the issue sooner.

“It’s still big. It’s held up as the thing that organizations weren’t prepared for. It was a really good wakeup call for a lot of companies,” says Tracey Nash, IBM X-Force Incident Command Program manager. Nash counts May 12, 2017, as the moment when organizations learned they needed to consider the business side of cybersecurity risks.

To find out exactly what happened — and, even more importantly, why WannaCry left a crater in the landscape — I talked to key players who responded to the attack. One person I spent many hours talking to was Wendi Whitmore, vice president of IBM X-Force Threat Intelligence. I also spoke with Christopher Scott, director of Security Innovation and Remediation (Office of the CISO) at IBM, to get his perspective on the events of that day and the recovery after the WannaCry attack.

This story chronicles the journey to find out what really happened those chaotic days three years ago and how WannaCry’s impact and legacy lives on today.

A Single Tweet Broke the News

Many people — even industry-leading cybersecurity professionals — first learned of the attack from a tweet. A United Kingdom National Health System (NHS) physician was among the first to break the news about the massive attack on Twitter. This was followed by countless colleagues who showed photos of their locked computer screens, all with the same message: “Ooops, your files have been encrypted!”

At the time, NHS employees had no idea the attack would eventually result in 70,000 infected devices and a total shutdown of one-third of all NHS hospitals. WannaCry’s impact on the NHS and other hospitals around the world was proof that cybercrime could wreak havoc in the Internet of medical things (IoMT) age. Thankfully, clinical safety researchers have established definitively that the cryptoworm chaos didn’t result in any patient deaths.

Even those not at their computers knew very quickly something big was happening:

  • A demand for bitcoin appeared on the digital signage that announced commuter train arrivals and departures in Germany.

  • That exact wording also popped up on dozens of cinema screens in South Korea.

  • In Jakarta, Indonesia, hospital patients waited for several hours while doctors switched from computer systems to paper records.

Panic Begins Rising

Whitmore, who at the time worked as a global partner and lead for incident response with X-Force Threat Intelligence, says almost as soon as the attack began, her team began scratching their heads and uttering out loud, “This is weird.”

Specifically, Whitmore’s team knew they were facing something different when they discovered it was literally impossible to get infected files released. The ransomware did not provide a way for hackers to know who paid the ransom.

One of her first priorities was getting copies of the malware. She knew you can’t stop something until you know exactly how it works. But getting the copies and breaking it down was hard, especially under the pressure of knowing the world was quickly grinding to a halt.

WannaCry Strikes Internet Connected Computers Fast

WannaCry was the fastest-spreading cybercrime attack ever experienced. Unpatched internet-connected computers could fall victim within minutes and quickly begin spreading the worm through a network. Many news stories describe IT teams rushing around trying to contain the damage as their colleagues booted up their work PCs.

When I asked Laurance Dine, global lead at X-Force Threat Intelligence (who at the time worked for a global managed-service provider), his biggest memory of the day, he said it was the phone constantly ringing. Every person on the other end was a panicked customer needing help. He summed up the day as “absolute insanity.”

Very quickly, his entire team — including other security experts who weren’t on the incident response team — found themselves deployed on the front line.

“It was all over everything and felt like everybody was involved. The average citizen knew what was going on with ransomware,” says Dine. “They understood the news and what was happening, and they couldn’t go to hospitals, and people’s lives were impacted by that.”

Throughout the day, incident response workers collectively canceled their plans and buckled up for a long weekend of hard work. Everyone was watching the global businesses stunned in the wake of the WannaCry worm.

Network Configuration Aids in Rapid Spread

What none of us knew at the time was that the cryptoworm destroying every system it touched was actually from a two-month-old vulnerability known as EternalBlue. Once the ‘Wanna Decryptor’ managed to infect a single machine on a single network, WannaCry began spreading to other computers on the same network while scanning the internet for other unpatched machines. The vulnerability exploited by EternalBlue left unpatched Windows machines open to infection and spread the WannaCry virus.

Cryptoworms can usually be detected quickly on enterprise networks. But WannaCry stayed under the radar — until it didn’t. Detection is something that many sophisticated threat actors try to avoid at all costs, especially during a highly targeted attack, but WannaCry wasn’t a targeted attack. It was a carefully planned, global attack that was designed to get as much attention as possible, which is exactly what happened.

In a lot of cases, Scott explains, the spread was also enabled by what he calls an “M&M network.” In a case like this, the network structure is hard on the outside and soft on the inside. This was a welcoming interior for threat actors and cryptoworms. He notes once the cryptoworm got past the hard candy shell at the edge of the network, WannaCry found a lot of freedom to move around the environment.

Finding the Kill Switch is Only the Beginning of Recovery

Over the next seven hours, the “big slimy worm” wreaked global havoc until cybersecurity researchers Marcus Hutchins and Jamie Hankins discovered a kill switch. Two additional kill switches were discovered, eventually rendering the ransomware strain mostly inert.

But the long remediation process was just starting for 300 organizations worldwide, and none of us realized the extent of the damage and the process to fix it. We were still in unmapped territory, including Scott’s team, who was rushing to apply a fix.

“I need[ed] to bring those environments back up into operational capability,” Scott says. “But how do we go through testing to make sure a fix is OK? How do we go through user acceptance? And, then, how do we move that into production?”

In a lot of cases, Scott’s team had to bypass traditional testing processes and run the risk that rushing would “break a few things.” WannaCry didn’t exactly offer people options, which was one of the big reasons for the mass destruction in its wake.

Adding Up the Cost of WannaCry

Most cybersecurity pros know WannaCry was hardly a financial success, and the data on its net profit shows it being much lower than expected. Blockchain records reveal that between May 2017 and December 2019, WannaCry netted attackers a total of around $386,000, although the total fluctuates with the valuation of bitcoin. That’s a paltry $1.08 or less per infected computer.

Compared to much earlier email viruses, strictly in terms of dollars, it was nearly a bargain. Symantec estimated $4 billion in financial losses in 2018 due to WannaCry, a number likely higher today. The Conficker virus caused over $9.1 billion in damages in 2007 and infected millions of computers around the world. In 2004, MyDoom caused around $38 billion in damages and affected some 25% of emails sent over the course of the year.

This cryptoworm was intended to make a lot of noise instead of profit off a single target. The threat actors behind WannaCry specifically leveraged Ukrainian tax accounting software — a software that the government mandated for any organization doing business in Ukraine, according to Dine. By pushing out a software update, the threat actors managed to take down a huge chunk of Ukraine’s national infrastructure along the way.

The vast majority of cybercrime is financially motivated. It’s rare to encounter a ransomware designed to wreak mass havoc with little concern for actual ransoms.

Over The Next Year Attacks Became More Targeted

When asked what she thought was the most significant part of WannaCry, Whitmore says everything was significant.

“It was certainly a huge wakeup call.” says Whitmore. “So, for any organization that saw these global conglomerates … who had good security programs and protocols that were impacted [by the virus], it raised awareness.”

“It was certainly a huge wakeup call.” says Whitmore

More targeted campaigns are more common in the wake of WannaCry, she says. Although the attacks aren’t always against a single client, now threat actors might send out many phishing emails and get access to 10 clients. From there, she sees threat actors spending six to 12 months performing careful reconnaissance on potential targets while avoiding detection inside the network.

Eventually, Whitmore says, they set off ransomware where they know or suspect they’re going to have a better chance of getting paid.

