Airport Facial Recognition, How Abusers Exploit Basic Apps, and More News

Credit to Author: Alex Baker-Whitcomb| Date: Tue, 02 Jul 2019 21:53:24 +0000
Catch up on the most important news from today in two minutes or less.
Read MoreRSS Reader for Computer Security Articles

Credit to Author: Alex Baker-Whitcomb| Date: Tue, 02 Jul 2019 21:53:24 +0000
Catch up on the most important news from today in two minutes or less.
Read MoreCredit to Author: Ghanshyam More| Date: Wed, 03 Jul 2019 07:18:00 +0000
Ransomware authors keep experimenting with the development of payload in various dimensions. In the timeline of ransomware implementations, we have seen its evolution from a simple screen locker to multi-component model for file encryption, from novice approach to a sophisticated one. The Ransomware as a Tool has evolved in wild…
Read More
Credit to Author: Andy Greenberg| Date: Tue, 02 Jul 2019 14:50:40 +0000
To prove a point about common location-sharing apps, I asked my wife to use them to spy on me.
Read More
Credit to Author: Allie Funk| Date: Tue, 02 Jul 2019 13:00:00 +0000
Opinion: We’ve been assured that facial recognition technology is secure, reliable, and accurate. That’s far from certain.
Read More
Credit to Author: Lily Hay Newman| Date: Mon, 01 Jul 2019 23:49:45 +0000
Almost every month in 2019 so far has seen reports of a local government falling prey to ransomware, but this series of attacks belies an even broader threat.
Read More
Credit to Author: Evan Schuman| Date: Mon, 01 Jul 2019 05:47:00 -0700
Ready for the mobile security news that IT doesn’t want to hear about but needs to? When security firm Positive Technologies started pen-testing various mobile apps, security holes were rampant.
We’ll plunge into the details momentarily, but here’s the upshot: “High-risk vulnerabilities were found in 38 percent of mobile applications for iOS and in 43 percent of Android applications” and “most cases are caused by weaknesses in security mechanisms — 74 percent and 57 percent for iOS and Android apps, respectively, and 42 percent for server-side components — because such vulnerabilities creep in during the design stage, fixing them requires significant changes to code.”

Credit to Author: Woody Leonhard| Date: Mon, 01 Jul 2019 04:36:00 -0700
How many bugs could a WinPatcher patch, if a WinPatcher could patch bugs?
Ends up that June’s one of the buggiest patching months in recent memory – lots of pesky little critters, and the ones acknowledged by Microsoft led to even more patches later in the month.
In June, we saw eight single-purpose Windows patches whose sole mission is to fix bugs introduced in earlier Windows patches. I call them silver bullets – all they do is fix earlier screw-ups. If you install security patches only, these eight have to be installed manually to fix the bugs introduced earlier. It’s a congenital defect in the patching regimen – bugs introduced by security patches get fixed by non-security “optional” patches, while waiting for the next month’s cumulative updates to roll around.

Credit to Author: Brian Barrett| Date: Sat, 29 Jun 2019 13:00:00 +0000
Robert Mueller will testify, malware wrecks IoT, and more of the week’s top security news.
Read More