Month: August 2018

0 Comments
The House Energy and Commerce Committee completed its investigation of the Common Vulnerabilities and Exposures program this week and requested “significant changes to the very foundation of the CVE program.” The investigation began in March of 2017 following media reports on extensive issues with the CVE tracking system, including long backlogs for assigning vulnerability scores.
0 Comments
Around half of those that receive and are impersonated in Business Email Compromise (BEC) scams aren’t C-level or finance/HR employees, highlighting the importance of a company-wide policy to mitigate the threat, according to new research. Security firm Barracuda Networks analyzed 3000 BEC campaigns to better understand where and how attackers are focusing their efforts. Sometimes
0 Comments
The move is part of a three-pronged plan that is intended to bolster user trust and safety on the photo-sharing platform Instagram has announced that its users will soon be able to secure their accounts with third-party authentication apps. Prior to the announcement of this much-anticipated change, the photo-sharing platform supported only SMS-based two-factor authentication
0 Comments
George Garofano (left) The fourth celebrity hacker—who was charged earlier this year with hacking into over 250 Apple iCloud accounts belonged to Jennifer Lawrence and other Hollywood celebrities—has been sentenced to eight months in prison. Earlier this year, George Garofano, 26, of North Branford, admitted to illegally obtaining credentials of his victims’ iCloud accounts using
0 Comments
Mozilla today announced that its Firefox browser will soon automatically block all attempts at cross-site tracking by default. There’s three parts to this strategy. Starting with version 63, which is currently in testing in the browser’s nightly release channel, Firefox will block all slow-loading trackers (with ads being the biggest offender here). Those are trackers
0 Comments
Nearly all IT decision makers believe that protecting machine identities is as important or more important that human identity management, but most struggle to deliver that protection, according to a new Forrester study. The analyst firm was commissioned by Venafi to poll 350 global IT leaders about the challenges facing them from securing machine identities,
0 Comments
MGM Resorts International operates 27 resort properties worldwide, including more than 420 bars and restaurants and 282 retail establishments. SVP, Chief Information Security Officer Scott Howitt oversees security for the entire global enterprise, which encompasses 20,000 endpoints, various operating systems, and applications that span the gaming, hospitality, entertainment, food and beverage, retail and hotel industries.
0 Comments
For Android, malware detections were down 27% compared to the first half of 2017; for iOS, they decreased 15% compared to the same period last year Mobile security plays an increasingly important role in the protection of information assets, and this applies to both home and corporate users. So, this publication will focus on analyzing the
0 Comments
In the past couple decades, Elon Musk’s efforts with SpaceX have partially kicked off a space race in the VC-funded rocket startup scene. At Disrupt SF 2018, we’re thrilled to host a panel of some of Silicon Valley’s top investors whose firms are eying the stars. Rob Coneybeer from Shasta Ventures, Tess Hatch from Bessemer
0 Comments
Half of the top one million sites in the world are now using HTTPS, in a boost for global web security, according to a leading researcher. Scott Helme revealed that growth had slowed at the start of the year, but picked up again in recent months so that 51.8% of Alexa Top 1 Million sites were
0 Comments
Instagram is growing quickly—and with the second most popular social media network in the world (behind just Facebook), the photo-sharing network absolutely dominates when it comes to user interactions. And with great success comes great responsibility—responsibility to keep users’ accounts safe, responsibility to fight fake accounts and news, and responsibility of being transparent. You might
0 Comments
Vermont Senator Bernie Sanders is seeking additional information about the working conditions in Amazon warehouses in advance of legislation he’s preparing to introduce on September 5.  Income inequality was, after all, the centerpiece of Sanders’ 2016 presidential campaign. It was a populist message that resonated strongly with voters, giving the dark horse candidate a boost
0 Comments
If IT professionals can master enterprise patch management — a vital cog in any security strategy — they can address many of their security challenges. Enterprise patch management is certainly nothing new, and almost every business struggles with it in some way. Just look at any of the annual security surveys — patching, or lack
0 Comments
Election security has again been called into question after millions of Texas voter records were left exposed. A file discovered by Flash Gordon, a New Zealand-based data breach hunter, was left on an unsecured server without a password, according to TechCrunch. Of the 15.2 million total registered Texas voters, an astounding 14.8 million records were left
0 Comments
How To Safely Post Images Of Your Kids Online I’m not a big sharer online but I do love popping up a few pics of an important family milestone on Facebook. Whether it’s a child starting a new school, an amazing family holiday or a hilarious birthday pic, sharing family snaps online is a great