WannaCry is probably at least partially responsible for the current threat vector and the rising popularity of commercial ransomware attacks. Ransomware comprised 39% of all malware incidents with data loss in 2017, according to the 2018 Data Breach Investigations Report (DBIR). Since then, attacks have morphed to become much more sophisticated and costly for victims. Commercial ransomware is also often highly capable of evading detection methods.

Many organizations that were impacted had plentiful data backups, but they weren’t always recoverable. In many cases, the backups were connected to the network and vulnerable to being locked by WannaCry. In other cases, organizations had off-site backups and had not tested them for easy recovery.

The May 2017 crypto-ransomware incident was a turning point for the threat landscape. WannaCry had a positive impact on enterprise cybersecurity culture, but it also skyrocketed ransomware into the consciousness of global threat actors. Many commercial ransomware threat actors now put careful research into the value of a victim’s data if it’s lost or sold to a competitor.

Case in point: Whitmore just saw a ransomware attack against an organization in the past six weeks.
“The attackers asked for $25 million for the ransom. This was not a huge company by any means,” says Whitmore.

Two Years Later: CEOs Talk About Ransomware

Before WannaCry, most enterprise leaders seemed to have an ‘it can’t happen to us’ attitude, especially outside the healthcare area. Now, when I bring up ransomware, people listen. Enterprise leaders often are the first to bring up ransomware with me and other cybersecurity experts. From my viewpoint, one of the most significant impacts from the trauma and destruction of WannaCry was how enterprise leadership realized ransomware was a meaningful threat.

The event also had a profound impact on cybersecurity’s role within a business and the CISO’s role on the board. Leadership now realizes you could go through a major cyber breach and actually end up better from a reputational perspective.

One logistics brand based in the EU shows how it suffered little reputational damage from WannaCry. The CEO took a public role and spoke directly to the public and clients in the days after the attack. The combination of the cryptoworm and the confident, communicative CEO was a critical first step toward an enterprise cybersecurity culture of shared responsibility.

WannaCry Infections Are Still Found in 2020

Countless copycats and aftershocks came after the first WannaCry attack. ESET disclosed in May 2020 that WannaCry accounted for 40.5% of all its ransomware detections in Q1 2020. Some countries are still disproportionately affected by WannaCry aftershocks because major ISPs block the kill switch domains. Some of these lingering infections are due to poor cyber hygiene practices. Other infections persist on nontraditional endpoints that are difficult for many enterprises to detect, let alone manage.

What if WannaCry Hit on May 12, 2020?

It’s hard to say whether enterprises would be significantly better prepared for a global cryptoworm attack in 2020 than they were in 2017. However, most experts I spoke with agree the human element of cybersecurity has dramatically evolved, which should give incident response professionals hope.

However, according to ESET, data from the search engine Shodan revealed that almost 1 million devices were still vulnerable and unpatched against the EternalBlue vulnerability as of May 2019. There has been very little variance in that figure since late May 2017, which is deeply concerning.

A recent survey shows 27% of global organizations had attributed a data breach incident to unpatched vulnerabilities. More concerning is a huge percentage have little idea exactly which endpoints on their network are posing risks. Meanwhile, 39% of organizations admit to performing vulnerability scans less than once a month. According to CA Veracode, more than 70% of vulnerabilities remain unpatched after 30 days.

The cost to recover from a highly destructive attack was $239 million, or 61 times more expensive than an average incident involving data loss.

Scott has seen major positive changes in how organizations approach environments and control points to avoid the ‘hard candy shell’ conditions that allowed the worm to spread so quickly. Clients are now thinking about containerization and microservices instead of providing attackers with the kind of soft, gooey network target that was common in 2017 and before. This could be partially linked to WannaCry, but is also likely due to the fact that enterprise network perimeters have shifted.

In today’s networks, it’s not uncommon to come across many servers that may not have access to workstations. Instead, users can access cloud data via agents. The secure cloud adds a bit of complexity to security policies and complicated some workflows, but it has also improved security posture in many respects. Cloud-driven isolation means organizations no longer operate on one big network.

The switch away from yesterday’s candy networks has also impacted user privileges. Scott sees this as a major positive in defending against advanced persistent threats (APTs) and privileged accounts. Most importantly, many organizations are switching to trust-based and need-based models of access instead of designating super users and rearchitecting privileges.

However, three years after the WannaCry worm, the cost of bouncing back from highly targeted ransomware and APTs is at an all-time high. This is incredibly disconcerting. Last year, the average recovery cost for a data breach was $3.92 million, according to 2019 Cost of a Data Breach Report. The cost to recover from a highly destructive attack was $239 million, or 61 times more expensive than an average incident involving data loss.

The Tides Have Shifted to Carefully Targeted TTPs

Threat actors are getting bolder and more calculated about demanding exactly the amount of money they think a victim’s data is worth. Commercial ransomware in 2020 isn’t intended to spread virally across networks or target hundreds of thousands of unpatched endpoints. Instead, threat actors target companies that are likely to pay ransoms in the millions.

Threat actors zero in on victims to make sure they invade all the right systems to create an environment of terror, often even getting to the backup servers to try to force their victim’s hand in paying the ransom.

Today’s More Collaborative Cybersecurity Culture

Increased collaboration has been one of the most positive impacts in the past three years. WannaCry may have been something of a catalyst for greater collaboration between industries, the public sector and international policymakers.

I spoke with Mike Barcomb, program director at X-Force Incident Command, to get his perspective on the change.

“It’s been the focus of companies to build these [incident response] programs, but also to work along with their peers and other businesses in the industry,” says Barcomb. “They build energy where they can share best practices and threat information about threat actors — things they’ve seen, and things they’ve experienced.

“They build energy where they can share best practices and threat information about threat actors — things they’ve seen, and things they’ve experienced.”

“It’s very encouraging to see companies working together to build up defenses against threats.”

Preparing for the Future: WannaCry Showed How Controls Fail

The human element of preparedness is just as important as technological readiness in ensuring proper cyber hygiene, says Kurt Rohrbacher, IBM X-Force Threat Intelligence North American lead. The single best way an organization can be prepared for any global incident is to think about what happens when controls fail, and consider the weight of each decision.

“People don’t often think about [how] the first few hours of an incident can often dictate whether you’re dealing with this for a day, a week, a month or in some cases, a year,” says Rohrbacher. “Identifying the steps you’re going to take very early in an incident will make or break your ultimate response.”

“Identifying the steps you’re going to take very early in an incident will make or break your ultimate response.”

This statement really resonated with me because we often underestimate the impact of stress and panic on our decision making ability. These seemingly small decisions can make the difference between millions of dollars and years of recovery or months.

Incentivizing Solid Cybersecurity Work with KPIs

Scott told me it gives him hope to see the beginnings of a shift in key performance indicators (KPIs), which is an area he’s particularly passionate about. He often asks his team “How do we track and really incentivize the people to do the work correctly?”

In the case of SOC analysts, metrics that focus on speed-to-resolution and timeframes can be counterproductive. SOC analysts can get sidetracked if they are operating in an environment too focused on efficiency. They may close out tickets before completing an investigation and miss the bigger picture — like the infiltration point of an attack.

The industry’s cyber hygiene and patching habits may not have measurably improved since May 2017, but most experts agree we would be better prepared today than we were before, even outside of organizations that have already faced ransomware attacks. It’s about a shift in the human element of cybersecurity.

Building Confidence to Handle the Unexpected

Rohrbacher chuckles when I ask how companies and cybersecurity professionals prepare for the unexpected. He shrugs his shoulders and says, “Well, there is nothing like the real thing.”

