Category: Software Security – Software Curated

Office 365: A Favorite for Cyberattack Persistence

Read the original article: Office 365: A Favorite for Cyberattack Persistence Threat actors are consistently leveraging legitimate services and tools from within Microsoft Office 365 to pilfer sensitive data and launch phishing, ransomware, and other attacks across corporate networks from…

Online Business Scams Decline as Consumer COVID Fraud Rises

Read the original article: Online Business Scams Decline as Consumer COVID Fraud Rises Online bandits are decreasing their schemes against businesses but increasing COVID-19 scams aimed at consumers, according to a report released Tuesday by TransUnion. Suspected fraudulent digital transactions…

DHS Brings Web App to Coronavirus Fight

Read the original article: DHS Brings Web App to Coronavirus Fight Never, in most of our lifetimes, have all corners of society collaborated to address a single grave threat as they have done in the fight against COVID-19. While epidemiological…

NXTsoft Launches OmniSecure for API Monitoring

Read the original article: NXTsoft Launches OmniSecure for API Monitoring NXTsoft, an API connectivity services provider, today announced the launch of OmniSecure, an API-monitoring solution that provides an additional layer of cybersecurity to NXTsoft’s secure APIs. OmniSecure monitors API security…

Mobile security forces difficult questions

Read the original article: Mobile security forces difficult questions As governments consider COVID-19 contact tracing and its privacy implications, it’s not a bad idea for companies to take the opportunity to look more closely at their mobile agreements with employees.…

iOS Mail has ‘critical’ security flaws

Read the original article: iOS Mail has ‘critical’ security flaws Germany’s federal cybersecurity agency has issued a warning urging all iOS users to install Apple’s latest security updates which patch two zero-click security vulnerabilities that impact the company’s default email…

How to get into cybersecurity?

Read the original article: How to get into cybersecurity? Cybersecurity is one of the fastest growing industries globally. Predictions place spending on endpoint security tools at $128 billion by the end of 2020 and spending on cloud security tools at…

Securing Linux’s master sysadmin command: Sudo

Read the original article: Securing Linux’s master sysadmin command: Sudo Sudo is one of the most powerful and dangerous tools in the Unix or Linux system administrator’s toolbox. With it, an ordinary user can run commands just as if he…

Securing Linux’s master sysadmin command: Sudo

Read the original article: Securing Linux’s master sysadmin command: Sudo Sudo is one of the most powerful and dangerous tools in the Unix or Linux system administrator’s toolbox. With it, an ordinary user can run commands just as if he…

Microsoft Shells Out $100K for IoT Security

Read the original article: Microsoft Shells Out $100K for IoT Security Microsoft has launched a bug-bounty program for its Azure Sphere offering, which is a security suite for the internet of things (IoT) that encompasses hardware, OS and cloud elements.…

Crystal Balling the Future of Application Security

Read the original article: Crystal Balling the Future of Application Security If the past four decades have taught us anything, it’s that predicting the future of computing, software, and networking technologies is something of a fool’s errand. That’s undoubtedly the…

Skype phishing attack targets remote workers

Read the original article: Skype phishing attack targets remote workers Remote workers have been warned to take extra care when using video conferencing software after a new phishing scam was uncovered. Researchers from security firm Cofense have revealed hackers are…

Apple Patches Two iOS Zero-Days Abused for Years

Read the original article: Apple Patches Two iOS Zero-Days Abused for Years Researchers are reporting two Apple iOS zero-day security vulnerabilities affecting its Mail app on iPhones and iPads. Impacted are iOS 6 and iOS 13.4.1. Apple patched both vulnerabilities…

API Backdoor Exposes Android Users’ Sensitive Data

Read the original article: API Backdoor Exposes Android Users’ Sensitive Data A recent research paper reports that a set of Android APIs called Installed Application Methods (IAMs) are exposing Android users’ sensitive information to advertisers. IAMs have a legitimate purpose.…

API Backdoor Exposes Android Users’ Sensitive Data

Read the original article: API Backdoor Exposes Android Users’ Sensitive Data A recent research paper reports that a set of Android APIs called Installed Application Methods (IAMs) are exposing Android users’ sensitive information to advertisers. IAMs have a legitimate purpose.…

The Evolution of AppSec: Past, Present and Future

Read the original article: The Evolution of AppSec: Past, Present and Future In a recent podcast with IDG, Chris Wysopal, Veracode Chief Technology Officer, speaks to the evolution of application security (AppSec) over the past ten years. In his evaluation,…

Zoom Boosts Security With Pick-Your-Route Feature

Read the original article: Zoom Boosts Security With Pick-Your-Route Feature Zoom’s paying customers will be able to choose the region they want to use for their virtual meetings, the company announced Monday. Starting Saturday, paying customers can opt in or…

Google, Microsoft talk up security after Zoom firestorm

As video conferencing platform Zoom continues to weather unfavorable headlines about its security, two big market rivals are doubling down on commitments to keeps users safe. In recent weeks, Zoom has faced a barrage of criticism involving privacy and security…

This fake Discord software could infect your PC

A new variant of the AnarchyGrabber malware has been discovered by MalwareHunterTeam which modifies Discord client files in order to evade detection and steal user accounts every time someone logs into the popular chat service. The malware is distributed on…

Hackers are spreading malware through coronavirus maps

The ongoing coronavirus outbreak has disrupted business operations across the globe but cybercriminals are showing no signs of slowing down as they attempt to capitalize on people’s fears surrounding the virus. Back in January, hackers used the coronavirus to launch…

Unsigned Firmware Puts Windows, Linux Peripherals at Risk

Researchers at firmware security company Eclypsium on Tuesday released new research that identifies and confirms unsigned firmware in WiFi adapters, USB hubs, trackpads and cameras used in Windows and Linux computer and server products from Lenovo, Dell, HP and other…

Mozilla launches a VPN app for Android and Windows

Mozilla, the organization behind Firefox browser, is bringing its VPN (Virtual Private Network) service to Android and Windows 10 through a dedicated app. The app is currently in the beta phase, and you need an invite to sign up. Once…

Microsoft detects new Evil Corp malware attacks

Microsoft has observed that the hacking group known as Evil Corp or TA505 has switched up the tactics in its ongoing phishing campaign to deliver malware by using malicious Excel documents. The company provided more details on the new campaign…

The best password managers

In today’s digital age, hackers are becoming increasingly sophisticated in their efforts to gain access to your accounts and data. Aside from breaching databases and exploiting software vulnerabilities, another attack vector is your weak password. Basic digital self-defense requires you…

Google finds security flaws in Apple’s web browser

Multiple security flaws in Apple’s Safari browser have been discovered by Google researchers according to a new report from the Financial Times. The flaws were found in Safari’s Intelligent Tracking Prevention feature that is designed to protect users from cross-site…

Clop ransomware looks to target Windows 10 apps

A new variant of the Clop ransomware which targets Windows 10 apps such as text editors and office applications as well as other processes has been discovered in the wild. When the Clop ransomware first appeared in February of 2019,…

How AI is preventing email phishing attacks

Since its invention in 1970, email has undergone very little changes. Its ease of use has made it the most common method of business communication, used by 3.7 billion users worldwide. Simultaneously, it has become the most targeted intrusion point…