Security

IndependentKrebs

A Year Later, Cybercrime Groups Still Rampant on Facebook

Credit to Author: BrianKrebs| Date: Mon, 08 Apr 2019 19:39:41 +0000

Almost exactly one year ago, KrebsOnSecurity reported that a mere two hours of searching turned up more than 100 Facebook groups with some 300,000 members openly advertising services to support all types of cybercrime, including spam, credit card fraud and identity theft. Facebook responded by deleting those groups. Last week, a similar analysis found some 74 cybercrime groups operating openly on Facebook with more than 385,000 members.

Read More
SecurityTrendMicro

Dallas Start-Ups: Pitch Us Your Ideas for a Smarter Connected World

Credit to Author: Trend Micro| Date: Mon, 08 Apr 2019 13:00:40 +0000

At Trend Micro we’ve spent the past three decades successfully solving problems for our customers. It’s helped us to become a leading provider of services to secure the connected world. But we’re not done there. We also want to find and learn from the technology innovators and problem-solvers of tomorrow. That’s why our venture arm,…

The post Dallas Start-Ups: Pitch Us Your Ideas for a Smarter Connected World appeared first on .

Read More
ComputerWorldIndependent

Massive bank app security holes: You might want to go back to that money under the mattress tactic

Credit to Author: Evan Schuman| Date: Fri, 05 Apr 2019 10:24:00 -0700

A new report from a well-regarded payments consulting firm has found a lengthy list of security insanity while examining several major fintech company mobile apps. Although the very nature of apps that manage and move money would suggest presumably strong security, banks and their cohorts tend to adopt new technology slower than almost any other vertical, which puts them in a bad place when it comes to security.

My favorite finding from the Aite Group report: “Several mobile banking apps hard-coded private certificates and API keys into their apps. [Thieves] could exploit this by copying the private certificates to their computers and running any number of free password-cracking programs against them,” the report noted. “Should the [attackers] successfully crack the private key, they would be able to decrypt all communication between the back-end servers and mobile devices, among other things. The API keys allow an adversary to then begin targeting the [financial institution’s] API servers, gaining them access to data in the back-end databases. This allows [attackers] to authenticate the device with the back-end servers of that app, since this is what APIs use for authentication and authorization.”

To read this article in full, please click here

Read More
SecurityTrendMicro

This Week in Security News: IIoT Threats and Malware Apps

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 05 Apr 2019 14:00:50 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about security threats directed at smart manufacturing environments. Also, learn why malware installed from the Android app store increased by 100% last year. Read on: Security…

The post This Week in Security News: IIoT Threats and Malware Apps appeared first on .

Read More
ScadaICSSchneider

Demystifying Cloud Cybersecurity – An Edge Infrastructure Operator Perspective

Credit to Author: Kim Povlsen| Date: Thu, 04 Apr 2019 16:45:04 +0000

As if their jobs were not challenging enough already, data center teams are being faced with a new test — protecting edge computing infrastructure from cyberattacks. Why is this happening?… Read more »

The post Demystifying Cloud Cybersecurity – An Edge Infrastructure Operator Perspective appeared first on Schneider Electric Blog.

Read More