He told me a real incident, such as WannaCry, increases both awareness and preparedness. Beyond that, nearly all the incident response experts I talked to agree that simulation is crucial, just as quarterly tabletop exercises and regular communication tool tests are crucial to building muscle memory.

He pointed to phishing simulations and cyber-range activities as two ways organizations could prepare for unforeseen outcomes. Rohrbacher says if an exercise or drill really draws people into the situation and encourages them to have fun, they are more likely to have their own takeaways for how to respond better.

I am continually struck by the similarity between the current COVID-19 pandemic and the WannaCry attack. The early hours of the attack felt very similar to March 2020 as everyone moved into crisis mode trying to manage a never-before-seen situation. Now, as the pandemic stretches on, the feeling is similar to us still finding WannaCry infections today. The pandemic likely affects most of us on a more personal level. But both crises affected our daily lives in ways no one could have imagined or predicted.

The key lessons from both events boil down to preparedness. Both WannaCry and the pandemic caught everyone off guard. This begs the age-old question of how to prepare for something that has never even come close to happening before.

What comes to most people’s minds when they think of preparedness are strategic plans, simulations, education and using tools, such as backups for recovery. However, these measures only go so far when a novel attack occurs and a plan for exactly what’s happening doesn’t exist. I think it really comes down to taking a new view and approach.

“When you’re in the middle of a crisis, everything except muscle memory goes out the window.”

Something Rohrbacher says keeps coming to mind: “When you’re in the middle of a crisis, everything except muscle memory goes out the window.”

Of course, we need to be able to deploy technology, and create plans and back up recovery options. But we must also focus on creating confidence and muscle memory for every incident response worker.

Confidence isn’t something that happens in a single training session or a box you check off on a Thursday afternoon. It is an underlying shift in culture and processes. Preparedness comes down to empowering individuals to feel confident enough to take charge. You want your team to take a deep breath and say, “OK, I got this,” even when the unexpected happens.

The post WannaCry: How the Widespread Ransomware Changed Cybersecurity appeared first on Security Intelligence.

Read the full article here

Brazil publishes National Innovation Policy FBI: How Iranian hackers stole voter info from state election sites

Related Posts

SecurityWeek, Syndicated Stories

Microsoft Edge Adds Password Generator, Drops Support for Flash, FTP

Microsoft has shipped the stable version of the Microsoft Edge 88 browser, featuring a brand new Password Generator and the ability to alert on compromised credentials.   The browser refresh also drops support for the FTP protocol and for the Adobe Flash plugin.
read more

…

SecurityWeek, Syndicated Stories

Enterprise Credentials Publicly Exposed by Cybercriminals

Cybercriminals behind a successful phishing campaign have exposed more than 1,000 corporate employee credentials on the Internet, according to a warning from security vendor Check Point.
read more

…

Security Intelligence, Syndicated Stories

What is STRIDE and How Does It Anticipate Cyberattacks?

STRIDE threat modeling is an important tool in a security expert’s arsenal. Threat modeling provides security teams with a practical framework for dealing with a threat. For example, the STRIDE model offers a proven methodology of next steps. It can suggest what defenses to include, the likely attacker’s profile, likely attack vectors and the assets […]
The post What is STRIDE and How Does It Anticipate Cyberattacks? appeared first on Security Intelligence. …

Syndicated Headlines

  • SpaceX is sparring with a Texas oil company to drill for natural gas
  • A Fight Over GameStop’s Soaring Stock Turns Ugly
  • Intel Confirms Unauthorized Access of Earnings-Related Data
  • Cyberpunk 2077 Patch 1.1 arrives on Stadia, bringing many stability fixes
  • The Week in Ransomware – January 22nd 2021 – Calm before the storm
  • Microsoft Edge Adds Password Generator, Drops Support for Flash, FTP
  • Sharing eBook With Your Kindle Could Have Let Hackers Hijack Your Account
  • Daily Crunch: Alphabet shuts down Loon
  • AWS, as predicted, is forking Elasticsearch
  • Argo gives its self-driving vehicle hardware a big upgrade – Roadshow

You Need a Password Manager

About Affiliate Links
LastPass by LogMeIn Affiliate Link

Latest Headlines

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
Your Body, Your Self, Your Surgeon, His Instagram
19 January 2021

Social media gave the Real Dr. 6ix a stage on which to show off liposuctions and breast lifts. But when cosmetic surgery becomes entertainment, who owns the story? [...]

Covid, Schools, and the High-Stakes Experiment No One Wanted
18 January 2021

Reopening in the fall was a massive gamble. At one high-poverty elementary school, navigating the risks paid off. [...]

I Am Not a Soldier, but I Have Been Trained to Kill
15 January 2021

A sprawling tactical industry is teaching American civilians how to fight like Special Ops forces. By preparing for violence at home, are they calling it into being? [...]

The Case for Cannibalism, or: How to Survive the Donner Party
13 January 2021

Don’t be a young, healthy, single man. That’s our first piece of advice. [...]

The Unsettling Truth About the ‘Mostly Harmless’ Hiker
12 January 2021

His emaciated body was discovered in a tent, just a few miles from a major Florida highway. His identity—and troubled past—were discovered by the internet. [...]

How Many Microcovids Would You Spend on a Burrito?
12 January 2021

Six nerdy roommates used public health data to create an online Covid-risk points system for every activity—and protect their pandemic pod. [...]

The Autonomous-Car Chaos of the 2004 Darpa Grand Challenge
6 January 2021

The self-driving vehicles smashed, burned, flipped, and tipped. But the ambitious race through the Mojave launched an industry. [...]

A 25-Year-Old Bet Comes Due: Has Tech Destroyed Society?
5 January 2021

In 1995, a WIRED cofounder challenged a Luddite-loving doomsayer to a prescient wager on tech and civilization’s fate. Now their judge weighs in. [...]

The F-14 and the Secret History of the First Microprocessor
23 December 2020

In a weird way, I’ve known Ray Holt all my life, but I never knew what he had accomplished—or how his inventions wove their way into my own family. [...]

Some of Our Favorite Longreads of 2020
22 December 2020

It was a brutal year. Take a breath and enjoy some of our favorite in-depth stories. [...]

Facebook users were mass-logged out Friday by configuration change
23 January 2021

If you were logged out of Facebook tonight, you are not alone. Facebook states that users were logged out of the social site due to a "configuration change." [...]

The Week in Ransomware - January 22nd 2021 - Calm before the storm
23 January 2021

Ransomware news is slow this week, with mostly small ransomware variants being released and a small number of attacks reported. [...]

SAP SolMan exploit released for max severity pre-auth flaw
22 January 2021

Fully-functional exploit code is now publicly available for a maximum severity pre-auth vulnerability impacting default configurations of an SAP Solution Manager (SolMan) component. [...]

Bonobos clothing store suffers a data breach, hacker leaks 70GB database
22 January 2021

Bonobos men's clothing store has suffered a massive data breach exposing millions of customers' personal information after a cloud backup was downloaded by a threat actor. The corporate systems were not breached by the attacker. [...]

Intel: Hackers stole unpublished earnings info from corporate site
22 January 2021

Intel disclosed on Thursday that unknown threat actors stole an infographic containing info on the company's fourth-quarter and full-year 2020 financial results. [...]

Drupal releases fix for critical vulnerability with known exploits
22 January 2021

Drupal has released a security update to address a critical vulnerability in a third-party library with documented or deployed exploits available in the wild. [...]

