How WiCyS is taking on security’s image problem

Read Time:40 Second

The way Janell Straach sees it, the cybersecurity profession has an image problem, and it’s keeping women out of the field at a time when the industry needs all the workers it can get.

Straach says female students, when asked to describe cybersecurity work, continue to think of a guy in a hoodie alone at a keyboard. They see disproportionately few women on the job, particularly in the senior ranks. And some still get harassed at conferences, despite codes of conduct meant to discourage inappropriate behavior.

Granted, the first image isn’t accurate and hostile experiences aren’t the norm, Straach says. Yet both perceptions persist.

And the sense of too few women in the field? That, Straach says, is actually true.

To read this article in full, please click here

Read More

Smashing Security podcast #267: Virtual kidnapping, two helipads, and a naughty Apple employee

Read Time:18 Second

A Russian bank tells its customers to stop installing security updates, an Apple employee ends up in hot water, and learn our tips to avoid being virtually kidnapped.

All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Anna Brading.

Read More

Simplify your security with Forcepoint ONE

Read Time:19 Second

Graham Cluley Security News is sponsored this week by the folks at Forcepoint. Thanks to the great team there for their support! Remember the days when you thought an antivirus was all you needed to stay safe? Of course, cybersecurity has never truly been that simple. As cyberthreats and business operations have grown more complex, … Continue reading “Simplify your security with Forcepoint ONE”

Read More

USN-5345-1: Thunderbird vulnerabilities

Read Time:1 Minute, 20 Second

Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context,
an attacker could potentially exploit these to cause a denial of service,
bypass security restrictions, obtain sensitive information, cause
undefined behaviour, spoof the browser UI, or execute arbitrary code.
(CVE-2022-22759, CVE-2022-22760, CVE-2022-22761, CVE-2022-22763,
CVE-2022-22764, CVE-2022-26381, CVE-2022-26383, CVE-2022-26384)

It was discovered that extensions of a particular type could auto-update
themselves and bypass the prompt that requests permissions. If a user
were tricked into installing a specially crafted extension, an attacker
could potentially exploit this to bypass security restrictions.
(CVE-2022-22754)

It was discovered that dragging and dropping an image into a folder could
result in it being marked as executable. If a user were tricked into
dragging and dropping a specially crafted image, an attacker could
potentially exploit this to execute arbitrary code. (CVE-2022-22756)

It was discovered that files downloaded to /tmp were accessible to other
users. A local attacker could exploit this to obtain sensitive
information. (CVE-2022-26386)

A TOCTOU bug was discovered when verifying addon signatures during
install. A local attacker could potentially exploit this to trick a
user into installing an addon with an invalid signature.
(CVE-2022-26387)

An out-of-bounds write by one byte was discovered when processing
messages in some circumstances. If a user were tricked into opening a
specially crafted message, an attacker could potentially exploit this
to cause a denial of service. (CVE-2022-0566)

Read More

News, Advisories and much more

Exit mobile version