-
Royal Ransomware Targets US Healthcare
PRIVACY PRIVACY Requested ransom payment demands ranged from $250,000 to over $2m Read More
-
Can Thieves Steal Identities With Only a Name and Address?
PRIVACY PRIVACY Can thieves steal identities with only a name and address? In short, the answer is “no.” Which is a good thing, as your name and address are in fact part of the public record. Anyone can get a hold of them. However, because they are public information, they are still tools that identity thieves can use. If you…
-
Apple Is Finally Encrypting iCloud Backups
PRIVACY PRIVACY After way too many years, Apple is finally encrypting iCloud backups: Based on a screenshot from Apple, these categories are covered when you flip on Advanced Data Protection: device backups, messages backups, iCloud Drive, Notes, Photos, Reminders, Safari bookmarks, Siri Shortcuts, Voice Memos, and Wallet Passes. Apple says the only “major” categories not…
-
Transitive Dependencies Account for 95% of Bugs
PRIVACY PRIVACY Endor Labs warns of dangerous complexities in open source Read More
-
North Korean Hackers Impersonate Researchers to Steal Intel
PRIVACY PRIVACY Report associates new intelligence-gathering tactic with Kimsuky group Read More
-
14 lessons CISOs learned in 2022
PRIVACY PRIVACY We’re about to finish yet another erratic year, in which Elon Musk bought Twitter, Russia invaded Ukraine, and many workers returned to their offices. We also saw, for the first time, a security chief sentenced to prison for concealing a data breach. These events and many more have changed the business landscape and…
-
Researchers Find 63 Zero-Day Bugs at Latest Pwn2Own
PRIVACY PRIVACY Competition awards winning participants nearly $1m Read More
-
Friday Squid Blogging: China Bans Taiwanese Squid Imports
PRIVACY PRIVACY Today I have some squid geopolitical news. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Read More
-
Hacking Trespass Law
PRIVACY PRIVACY This article talks about public land in the US that is completely surrounded by private land, which in some cases makes it inaccessible to the public. But there’s a hack: Some hunters have long believed, however, that the publicly owned parcels on Elk Mountain can be legally reached using a practice called corner-crossing.…
-
Truebot Malware Activity Increases With Possible Evil Corp Connections
PRIVACY PRIVACY The campaigns observed by Cisco Talos have resulted in the creation of two botnets Read More