Windows 10 KB4598298 update fixes crashes and restart issues
22 January 2021

​Microsoft has released the KB4598298 update for all editions of Windows 10 and Windows Server versions 1809 and 1909, with fixes for unexpected system restart issues, system crashes due to BitLocker, and multiple LSASS issues. [...]

New Windows 10 update leaks info on upcoming 21H1 feature update
22 January 2021

A Windows 10 20H2 cumulative update released to Insiders on the 'Release' channel leaked that the next feature updated will be 21H1. [...]

MyFreeCams site hacked to steal info of 2 million paying users
22 January 2021

A hacker is selling a database with login details for two million high-paying users of the MyFreeCams adult video streaming and chat service. [...]

Windows Remote Desktop servers now used to amplify DDoS attacks
21 January 2021

Windows Remote Desktop Protocol (RDP) servers are now being abused by DDoS-for-hire services to amplify Distributed Denial of Service (DDoS) attacks. [...]

Antifa.com redirects to White House website as trolls needle Biden - CNET
23 January 2021

The internet has a long history of similar shenanigans. [...]

Phishing scams use the promise of COVID-19 vaccines to trick you - CNET
23 January 2021

Texts, emails and ads for bogus coronavirus vaccines may dog you. They're not legitimate. [...]

Drones and digital models make infrastructure inspections safer and more accurate - CNET
23 January 2021

Aerial imaging, combined with machine learning and predictive analysis, makes it possible to predict needed structural repairs. [...]

9 great reads from CNET this week - CNET
23 January 2021

We contemplate the pros and cons of a rumored return of MagSafe to MacBooks. Plus: the messy hunt for COVID-19's origins, nightmares about Netflix's Night Stalker, and more. [...]

Biden's transportation plans, base Porsche Taycan and more: Roadshow's week in review - Roadshow
23 January 2021

Here's a look at the car world's biggest stories for the week ending Jan. 23. [...]

Ghosts of Soviet aviation at the Riga Aviation Museum - CNET
23 January 2021

From MiG and Sukhoi supersonic jets to massive Mil helicopters, there's lots of Cold War aviation history to see at this Latvian museum. [...]

Soviet aviation history on display at the Riga Aviation Museum - CNET
23 January 2021

Check out MiG and Sukhoi supersonic fighter jets, giant Mil helicopters and more relics of Cold War aircraft at this unique museum. [...]

HDMI 2.1: What you need to know for gaming, 8K TVs and more in 2021 - CNET
23 January 2021

The latest HDMI standard unlocks new graphics features on the PS5 and Xbox Series X, higher resolution potential on 8K TVs and more. [...]

Smart grocery carts are coming to change the way we shop - CNET
23 January 2021

Move over, Amazon Go. Kroger is working with startup Caper on a smart grocery cart that lets you skip traditional checkout lines. [...]

Motorola's 4 newest sub-$400 phones are here, and we went hands-on - CNET
23 January 2021

Our first impressions of the 2021 versions of the Moto G Stylus, Moto G Power and Moto G Play, along with the Motorola One 5G ACE. [...]

Intel Confirms Unauthorized Access of Earnings-Related Data
22 January 2021

News likely contributed to slide of over 9% in chipmaker's stock at one point Friday. [...]

Speed of Digital Transformation May Lead to Greater App Vulnerabilities
22 January 2021

The fastest-moving industries are struggling to produce secure code, according to AppSec experts. [...]

How Cybersecurity Newbs Can Start Out on the Right Foot
22 January 2021

Cybersecurity experts share their savvy tips and useful resources for infosec hopefuls. [...]

Why North Korea Excels in Cybercrime
22 January 2021

North Korea is laser-focused on boosting its cyber capabilities, and it's doing a remarkable job of it. [...]

DreamBus, FreakOut Botnets Pose New Threat to Linux Systems
21 January 2021

Researchers from Zscaler and Check Point describe botnets as designed for DDoS attacks, cryptocurrency mining, and other malicious purposes. [...]

Breach Data Shows Attackers Switched Gears in 2020
21 January 2021

Attackers focused more on ransomware, while the consolidation of data into large databases led to fewer reported breaches but more records leaked. [...]

Attackers Leave Stolen Credentials Searchable on Google
21 January 2021

Operators behind a global phishing campaign inadvertently left thousands of stolen credentials accessible via Google Search. [...]

Cloud Jacking: The Bold New World of Enterprise Cybersecurity
21 January 2021

Increased reliance on cloud computing puts more weight on robust authentication systems to protect data against hijackers. [...]

7 Steps to Secure a WordPress Site
21 January 2021

Many companies operate under the assumption that their WordPress sites are secure -- and that couldn't be anything further from the truth. [...]

Hacker Pig Latin: A Base64 Primer for Security Analysts
21 January 2021

The Base64 encoding scheme is often used to hide the plaintext elements in the early stages of an attack that can't be concealed under the veil of encryption. Here's how to see through its tricks. [...]

SecurityWeek Names Ryan Naraine as Editor-at-Large
19 January 2021

SecurityWeek has named Ryan Naraine as Editor-at-Large, adding a veteran cybersecurity journalist and podcaster to its editorial team. [...]

Why Cyber Security Should Be at the Top of Your Christmas List
17 December 2020

To take advantage of emerging trends in both technology and cyberspace, businesses need to manage risks in ways beyond those traditionally handled by the information security function. [...]

United States Federal Government’s Shift to Identity-Centric Security
17 December 2020

Governments are increasingly facing new legislation, standards, frameworks, and policies to protect critical and sensitive information. [...]

How Extreme Weather Will Create Chaos on Infrastructure
21 October 2020

Extreme weather events will soon become more frequent and widespread, devastating areas of the world that typically don’t experience them and amplifying the destruction in areas that do. [...]

BSIMM11 Observes the Cutting Edge of Software Security Initiatives
21 October 2020

In addition to helping an organization start an SSI, the BSIMM also gives them a way to evaluate the maturity of their SSI. [...]

Sustaining Video Collaboration Through End-to-End Encryption
21 October 2020

By infusing end-to-end encryption into any video strategy, it ensures not only the sustainability of the channel, but the businesses that rely on it. [...]

Will Robo-Helpers Help Themselves to Your Data?
8 September 2020

Are you sure that your robo-helpers are secure? [...]

Securing the Hybrid Workforce Begins with Three Crucial Steps
2 September 2020

The global shift to a remote workforce has redefined the way organizations structure their business models. [...]

A New Strategy for DDoS Protection: Log Analysis on Steroids
26 August 2020

Incorporating a data lake philosophy into your security strategy is like putting log analysis on steroids. [...]

COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider
26 August 2020

Despite the COVID-19 pandemic, companies are obligated to comply with many laws governing data security and privacy [...]

SonicWall says it was hacked using zero-days in its own products
23 January 2021

The networking device vendor has published a series of mitigations as it's investigating the incident and preparing patches. [...]

VoiceHub provides voice assistants with no programming needed
23 January 2021

VoiceHub from Sensory lets anyone add a Natural Language user interface to (almost) anything [...]

Meet TimeRepublik, the purpose-driven social network
23 January 2021

TimeRepublik, is on a mission is to foster an ecosystem whereby members provide services in exchange for service credits. This is digital bartering at its best, helping the global community [...]

iPhone tip: This app tests almost every component in your iPhone
23 January 2021

This app offers a quick and easy way to test your iPhone's hardware, sensors, and components. [...]

AWS, as predicted, is forking Elasticsearch
22 January 2021

Amazon Web Services, however, isn't the only one who dislikes Elastic's move to relicense Elasticsearch under the non-open-source Server Side Public License. [...]

