A ‘Scarily Simple’ Bug Put Millions of Cox Communications Customers at Risk

Credit to Author: Louise Matsakis| Date: Fri, 05 Oct 2018 18:17:58 +0000
The most straightforward insecurities can sometimes be the riskiest.
Read MoreRSS Reader for Computer Security Articles

Credit to Author: Louise Matsakis| Date: Fri, 05 Oct 2018 18:17:58 +0000
The most straightforward insecurities can sometimes be the riskiest.
Read More
Credit to Author: Louise Matsakis| Date: Fri, 05 Oct 2018 18:17:58 +0000
The most straightforward insecurities can sometimes be the riskiest.
Read More
Credit to Author: Lily Hay Newman| Date: Fri, 05 Oct 2018 16:40:15 +0000
Sales intelligence firm Apollo left a “staggering amount” of exposed online, including 125 million email addresses and nine billion data points.
Read More
Credit to Author: Lily Hay Newman| Date: Thu, 04 Oct 2018 20:58:01 +0000
A blockbuster report from Bloomberg says that China has compromised servers used by major US companies. It’s a problem that experts have long feared, and still don’t know how to resolve.
Read More
Credit to Author: Jonny Evans| Date: Fri, 05 Oct 2018 04:29:00 -0700
Apple and Amazon have strenuously deniedBloomberg’s claims of a sophisticated hardware exploit against servers belonging to themselves and numerous other entities, including U.S. law enforcement
Put in very simple terms, the claim is that malicious chips were found inside servers used in data centers belonging to the tech firms.
These chips (it’s claimed) worked to exfiltrate data from those servers, which were themselves sourced from server manufacturer, Super Micro. That company’s server products are/were also used by Amazon, the U.S. government and 30 other organizations. The chips were (it is alleged) put in place by employees bribed by Chinese government agents.
Credit to Author: Sharky| Date: Fri, 05 Oct 2018 03:00:00 -0700
IT security has laptops at this company really locked down, and that includes only limited admin rights, reports a road warrior pilot fish.
“On a recent trip, at my hotel I had to make an internet connection and open a web page to log into the hotel’s internet service before I could get a connection to the real internet,” fish says.
“Problem was, the work laptop was not going to let me use the browsers until I had established a VPN connection, which of course I could not do without the web page login.
“In a way, that was good — I took some real vacation time.
“In another way, it was bad, I have big hands and fingers, so using an iPhone and those stupid virtual keyboards is a one-finger, error-prone task. An email that could take seconds to type on a full-size keyboard takes minutes on the phone.

Credit to Author: Andy Greenberg| Date: Thu, 04 Oct 2018 17:41:41 +0000
A new indictment details how Russian agents camped outside hotels when remote hacking efforts weren’t enough.
Read More
Credit to Author: Lily Hay Newman| Date: Wed, 03 Oct 2018 20:35:00 +0000
By only checking a file’s code signature when you install it—and never again—macOS gives malware a chance to evade detection indefinitely.
Read More