securitymagazine.comThe Government Communications Security Bureau from New Zealand is encouraging public and private sector leaders to get more connected with their organizations’ cybersecurity governance....

securitymagazine.comThe Cybersecurity and Infrastructure Security Agency (CISA) recently published an alert on the Dridex malware, as the result of recent collaboration between the Department of the Treasury Financial Sector Cyber Information Group (CIG) and the Department of the Treasury’s Financial Crimes Enforcement Network (FinCEN) to identify and share information with the financial services sector....

securitymagazine.comThe U.S. State Department, in partnership with the FBI, announced a reward of up to $5 million under the Transnational Organized Crime Rewards Program for information leading to the arrest and/or conviction of Russian nationals accused of serious cyber crimes. ...

securitymagazine.comThe Information Security Forum (ISF) has announced the organization’s outlook for the top global security threats that businesses will face in 2020....

securitymagazine.comIn 2019, the Port of Seattle began to prepare for federal and private sector implementation of facial recognition technology for passenger processing at Port facilities....

securitymagazine.comAs many as 68.4 percent—or almost 7 out of 10—cameras are currently running out of date firmware. ...

securitymagazine.comBoth disaster recovery and business continuity are answers to what happens when entropy strikes, things fall apart, and business is interrupted. Resilience is strategy using a set of tools and approaches that make it harder for things to fall apart, and easier and faster to put them back together when they do....

securitymagazine.comBenjamin Franklin once said, “By failing to prepare, you are preparing to fail.” These sage words unfortunately describe the dilemma many companies are facing on a daily basis with increasing frequency. Whether because of a lack of resources to commit to cybersecurity or the C-suite’s reluctance to do things differently, companies are suffering from a rash of bad actors seeking to profit from cyberattacks and the loss of data because of negligent handling by insiders....

securitymagazine.comJust in 2018, there were 500 million personal records stolen. How many records will be stolen by year’s end? According to the RiskBased Data Breach QuickView Report 2019 Q3, at the end of September, there were 5,183 breaches, exposing 7.9 billion records. Compared to the 2018 Q3 report, the total number of breaches was up 33.3 percent and the total number of records exposed more than doubled, up 112 percent....

securitymagazine.comResearch from iovation shows a 29-percent increase in suspected online retail fraud during the start of the 2019 holiday shopping season compared to the same period in 2018, and a 60-percent increase in suspected e-commerce fraud during the same period from 2017 to 2019....

securitymagazine.comThe International Organisation for Standardisation (ISO) announced a new set of international standards that covers the quality, safety, security and etiquette for the operation of commercial drones....

securitymagazine.comAn LA Dodgers fan has filed a lawsuit against the team for alleged inadequate security and a lack of uniformed Los Angeles police officers....

securitymagazine.comFor the first time, Uber has released a safety report about its rides in the US that includes all of 2018 and part of 2017....

securitymagazine.comU.S. Senator Brian Schatz (D-Hawai‘i) and 16 senators have reintroduced legislation to protect people’s personal data online....

threatpost.comHackerOne has paid out $20,000 to a bounty hunter who discovered a session cookie issue, due to "human error," on the bug bounty platform....

threatpost.comAuthorities cracked down on cybercrime group Evil Corp. with sanctions and charges against its leader, known for his lavish lifestyle....

threatpost.comNames, addresses, phone numbers, call and text message records and account PINs were all caught up in a cloud misconfiguration....

threatpost.comSecurity experts say the incident shows that cybercriminals are using ransomware to hit companies where it hurts....

threatpost.comResearcher discovered a MacOS trojan hiding behind a fake crypto trading platform believed to be the work of the state-sponsored North Korean hackers behind WannaCry....

threatpost.comFacebook has paid over $4 million to victims to reimburse them for the unauthorized ads purchased using their ad accounts....

threatpost.comIn a coffee-shop scenario, attackers can hijack "secure" VPN sessions of those working remotely, injecting data into their TCP streams....

threatpost.comIn this past week, the authorities have cracked down on various BEC scams and cybercrime gangs....

Weiter