Huawei hires former Brazilian president to advise on 5G
22 January 2021

Michel Temer will be working towards ensuring the Chinese firm's participation in the local market for next-generation 5G wireless networks. [...]

Microsoft 365 vs Google Workspace (formerly G Suite): Which productivity suite is best for your business?
22 January 2021

Microsoft and Google are engaged in a pitched battle to win over your business with suites of cloud-based productivity software and services. Here's a look at the many different editions of Microsoft 365 and Google Workspace, along with what you can expect to pay for each one. [...]

Deal alert: Paychex's payroll processor for SMBs is free for three months
22 January 2021

The deal ends on Feb. 25, 2021. [...]

Microsoft and SAP plege to integrate Teams with SAP business apps by mid-2021
22 January 2021

Microsoft and SAP are committing again this year to expanding their strategic partnership, but this time involving Microsoft Teams. [...]

Mesh networking vs. traditional Wi-Fi routers: What is best for your home office?
22 January 2021

We explain the differences and discuss the best options available for home setups and remote working. [...]

For Attackers, Home is Where the Hideout Is
19 January 2021

Remember the good ol’ days of playing hide-and-seek? It’s hard to forget the rush of finding the perfect hiding place. I remember crouching into a tiny ball behind the clothes hanging in my mother’s closet, or standing frozen like a statue behind the curtain of our living room window. While it was “just a game” […] The post For Attackers, Home is Where the Hideout Is appeared first on Security Intelligence. [...]

QR Code Security: What You Need to Know Today
19 January 2021

QR codes are very common today, enough so that attackers are discovering ways of using them for profit. How can QR codes be used this way, and what can you do to boost QR code security and protect against these scams? What Are QR Codes Used For?  QR codes — short for “quick response codes” […] The post QR Code Security: What You Need to Know Today appeared first on Security Intelligence. [...]

Managing Cybersecurity Costs: Bake These Ingredients Into Your Annual Budget
15 January 2021

As businesses across all industries evolve, once discretionary expenses become operating costs.  Insurance coverage, for example, is pretty much ‘a must’ across many industries. The latest may be cybersecurity costs, because protecting your most important currency, information, requires ongoing attention. When looking at your cybersecurity budget, factor in every part of the recipe. What are […] The post Managing Cybersecurity Costs: Bake These Ingredients Into Your Annual Budget appeared first on Security Intelligence. [...]

Hybrid Cloud Adoption Brings Security on the Go
15 January 2021

Hybrid cloud environments are a common sight in today’s digital world. IBM’s Assembling Your Cloud Orchestra report found 85% of organizations already utilize a hybrid cloud and 98% anticipate having one in place within three years. This type of cloud environment allows for more agile business processes, a novel infrastructure and produces potential new revenue […] The post Hybrid Cloud Adoption Brings Security on the Go appeared first on Security Intelligence. [...]

Misconfigurations: A Hidden but Preventable Threat to Cloud Data
15 January 2021

Working in the cloud has many advantages. But to handle your information safely, you should know how to defend against the common problem of misconfigurations leaving cloud data open to thieves.  What are the Benefits of Cloud Computing? Many groups are expanding their use of the cloud. In November 2019, Gartner announced its prediction that […] The post Misconfigurations: A Hidden but Preventable Threat to Cloud Data appeared first on Security Intelligence. [...]

5 Cybersecurity Best Practices For Planning Ahead
14 January 2021

Putting best practices in place is the most efficient way to combat cybersecurity threats. But that’s easier said than done, as there are a lot of forces working against our best efforts. The talent shortage looms the largest; there simply aren’t enough qualified cybersecurity experts out there to provide organizations a strong foundation. Without a […] The post 5 Cybersecurity Best Practices For Planning Ahead appeared first on Security Intelligence. [...]

Preparing a Client Environment for Threat Management
14 January 2021

A key part of making any threat management program successful is ensuring it maps properly to the client’s needs. In the past, this has been challenging for many groups providing threat management to their internal teams. The challenge has largely been in making sure the proposed program and the suite of solutions find and call […] The post Preparing a Client Environment for Threat Management appeared first on Security Intelligence. [...]

Social Engineering And Social Media: How to Stop Oversharing
13 January 2021

You’ve done your due diligence, practice good security hygiene and have the best security tools available. Now, your security posture is strong. But, your plan is only as good as your employees, and they may be letting you down when it comes to being ready for social engineering.   While employees clicking on phishing links still […] The post Social Engineering And Social Media: How to Stop Oversharing appeared first on Security Intelligence. [...]

Peaks and Valleys: The Mental Health Side of Cybersecurity Risk Management
12 January 2021

There is one risk cybersecurity experts often overlook: burnout. We can build on threat detection and incident response capabilities and use cybersecurity risk management frameworks, such as NIST CSF, to improve our overall risk posture all we want without ever looking inward. Because burnout is internal, we may not always see it. But left unmanaged, it can […] The post Peaks and Valleys: The Mental Health Side of Cybersecurity Risk Management appeared first on Security Intelligence. [...]

What is STRIDE and How Does It Anticipate Cyberattacks?
11 January 2021

STRIDE threat modeling is an important tool in a security expert’s arsenal. Threat modeling provides security teams with a practical framework for dealing with a threat. For example, the STRIDE model offers a proven methodology of next steps. It can suggest what defenses to include, the likely attacker’s profile, likely attack vectors and the assets […] The post What is STRIDE and How Does It Anticipate Cyberattacks? appeared first on Security Intelligence. [...]

SonicWall Says Internal Systems Targeted by Hackers Exploiting Zero-Day Flaws
23 January 2021

Cybersecurity firm SonicWall said late on Friday that some of its internal systems were targeted by “highly sophisticated threat actors” exploiting what appear to be zero-day vulnerabilities affecting some of the company’s products. read more [...]

Microsoft Edge Adds Password Generator, Drops Support for Flash, FTP
22 January 2021

Microsoft has shipped the stable version of the Microsoft Edge 88 browser, featuring a brand new Password Generator and the ability to alert on compromised credentials.   The browser refresh also drops support for the FTP protocol and for the Adobe Flash plugin. read more [...]

Biden Orders Intelligence Agencies to Assess SolarWinds Hack
22 January 2021

Just days into his leadership role, U.S. President Joe Biden has instructed U.S. intelligence agencies to provide him with a detailed assessment of the SolarWinds hack, which fueled a global cyber espionage campaign impacting many high-profile government agencies and businesses. read more [...]

Intel's Early Earnings Release Triggered by Hack
22 January 2021

U.S. chip-making giant Intel Corp. has acknowledged a website hack and premature data disclosure forced the early release of its earnings report for the fourth quarter of 2020. read more [...]

Sophos: Crypto-Jacking Campaign Linked to Iranian Company
22 January 2021

An Iran-based software company is likely behind a recently identified crypto-jacking campaign targeting SQL servers, according to a report by British anti-malware vendor Sophos. read more [...]

QNAP Warns NAS Users of 'dovecat' Malware Attacks
22 January 2021

QNAP this week warned users of attacks targeting QNAP NAS (network-attached storage) devices with a piece of malware named “dovecat.” read more [...]

Thousands of Unprotected RDP Servers Can Be Abused for DDoS Attacks
22 January 2021

Cybercriminals have been abusing unprotected servers running Microsoft’s Remote Desktop Protocol (RDP) service to launch distributed denial-of-service (DDoS) attacks, application and network performance management company NETSCOUT warned this week. read more [...]

