-
Three Extradited from UK to US on $5m BEC Charges
PRIVACY PRIVACY Nigerian nationals accused of targeting US universities Read More
-
Everything you need to know about the new features in VSS & MVP
PRIVACY PRIVACY This blog was written by an independent guest blogger. Since AT&T launched its Vulnerability Scanning Service (VSS) in 2012, in partnership with DDI/HelpSystems, over 30 million devices have been scanned. The VSS provides vulnerability management services that help organizations identify vulnerabilities on their network and manage their swift remediation. Similarly, the AT&T Managed…
-
New Study Reveals Serious Cyber Insurance Shortfalls
PRIVACY PRIVACY Most companies do not have enough coverage to recover from ransomware Read More
-
3 ways China’s access to TikTok data is a security risk
PRIVACY PRIVACY The short-video platform TikTok has come under fire in recent months. Both lawmakers and citizens in the U.S. have questioned its data collection practices and potential ties to the Chinese state. The concerns have deepened after Buzzfeed published a report saying that data of some American users had been repeatedly accessed from China.…
-
Top 5 security risks of Open RAN
PRIVACY PRIVACY When a cell phone or other mobile device connects to the nearest cell tower, the communication takes place over something called a RAN — a radio access network. From the cell tower, the signal is then routed to a fiber or wireless backhaul connection to the core network. RANs RANs are proprietary to…
-
Critical Infrastructure at Risk as Thousands of VNC Instances Exposed
PRIVACY PRIVACY Researchers find many deployments have authentication disabled Read More
-
Upcoming Speaking Engagements
PRIVACY PRIVACY This is a current list of where and when I am scheduled to speak: I’m speaking as part of a Geneva Centre for Security Policy course on Cyber Security in the Context of International Security, online, on September 22, 2022. I’m speaking at IT-Security INSIDE 2022 in Zurich, Switzerland, on September 22, 2022.…
-
Friday Squid Blogging: SQUID Acronym for Making Conscious Choices
PRIVACY PRIVACY I think the U is forced: SQUID consists of five steps: Stop, Question, Understand, Imagine, and Decide. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Read More
-
New exploits can bypass Secure Boot and modern UEFI security protections
PRIVACY PRIVACY Two teams of researchers have revealed vulnerabilities this week in Unified Extensible Firmware Interface (UEFI) implementations and bootloaders that could allow attackers to defeat the secure boot defenses of modern PCs and deploy highly persistent rootkits. Researchers from firmware and hardware security firm Eclypsium published a report on vulnerabilities they found in three…
-
Meta Tests Encrypted Backups and End-to-End Encryption in Facebook Messenger
PRIVACY PRIVACY Meta is also introducing an encrypted backup feature called Secure Storage Read More