By Lindsey O’Donnell

The feature, criticized for “undisclosed data-mining,” is only the latest privacy faux pas for Zoom this month. …read more

Source:: Threat Post


Print pagePDF pageEmail page

By Tara Seals

Old phishing kits are being pressed into service to keep up with the unprecedented volume of new scams that exploit the pandemic. …read more

Source:: Threat Post


Print pagePDF pageEmail page

By Ionut Arghire

Google, Microsoft and Mozilla are delaying plans to disable support for the Transport Layer Security (TLS) 1.0 and 1.1 protocols in Chrome, Edge, Internet Explorer, and Firefox.

read more

…read more

Source:: securityweek


Print pagePDF pageEmail page

How is the coronavirus pandemic shaping the business operations of criminal networks? Tracking how the market is changing in real time, Digital Shadows has observed that some operations have quickly curtailed their activity while the majority of malicious actors are capitalizing on the crisis, noting, for example, that an increase in online transactions has potentially bolstered success rates for credit and debit card fraud. …read more

Source:: Security magazin


Print pagePDF pageEmail page

By Tara Seals

More zero-day exploits coming up for sale by NSO Group and others is democratizing the attack vector and placing them within reach of less sophisticated attackers. …read more

Source:: Threat Post


Print pagePDF pageEmail page

By Ionut Arghire

A security researcher has discovered over 25 different potential vulnerabilities in Windows, including some that could lead to elevation of privileges.

read more

…read more

Source:: securityweek


Print pagePDF pageEmail page

By Eduard Kovacs

Law firm Morgan & Morgan announced on Thursday that it has filed a class action lawsuit against Marriott over the recently disclosed data breach that has impacted as many as 5.2 million individuals.

read more

…read more

Source:: securityweek


Print pagePDF pageEmail page

In spite of this cyber war and in an effort to be first to market, many companies still rush their products out while ignoring proper security integration during development which can lead to disastrous side effects for businesses. Costing them valuable data, reputation, money and time to amend their product weaknesses. Companies can spend a great deal of time and money developing security patches, repeatedly rolling back and implementing updates, and buying other technologies to secure their own offering. This cycle can potentially continue for years releasing cures to the latest aliments while fearing the next hit. …read more

Source:: Security magazin


Print pagePDF pageEmail page

Often, the significance of backing up your company’s data is diminished by the hundreds of other things you must do as a small business owner to simply keep the company running day-to-day. Unfortunately, what most small business owners fail to realize is that the lack of an adequate data backup can cause the doors of a business to close more often than you’d think. For this reason, it is crucial that every company has at least one efficient and effective method of data backup in place. …read more

Source:: Security magazin


Print pagePDF pageEmail page

Looking back at cybercrime incidents of the past 10 years, only the questions of “if” and “when” remain. “If” a business has no active cybersecurity policy and processes even just hundreds of rich customer records, “when” becomes soon enough. For the past 10 years, at least eight large-scale data breaches per year have trembled economies. You’d imagine that as business owners, we would have learned the immense value of the digital data we hold. The Ponemon Institute says that just in the US, the average size of a data breach is 25,575 records with a cost of $150 per record …read more

Source:: Security magazin


Print pagePDF pageEmail page