Enterprise Credentials Publicly Exposed by Cybercriminals
21 January 2021

Cybercriminals behind a successful phishing campaign have exposed more than 1,000 corporate employee credentials on the Internet, according to a warning from security vendor Check Point. read more [...]

Drupal Updates Patch Another Vulnerability Related to Archive Files
21 January 2021

Security updates released this week by the developers of the Drupal content management system (CMS) patch a vulnerability identified in a third-party library. read more [...]

Multi-Cloud Network Security Provider Valtix Raises $12.5 Million
21 January 2021

Multi-cloud network security platform provider Valtix on Thursday announced that it raised $12.5 million in strategic funding. read more [...]

This Week in Apps: TikTok viral hit breaks Spotify records, inauguration boosts news app installs, judge rules against Parler
23 January 2021

Welcome back to This Week in Apps, the weekly TechCrunch series that recaps the latest in mobile OS news, mobile applications and the overall app economy. The app industry is as hot as ever, with a record 218 billion downloads and $143 billion in global consumer spend in 2020. Consumers last year also spent 3.5 trillion minutes using apps on Android devices […] [...]

Watch SpaceX launch its first dedicated rideshare mission live, carrying a record-breaking number of satellites
23 January 2021

[UPDATE: Today’s attempt was scrubbed due to weather conditions. Another launch window is available tomorrow at 10 AM ET] SpaceX is set to launch the very first of its dedicated rideshare missions – an offering it introduced in 2019 that allows small satellite operators to book a portion of a payload on a Falcon 9 launch. […] [...]

How fintech and serial founders drove African pre-seed investing to new heights in 2020
23 January 2021

When Stripe-subsidiary Paystack raised its seed round of $1.3 million in 2016, it was one of the largest disclosed rounds at that stage in Nigeria.  At the time, seven-figure seed investments in African startups were a rarity. But over the years, those same seed-stage rounds have become more common, with some very early-stage startups even […] [...]

Could giant SPACs be next?
23 January 2021

While many deemed 2020 the year of SPAC, short for special purpose acquisition company, 2021 may well make last year look quaint in comparison. It’s probably not premature to be asking: is there any company too big to be SPAC’d? Just today, we saw the trading debut of the most valuable company to date go […] [...]

Daily Crunch: Alphabet shuts down Loon
22 January 2021

Alphabet pulls the plug on its internet balloon company, Apple is reportedly developing a new MacBook Air and Google threatens to pull out of Australia. This is your Daily Crunch for January 22, 2021. The big story: Alphabet shuts down Loon Alphabet announced that it’s shutting down Loon, the project that used balloons to bring […] [...]

The far right’s favorite registrar is building ‘censorship-resistant’ servers
22 January 2021

Almost half the global population currently has no internet access, and many who do cannot freely access all information sources. [...]

End-to-end operators are the next generation of consumer business
22 January 2021

These businesses are fundamentally reimagining their product experience by owning the entire value chain from end to end, thereby creating a step-functionally better experience for consumers. [...]

Extra Crunch roundup: Digital health VC survey, edtech M&A, deep tech marketing, more
22 January 2021

Speaking as an unvaccinated urban dweller: I'd rather speak to a nurse or doctor via my laptop than try to remain physically distanced on a bus or hailed ride traveling to/from their office. [...]

Backed by Vint Cerf, Emortal wants to protect your digital legacy from ‘bit-rot’
22 January 2021

We are all pumping out data into the cloud. Some of it we’d like to keep forever. Emortal is a startup that wants to help you organize, protect, preserve and pass on your “digital legacy” and protect it from becoming unreadable, otherwise known as “bit-rot.” The project has received backing from the legendary Vint Cerf, one […] [...]

Drupal’s journey from dorm-room project to billion-dollar exit
22 January 2021

Moving from dorm room to billion-dollar exit is the dream of every startup founder. Dries Buytaert got there by being bold, working hard and thinking big. [...]

Experts Detail A Recent Remotely Exploitable Windows Vulnerability
23 January 2021

More details have emerged about a security feature bypass vulnerability in Windows NT LAN Manager (NTLM) that was addressed by Microsoft as part of its monthly Patch Tuesday updates earlier this month. The flaw, tracked as CVE-2021-1678 (CVSS score 4.3), was described as a "remotely exploitable" flaw found in a vulnerable component bound to the network stack, although exact details of the flaw [...]

Beware! Fully-Functional Released Online for SAP Solution Manager Flaw
23 January 2021

Cybersecurity researchers have warned of a publicly available fully-functional exploit that could be used to target SAP enterprise software. The exploit leverages a vulnerability, tracked as CVE-2020-6207, that stems from a missing authentication check in SAP Solution Manager (SolMan) version 7.2 SAP SolMan is an application management and administration solution that offers end-to-end [...]

Exclusive: SonicWall Hacked Using 0-Day Bugs In Its Own VPN Product
23 January 2021

SonicWall, a popular internet security provider of firewall and VPN products, on late Friday disclosed that it fell victim to a coordinated attack on its internal systems. The San Jose-based company said the attacks leveraged zero-day vulnerabilities in SonicWall secure remote access products such as NetExtender VPN client version 10.x and Secure Mobile Access (SMA) that are used to provide [...]

Sharing eBook With Your Kindle Could Have Let Hackers Hijack Your Account
22 January 2021

Amazon has addressed a number of flaws in its Kindle e-reader platform that could have allowed an attacker to take control of victims' devices by simply sending them a malicious e-book. Dubbed "KindleDrip," the exploit chain takes advantage of a feature called "Send to Kindle" to send a malware-laced document to a Kindle device that, when opened, could be leveraged to remotely execute arbitrary [...]

Missing Link in a 'Zero Trust' Security Model—The Device You're Connecting With!
22 January 2021

Like it or not, 2020 was the year that proved that teams could work from literally anywhere. While terms like "flex work" and "WFH" were thrown around before COVID-19 came around, thanks to the pandemic, remote working has become the defacto way people work nowadays. Today, digital-based work interactions take the place of in-person ones with near-seamless fluidity, and the best part is that [...]

MrbMiner Crypto-Mining Malware Links to Iranian Software Company
21 January 2021

A relatively new crypto-mining malware that surfaced last year and infected thousands of Microsoft SQL Server (MSSQL) databases has now been linked to a small software development company based in Iran. The attribution was made possible due to an operational security oversight, said researchers from cybersecurity firm Sophos, that led to the company's name inadvertently making its way into the [...]

Here's How SolarWinds Hackers Stayed Undetected for Long Enough
22 January 2021

Microsoft on Wednesday shared more specifics about the tactics, techniques, and procedures (TTPs) adopted by the attackers behind the SolarWinds hack to stay under the radar and avoid detection, as cybersecurity companies work towards getting a "clearer picture" of one of the most sophisticated attacks in recent history. Calling the threat actor "skillful and methodic operators who follow [...]

Importance of Application Security and Customer Data Protection to a Startup
21 January 2021

When you are a startup, there are umpteen things that demand your attention. You must give your hundred percent (probably even more!) to work effectively and efficiently with the limited resources. Understandably, the application security importance may be pushed at the bottom of your things-to-do list. One other reason to ignore web application protectioncould be your belief that only large [...]

Hackers Accidentally Expose Passwords Stolen From Businesses On the Internet
21 January 2021

A new large-scale phishing campaign targeting global organizations has been found to bypass Microsoft Office 365 Advanced Threat Protection (ATP) and steal credentials belonging to over a thousand corporate employees. The cyber offensive is said to have originated in August last year, with the attacks aimed specifically at energy and construction companies, said researchers from Check Point [...]

