Month: July 2018

IndependentKrebs

LifeLock Bug Exposed Millions of Customer Email Addresses

Credit to Author: BrianKrebs| Date: Wed, 25 Jul 2018 22:20:46 +0000

Identity theft protection firm LifeLock — a company that’s built a name for itself based on the promise of helping consumers protect their identities online — may have actually exposed customers to additional attacks from ID thieves and phishers. The company just fixed a vulnerability on its Web site that allowed anyone with a Web browser to index email addresses associated with millions of customer accounts, or to unsubscribe users from all communications from the company. The upshot of this weakness is that cyber criminals could harvest the data and use it in targeted phishing campaigns that spoof LifeLock’s brand. Of course, phishers could spam the entire world looking for LifeLock customers without the aid of this flaw, but nevertheless the design of the company’s site suggests that whoever put it together lacked a basic understanding of Web site authentication and security. The upshot of this weakness is that cyber criminals could harvest the data and use it in targeted phishing campaigns that spoof LifeLock’s brand. Of course, phishers could spam the entire world looking for LifeLock customers without the aid of this flaw, but nevertheless the design of the company’s site suggests that whoever put it together it lacked a basic understanding of authentication and security.

Read More
SecurityTrendMicro

Preparing for Shadow OT: A Hospital Case Study

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Wed, 25 Jul 2018 17:09:51 +0000

The convergence of IT and OT is happening more rapidly than IT expects. Once upon a time, IT was so expensive that enterprises built entire departments to prioritize spending and efficiently manage those costly investments. Now, IT is so inexpensive that any individual who wants IT can buy it (or rent it). This is “Shadow…

The post Preparing for Shadow OT: A Hospital Case Study appeared first on .

Read More
ScadaICSSchneider

Food and Beverage Smart Supply Chains Drive Profits and Ensure Regulatory Compliance

Credit to Author: Michael Jamieson| Date: Wed, 25 Jul 2018 10:00:09 +0000

According to the United Nations, food production will need to grow by as much as 70% by 2050 in order to feed the 9.7 billion people that are expected to… Read more »

The post Food and Beverage Smart Supply Chains Drive Profits and Ensure Regulatory Compliance appeared first on Schneider Electric Blog.

Read More
MalwareBytesSecurity

Trojans: What’s the real deal?

Credit to Author: Christopher Boyd| Date: Wed, 25 Jul 2018 15:40:47 +0000

We take a fresh look at Trojans: the history of the term, the most popular threats over the years, the different types of Trojans, and their relationship with social engineering.

Categories:

Tags:

(Read more…)

The post Trojans: What’s the real deal? appeared first on Malwarebytes Labs.

Read More
SecurityTrendMicro

What financial service providers should know about blockchain: Opportunities and threats

Credit to Author: Trend Micro| Date: Wed, 25 Jul 2018 15:30:51 +0000

It seems that every few years, an advanced and innovative new technology emerges and becomes the next big thing for organizations across different industries. Take the cloud and big data, for example – during their buzzword stage, these concepts were being attached to just about everything in the tech space. Currently, it appears that blockchain…

The post What financial service providers should know about blockchain: Opportunities and threats appeared first on .

Read More