Tag: cybersecurity

  • Cyber Gangs: Who Are They in 2021 and What Do They Want?

    Cyber Gangs: Who Are They in 2021 and What Do They Want?

    by

    in

    Cyber crime gangs are working for years, but lately, theyrsquo;t altered tactics. Theyrsquo;ve adopted new technology, exploited fresh opportunities, delivered fresh payloads and sought out new goals. Their objective is to maximize the amount of money that they can collect through cyber crime. Gangs, for example Cosmic Lynx, Exaggerated Lion, Fin7 and Florentine Banker, are…

  • Verkada allowed at least 100 employees, including interns and sales staff, to access customers’ camera feeds

    Verkada allowed at least 100 employees, including interns and sales staff, to access customers’ camera feeds

    by

    in

    Verkada Verkada allow at least 100 employees access clients ' camera packs, Bloomberg reported Wednesday. On Monday, hackers used the exact same "Super Admin" account to access 150,000 camera feeds. Workers had repeatedly raised concerns regarding Verkada's security lapses, according to Bloomberg. See more stories on Insider's company page. On Monday, a bunch of hackers…

  • Apple’s New Privacy Initiative

    Apple’s New Privacy Initiative

    by

    in

    Apple’s tracking-optional iOS 14.5 update provides privacy-preserving features, giving users the ability to opt-out of being followed around the Internet via “trackers” in their apps. This privacy-driven iOS 14.5 update contains a feature that redirects all fraudulent website checks through its own proxy servers. Apple’s released this as a part of their strategy to protect…

  • Raising the Red Flag on the Insider Threat from Ransomware

    Raising the Red Flag on the Insider Threat from Ransomware

    by

    in

    There was nothing in particular that should have drawn attention to the two individuals sitting for drinks at the bar in Reno. Just two old colleagues catching up over some drinks. But if someone had paid close enough attention (and perhaps spoke Russian), then they might have overheard that one of the pair was attempting…

  • Top 5 Threat Vectors in Connected Cars and How to Combat Them

    Top 5 Threat Vectors in Connected Cars and How to Combat Them

    by

    in

    Plug-in electric and at least partially autonomous attached automobiles are a frequent sight on streets around the world.  The electronic and software component marketplace for all those vehicles is estimated to rise from $238 billion to $469 billion between 2020 and 2030. The two cybersecurity and ‘privacy by design and default option ’’ve been embedded into operations…

  • Elon Musk says ’embarrassingly late’ two-factor is coming to Tesla app

    Elon Musk says ’embarrassingly late’ two-factor is coming to Tesla app

    by

    in

    Tesla CEO Elon Musk acknowledged Friday that the company was ‘embarrassingly late’ rolling out a security layer known as two-factor authentication for its mobile app. “Sorry, this is embarrassingly late. Two factor authentication via sms or authenticator app is going through final validation right now,” Musk wrote Friday in response to a question from a…

  • Dissecting the Twitter Hack With a Cybersecurity Evangelist

    Dissecting the Twitter Hack With a Cybersecurity Evangelist

    by

    in

    Bottom Line: Shattering the false sense of security in tech, the recent Twitter hack blended altruism, fame, greed, social engineering via SIM swapping and insider threats to steal $120,000 from victims when the economic and political damage could have been far worse. Targeting the most influential celebrities on Twitter, hackers orchestrated a social engineering-based attack…

  • Stay ahead of multi-cloud attacks with Azure Security Center

    Stay ahead of multi-cloud attacks with Azure Security Center

    by

    in

    The COVID-19 catastrophe has challenged pretty much every business on the world to adapt and transform. With workforces distant, IT administrators and security specialists are under high pressure to keep these workers connected and productive while combating evolving. For example, in the procedure for monitoring 8 trillion signals from a selection of Microsoft products, services,…

  • Remote Access Trojans

    Remote Access Trojans

    by

    in

    You’re working to get a high-profile technology firm, close to releasing a product that is market-changing . It’therefore contested area, with many competitors, both domestic and international. There’s a lot of buzz from the media and internet speculation on influence and the scope that your product is going to have. And it goes without question…

  • How I Hacked My Connected Car, and Other Thoughts on Vehicle Cybersecurity

    How I Hacked My Connected Car, and Other Thoughts on Vehicle Cybersecurity

    by

    in

    In the near future, self-driving vehicles will likely be the standard . Cars nowadays are essentially just computers with wheels, and they’re getting more entangled. This, of course, provides chances to make our lives simpler, but it may also increase the digital attack surface and possible risks if manufacturers leave proper car cybersecurity measures unaddressed…