Google Details Patched Bugs in Signal, FB Messenger, JioChat Apps
20 January 2021

In January 2019, a critical flaw was reported in Apple's FaceTime group chats feature that made it possible for users to initiate a FaceTime video call and eavesdrop on targets by adding their own number as a third person in a group chat even before the person on the other end accepted the incoming call. The vulnerability was deemed so severe that the iPhone maker removed the FaceTime group [...]

Episode 200: Sakura Samurai Wants To Make Hacking Groups Cool Again. And: Automating Our Way Out of PKI Chaos
22 January 2021

In this episode of the podcast (#200), sponsored by Digicert: John Jackson, founder of the group Sakura Samurai talks to us about his quest to make hacking groups cool again. Also: we talk with Avesta Hojjati of the firm Digicert about the challenge of managing a growing population of digital certificates and how automation may be an answer. The...Read the whole entry... » Related StoriesEpisode 195: Cyber Monday Super Deals Carry Cyber RiskEpisode 198: Must Hear Interviews from 2020DHS Looking Into Cyber Risk from TCL Smart TVs [...]

Researchers Test UN’s Cybersecurity, Find Data on 100k
11 January 2021

Independent security researchers testing the security of the United Nations were able to compromise public-facing servers and a cloud-based development account for the U.N. and lift data on more than 100,000 staff and employees, according to a report released Monday. The post Researchers Test UN’s Cybersecurity, Find Data on 100k appeared first...Read the whole entry... »Related StoriesPodcast Episode 189: AppSec for Pandemic Times, A Conversation with GitLab Security VP Jonathan HuntEpisode 199 COVID’s Other Legacy: Data Theft and Enterprise InsecurityEpisode 197: The Russia Hack Is A 5 Alarm Fire | Also: Shoppers Beware! [...]

Episode 199 COVID’s Other Legacy: Data Theft and Enterprise Insecurity
8 January 2021

In this episode of the podcast (#199), sponsored by LastPass, we talk with Shareth Ben of Securonix about how massive layoffs that have resulted from the COVID pandemic put organizations at far greater risk of data theft. In our second segment, we’re joined by Barry McMahon, a Senior Global Product Marketing Manager at LogMeIn, to talk about...Read the whole entry... » Related StoriesEpisode 197: The Russia Hack Is A 5 Alarm Fire | Also: Shoppers Beware!Episode 190: 20 Years, 300 CVEs. Also: COVID’s Lasting Security LessonsEpisode 194: What Happened To All The Election Hacks? [...]

Episode 198: Must Hear Interviews from 2020
31 December 2020

Trying times have a way of peeling back the curtains and seeing our world with new eyes. We The post Episode 198: Must Hear Interviews from 2020 appeared first on The Security Ledger. Related StoriesEpisode 195: Cyber Monday Super Deals Carry Cyber RiskDHS Looking Into Cyber Risk from TCL Smart TVsEpisode 197: The Russia Hack Is A 5 Alarm Fire | Also: Shoppers Beware! [...]

Update: Neopets Is Still A Thing And Its Exposing Sensitive Data
28 December 2020

Neopets, the virtual pets website has exposed a wide range of sensitive data online including information that might be used to identify site users, security researchers report. The post Update: Neopets Is Still A Thing And Its Exposing Sensitive Data appeared first on The Security Ledger. Related StoriesAmid Security Concerns: to Zoom or not to Zoom?Researchers Test UN’s Cybersecurity, Find Data on 100kEpisode 168: Application Security Debt is growing and Securing Web Apps in the Age of IoT [...]

Update: DHS Looking Into Cyber Risk from TCL Smart TVs
22 December 2020

The acting head of the U.S. Department of Homeland Security said the agency was assessing the cyber risk of smart TVs sold by the Chinese electronics giant TCL, following reports that the devices may give the company "back door" access to deployed sets. The post Update: DHS Looking Into Cyber Risk from TCL Smart TVs appeared first on The Security...Read the whole entry... »Related StoriesEpisode 195: Cyber Monday Super Deals Carry Cyber RiskTV Maker TCL Denies Back Door, Promises Better ProcessSecurity Holes Opened Back Door To TCL Android Smart TVs [...]

Episode 197: The Russia Hack Is A 5 Alarm Fire | Also: Shoppers Beware!
18 December 2020

In this podcast, sponsored by LastPass, former U.S. CISO Greg Touhill joins us to talk about news of a vast hack of U.S. government networks, which he calls a "five alarm fire" reportedly set by Russia. The post Episode 197: The Russia Hack Is A 5 Alarm Fire | Also: Shoppers Beware! appeared first on The Security Ledger. Related StoriesEpisode 199 COVID’s Other Legacy: Data Theft and Enterprise InsecurityEpisode 194: What Happened To All The Election Hacks?Episode 196: Building the Case Against Sandworm with Cisco Talos [...]

Episode 196: Building the Case Against Sandworm with Cisco Talos
10 December 2020

Cisco's Matt Olney, the Director of Talos Threat Intelligence and Interdiction and Craig Williams, the Talos Director of Outreach about the case against The post Episode 196: Building the Case Against Sandworm with Cisco Talos appeared first on The Security Ledger. Related StoriesEpisode 197: The Russia Hack Is A 5 Alarm Fire | Also: Shoppers Beware!Episode 194: What Happened To All The Election Hacks?Episode 190: 20 Years, 300 CVEs. Also: COVID’s Lasting Security Lessons [...]

Episode 195: Cyber Monday Super Deals Carry Cyber Risk
3 December 2020

While many organizations think the notion of keyboards, monitors and other hardware "spying" on them as the stuff of "James Bond" movies, Yossi Appleboum of Sepio Systems says that the threat is real - and much more common that either companies or consumers are aware. The post Episode 195: Cyber Monday Super Deals Carry Cyber Risk appeared first...Read the whole entry... » Related StoriesDHS Looking Into Cyber Risk from TCL Smart TVsEpisode 198: Must Hear Interviews from 2020TV Maker TCL Denies Back Door, Promises Better Process [...]

Containers Complicate Compliance (And What To Do About It)
30 November 2020

If you work within the security industry, compliance is seen almost as a dirty word. You have likely run into situations like that which @Nemesis09 describes below. Here, we see it’s all too common for organizations to treat testing compliance as a checkbox exercise and to thereby view compliance in a way that goes against its entire purpose....Read the whole entry... »Related StoriesResearchers Test UN’s Cybersecurity, Find Data on 100kEpisode 199 COVID’s Other Legacy: Data Theft and Enterprise InsecurityEpisode 197: The Russia Hack Is A 5 Alarm Fire | Also: Shoppers Beware! [...]

Super Bowl 2021 won’t stream in 4K, but these TV deals are still worth it
23 January 2021

Image: Vizio In news that’s likely to be devastating to people who are looking for any and all reasons to upgrade their TV, CBS announced that Super Bowl LV won’t be broadcast in 4K HDR. The decision was made because of complications caused by the pandemic. This likely isn’t going over too well with all of the TV manufacturers that use the Super Bowl as the moment to clear out 2020 models at a big discount. But there are other reasons to seize these deals while they’re around. There’s more 4K content than ever, with HBO Max’s Wonder Woman 1984… [...]

