-
User Alert as Phishing Campaigns Exploit Queen’s Passing
PRIVACY PRIVACY Experts urge the public not to fall for classic scams Read More
-
Cybercrime Forum Admins Steal from Site Users
PRIVACY PRIVACY Report reveals there’s no honor among thieves Read More
-
U.S. government issues guidance for developers to secure the software supply chain: Key takeaways
PRIVACY PRIVACY Software supply chain attacks are on the rise, as cited in the Cloud Native Computing Foundation’s (CNCF’s) Catalog of Supply Chain Compromises. Industry leaders such as the Google, Linux Foundation, OpenSSF, and public sector organizations such as NIST have provide guidance on the topic over the past year or so. The U.S. National…
-
Russia’s cyber future connected at the waist to Soviet military industrial complex
PRIVACY PRIVACY The Center for European Policy Analysis (CEPA) recently published a 38-page study, Russian Cyberwarfare: Unpacking the Kremlin’s Capabilities by two esteemed researchers, Irina Borogan and Andrei Soldatov. The opening premise is that Russia has not demonstrated its cyber warfare adroitness in support of its invasion of Ukraine. Whether the Russians tried, and their…
-
Cybercrime Fears for Children as Cost-of-Living Bites
PRIVACY PRIVACY UK parents concerned about repercussions of soaring inflation Read More
-
ISACA: Ensuring Digital Trust Key to Digital Transformation Success
PRIVACY PRIVACY ISACA’s State of Digital Trust 2022 report highlights increasing importance of digital trust across businesses Read More
-
Smashing Security podcast #289: Printer peeves, health data hangups, and Twitter tussles – with Rory Cellan-Jones
PRIVACY PRIVACY How could your inkjet printer finally help you make some money, why is it so hard to share our health data even if we want to, and what result do you want to see from the Elon Musk vs Twitter bunfight? All this and much more is discussed in the latest edition of…
-
Excess privilege in the cloud is a universal problem, IBM says
PRIVACY PRIVACY Excess privilege granted to cloud identities is a key component in 99% of all security tests performed by IBM’s X-Force Red penetration testing team, according to a report released Wednesday by the company. Both human users and service accounts were consistently found to have more access rights and privileges than they generally need,…
-
Excess privilege in the cloud is a universal security problem, IBM says
PRIVACY PRIVACY Excess privilege granted to cloud identities is a key component in 99% of all security tests performed by IBM’s X-Force Red penetration testing team, according to a report released Wednesday by the company. Both human users and service accounts were consistently found to have more access rights and privileges than they generally need,…
-
Say Hello to Crazy Thin ‘Deep Insert’ ATM Skimmers
PRIVACY PRIVACY A number of financial institutions in and around New York City are dealing with a rash of super-thin “deep insert” skimming devices designed to fit inside the mouth of an ATM’s card acceptance slot. The card skimmers are paired with tiny pinhole cameras that are cleverly disguised as part of the cash machine.…