Warns of inconsistent outcomes for customers who report fraud
Daily Archives: October 31, 2023
Half of Execs Request Security Bypass Over Past Year
CVE-2015-2968
LINE@ for Android version 1.0.0 and LINE@ for iOS version 1.0.0 are vulnerable to MITM (man-in-the-middle) attack since the application allows non-SSL/TLS communications. As a result, any API may be invoked from a script injected by a MITM (man-in-the-middle) attacker.
CVE-2015-0897
LINE for Android version 5.0.2 and earlier and LINE for iOS version 5.0.0 and earlier are vulnerable to MITM (man-in-the-middle) attack since the application allows non-SSL/TLS communications. As a result, any API may be invoked from a script injected by a MITM (man-in-the-middle) attacker.
Cyber Skills Gap Reaches 4 Million, Layoffs Hit Security Teams
ISC2’s CEO says the c-suite appears to be more concerned with economic risk than cyber risk
Protect yourself against digital draculas this Halloween: Avoid AI-driven cyber trickery
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.
As Cybersecurity Awareness Month winds down and you prepare for Halloween festivities like trick-or-treating and pumpkin carving, don’t forget to protect against real-world monsters: artificial intelligence-driven cyber threats. Here are a few steps that may help ward off such threats like garlic protects against Dracula: Taking precautionary steps against them may keep the real monsters at bay!
1. Be wary of dubious emails
Poor language and spelling were once clear indicators that something was amiss with emails, but thanks to artificial intelligence, fraudsters can now use scammer accounts that appear authentic but contain harmful links or attachments authored by actual individuals but which actually contain malicious software code. Be wary of any email that requests sensitive data or seems too good to be true – be especially wary when asking you for sensitive details! Do not open links or download anything until certain that its originator can be confirmed as reliable.
2. Be wary of deep fake scams
Imagine having an online conversation with the ghost of one of your closest friends that sounded exactly the same; that is what deep fakes look like and they make even more convincing by AI. Deep fakes are forms of social engineering wherein scammers pose as trusted contacts to lure victims into divulging personal or financial data or conducting transactions – any time someone requests personal details online it is best practice to check their identity first before providing personal data or financial transactions.
3. Don’t let imitators scare you
Some forms of artificial intelligence have the ability to mimic human voices convincingly, making con artists appear legitimate by pretending they represent a loved one or organization such as banks – inducing you to give over information or money they do not deserve in return. If anyone calls and requests personal details from you, simply hang up immediately before checking with company mainline to be certain it was legit caller before providing anything at all.
4. Be wary of chatbots or messages sent via artificial intelligence (AI).
Scammers use chatbots and automated systems such as AI to pose as legitimate businesses; scammers then send you requests asking for sensitive data such as credit card details. Whenever receiving any request that appears suspicious, be sure to investigate further by verifying who sent it first.
5. Maintain a healthy mistrust and curiosity
You should remain cautious of online offers and messages in much the same way you might question whether that haunted house really exists. Stay vigilant in seeking knowledge regarding online safety – many organizations now provide courses designed to teach us to recognize phishing scams more quickly if we equip ourselves with information, which may serve to better defend ourselves against scams online.
While AI is providing unprecedented opportunities, it is also increasing the severity of cyber risks. You may have a more secure time online if you take precautions, learn as much as you can, and make use of security technologies powered by artificial intelligence. You may avoid falling for AI-powered cyber pranks by exercising the same caution you would when collecting candy from strangers on Halloween. Sending best wishes on this spooky holiday.
Please have a look at my Halloween blog from last year.
SEC Charges SolarWinds and CISO With Misleading Investors
Complaint alleges company overstated security posture and understated risks
CVE-2015-20110
JHipster generator-jhipster before 2.23.0 allows a timing attack against validateToken due to a string comparison that stops at the first character that is different. Attackers can guess tokens by brute forcing one character at a time and observing the timing. This of course drastically reduces the search space to a linear amount of guesses based on the token length times the possible characters.
rubygem-rmagick-5.2.0-2.fc37
FEDORA-2023-8dd1a1a2e6
Packages in this update:
rubygem-rmagick-5.2.0-2.fc37
Update description:
A security flaw was found on rubygem-rmagick that Magick::Draw causes memleak. This issue is assigned as CVE-2023-5349. This new rpm fixes this issue.
DSA-5543-1 open-vm-tools – security update
Two security issues have been discovered in the Open VMware Tools, which
could result in privilege escalation.