Top

Tag: Security


Networking, Tech

Senate narrowly rejects plan to require a warrant for Americans’ browsing data

May 13, 2020

Via: Tech Crunch

Senators have narrowly rejected a bipartisan amendment that would have required the government first obtain a warrant before accessing Americans’ web browsing data. The amendment brought by Sens. Ron Wyden (D-OR) and Steve Daines (R-MT) — just seven lines in […]


Attacks & Breaches, Networking Security, Security

Security warning: State-backed hackers are trying to steal coronavirus research

May 5, 2020

Via: ZDnet

State-backed hacking groups are targeting healthcare and other organisations involved in national and international responses to coronavirus pandemic, the UK’s National Cyber Security Centre (NCSC) and the US Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) have […]


Networking Security, Security

Artificial intelligence will be used to power cyber attacks, warn security experts

April 27, 2020

Via: ZDnet

Intelligence and espionage services need to embrace artificial intelligence (AI) in order to protect national security as cyber criminals and hostile nation-states increasingly look to use the technology to launch attacks. The UK’s intelligence and security agency GCHQ commissioned a […]


Attacks & Breaches, Networking Security, Security

Security researcher identifies new APT group mentioned in 2017 Shadow Brokers leak

April 22, 2020

Via: ZDnet

Three years and eight days ago, on April 14, 2017, a mysterious group of hackers known as the Shadow Brokers published a collection of hacking tools that ended up changing the internet forever. Known as the “Lost in Translation” dump, […]


Software, Tech

Microsoft reports new zero-day vulnerability in Windows that is being actively exploited

March 23, 2020

Via: TechSpot

Microsoft posted a new security advisory today (ADV200006), detailing what it’s calling “Type 1 Font Parsing Remote Code Execution Vulnerability.” They have given the vulnerability a “critical” severity rating, which is the highest severity rating Microsoft gives. The flaw seems […]


Networking Security, Security

Why fixing security vulnerabilities in medical devices, IoT is so hard

February 19, 2020

Via: ArsTechnica

When your family opened up that brand-new computer when you were a kid, you didn’t think of all of the third-party work that made typing in that first BASIC program possible. There once was a time when we didn’t have […]


Mobile Security, Networking Security, Security

Presidential campaigns taking email security more seriously–not so much at the local level

February 10, 2020

Via: CSO Online

The 2020 election season got off to what could be a record-setting rocky start with delays in the reporting of the Iowa caucus results due to a poorly developed app. The failure of the mobile IowaReporterApp developed for the Democratic […]


Attacks & Breaches, Networking Security, Security

Why hacking must be addressed in digital privacy policymaking

February 7, 2020

Via: CSO Online

Digital privacy is one side of a two-sided policy coin. Virtually all attention to date has been focused on developing legal and regulatory remedies to address this pervasive public concern. But in doing so, they have devoted little attention to […]


Cloud Infrastructure, Infrastructure

Infrastructure-as-code templates are the source of many cloud infrastructure weaknesses

February 5, 2020

Via: CSO Online

In the age of cloud computing where infrastructure needs to be extended or deployed rapidly to meet ever-changing organizational needs, the configuration of new servers and nodes is completely automated. This is done using machine-readable definition files, or templates, as […]


Federal, Policy

Recent False Claims Act cases a caution to gov’t contractors that skimp on security

February 4, 2020

Via: CSO Online

The False Claims Act (FCA), otherwise known as the “Lincoln Law,” can cost companies that supply goods or services to the federal government millions of dollars if they fail to provide the digital security protections they promise, as two recent […]