Radio and TV host Larry King dies at 87
23 January 2021

Photo by: Peter Kramer/NBC/NBC Newswire/NBCUniversal via Getty Images Longtime TV and radio host Larry King died Saturday at Cedars-Sinai Medical Center in Los Angeles. He was 87. Ora Media, which King co-founded in 2012, confirmed the news in a tweet to the @KingsThings Twitter account. A cause of death was not immediately available Saturday, but he had reportedly been hospitalized recently with COVID-19. “Larry always viewed his interview subjects as the true stars of his programs,” the statement from Ora reads. “Whether he was interviewing a U.S. president, foreign leader, celebrity, scandal-ridden personage, or an everyman, Larry liked to ask… [...]

Parkinson’s meds are hard to grab, so TikTok users crowdsourced a solution
23 January 2021

Brian Alldridge’s pill bottle design. | Image: Brian Alldridge Stitching together a pill bottle prototype Continue reading… [...]

Microsoft backtracks on Xbox Live Gold price hike
23 January 2021

Illustration by Alex Castro / The Verge Microsoft has reversed its controversial Xbox Live price increase. The company announced a price hike on Friday that would have doubled the cost of a yearly subscription to the service, which is required to play games online on Xbox consoles, to $120 for many users. Now, though, Microsoft says the price will stay the same. Beyond that, Microsoft has decided to bring Xbox Live in line with Sony and Nintendo’s online services by dropping the subscription requirement for free-to-play games. Popular free-to-play titles like Fortnite are playable on PlayStation consoles and the Nintendo… [...]

SpaceX is sparring with a Texas oil company to drill for natural gas
23 January 2021

SpaceX is locked in a legal fight with a Texas oil company for a plot of land it wants to use to drill for natural gas, according to public records. The 806-acre site in southern Texas sits near SpaceX’s Starship facilities, a sprawling testing ground for its methane-fueled Raptor rocket engine. Tim George, an attorney for the SpaceX subsidiary fighting for the land, was quoted by Bloomberg News, which first reported the legal despute, as saying methane reserves from the land will be used “in connection with their rocket facility operations.” In filings with a Texas energy regulator, the SpaceX… [...]

Cyberpunk 2077’s first big patch is out now, and it’s packed with bug fixes
22 January 2021

Image: CD Projekt Red Cyberpunk 2077’s first big update is available now, and it’s packed with bug fixes for the notoriously buggy game. In a tweet, developer CD Projekt Red also said that the update “lays the groundwork” for future patches. Patch 1.1 is out on PC, consoles and Stadia!In this update, which lays the groundwork for the upcoming patches, we focused on various stability improvements and bugfixes. List of changes: https://t.co/NlSEKjsax7 pic.twitter.com/WjLcD0SaZk— Cyberpunk 2077 (@CyberpunkGame) January 22, 2021 The 1.1 patch arrives more than a month after Cyberpunk 2077’s rocky launch. The game has been plagued with bugs and… [...]

GameStop stock halts trading after Reddit drama
22 January 2021

Photo by Johnny Louis/Getty Images Trading in stock of video game retailer GameStop (GME) was halted briefly Friday, as it soared more than 70 percent, due partly to the enthusiastic support of a group of Reddit day traders. The stock is up more than 250 percent year to date, rising sharply last week after GameStop announced Chewy CEO Ryan Cohen was joining its board, CNBC reported. Short-seller Citron Research predicted the price would drop, but members of the Reddit board r/wallstreetbets, who had been generating interest in the stock, criticized Citron on the Reddit message board and continued praising the… [...]

US Defense Intelligence Agency admits to buying citizens’ location data
22 January 2021

Illustration by Alex Castro / The Verge An intelligence agency has just confirmed that the US government does indeed buy location data collected by its citizens’ smartphones. In a memo sent to Sen. Ron Wyden (D-OR) and obtained by The New York Times, the Defense Intelligence Agency (DIA) admitted that it buys location data from brokers — and that the data isn’t separated by whether a person lives in the US or outside of it. Data brokers are companies that, as the name implies, collect and sell people’s information. The companies collect people’s location information (and much more) by paying… [...]

Tony Hawk’s Pro Skater 1 + 2 remake studio will now focus exclusively on Blizzard games
22 January 2021

Vicarious Visions, the studio that developed Crash Bandicoot N. Sane Trilogy and the remake for Tony Hawk’s Pro Skater 1 + 2, has been reassigned within Activision Blizzard, GamesIndustry.biz reports. Moving forward, the studio’s team of about 200 people will now be “fully dedicated to existing Blizzard games and initiatives.” That means for any games Vicarious Visions works on in the future, it will not serve as the lead development studio. “After collaborating with Vicarious Visions for some time and developing a great relationship, Blizzard realized there was an opportunity for [Vicarious Visions] to provide long-term support,” a Blizzard spokesperson… [...]

Go read this story about COVID-19 vaccine fights on Facebook
22 January 2021

Illustration by Alex Castro / The Verge Adequate COVID-19 vaccine distribution still seems like the greatest obstacle to slowing the spread of the pandemic, but if you’re looking to worry about the other threat that’s still blocking progress — an unwillingness to take the vaccine at all — and the creative efforts on Facebook that are going into stopping it, you should go read this FiveThirtyEight report. Facebook’s taken steps to combat misinformation related to the pandemic, removing false claims about COVID-19 vaccines and banning ads that discourage vaccine use, but reporter Kaleigh Rogers highlights some of the more direct… [...]

The Best Mouse for Every Kind of Gamer
23 January 2021

Whether you’re into esports or casual fragging, these are the greatest gaming mice we’ve tested. [...]

The FTC Cracks Down on Bot-Wielding Ticket Scalpers
23 January 2021

Plus: A security company creeper, Biden’s cyberteam, and the rest of this week’s security news. [...]

Chrome and Edge Want to Help Solve Your Password Problems
23 January 2021

The line between browsers and password managers is blurring. [...]

A New Project Maps the Pacific Coast's Critical Kelp Forests
23 January 2021

Using sea charts and satellites, the effort will trace how the kelp beds are changing in response to global warming and commercial harvesting. [...]

The Best Laptop Stands to Save Your Neck
23 January 2021

Help your back and posture by raising your computer screen up to eye level. [...]

How Do You Define Electric Field, Voltage, and Current?
23 January 2021

And what does that mean for making a little wire LED man light up? [...]

The 13 Best Weekend Deals on Laptops, Smartwatches, and More
23 January 2021

Now is a good time to grab some sweet Switch games, Apple’s Magic Keyboard, or an Apple Watch Series 6 at a discounted price. [...]

A Fight Over GameStop’s Soaring Stock Turns Ugly
23 January 2021

The denizens of the WallStreetBets subreddit helped push the flailing stock to dizzying heights—while a short seller alleged an accompanying harassment campaign. [...]

Biden Gets to Work, Vaccine Guidelines Change, and More
22 January 2021

Catch up on the most important updates from this week. [...]

Let Fire Stations and EMS Crews Administer Covid Vaccines
22 January 2021

They're more trusted and better distributed than pharmacies, and they're built for emergencies. [...]

  • Twitter
  • Facebook
  • Instagram
  • LinkedIn
  • Google Play
  • iTunes
  • Spotify
  • Stitcher Radio
  • TuneIn
Creative Commons License
Except where otherwise noted, all works on this website are property of Raymond Tec and are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Privacy Policy.
We use cookies to offer you a better browsing experience, analyze site traffic, personalize content, and serve targeted ads. Read how we use cookies and how you can control them in our Privacy Policy. By using our site, you consent to our use of cookies.Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.