That one weird thing in Outlook that gives phishers and scammers an in to an inbox Users are urging Microsoft to rethink how it shows sender email addresses in Outlook because phishing criminals are taking advantage, using helpful, friendly names…
Category: The Register – Security
Billion-dollar bust as international op shutters Cryptonator wallet
Chap named ‘Roman Boss’ accused of being just that at a cryptocash laundering outfit Users of Cryptonator – an online digital wallet and cryptocurrency exchange – received an unpleasant surprise last weekend after the service was shuttered in a combined…
MDM vendor Mobile Guardian attacked, leading to remote wiping of 13,000 devices
Singapore Ministry of Education orders software removed after string of snafus UK-based mobile device management vendor Mobile Guardian has admitted that on August 4 it suffered a security incident that involved unauthorized access to iOS and ChromeOS devices managed by…
Mobile Guardian attacked, leading to remote wiping of 13,000 devices
Singapore Ministry of Education orders software removed after string of snafus UK-based mobile device management vendor Mobile Guardian has admitted that on August 4 it suffered a security incident that involved unauthorized access to iOS and ChromeOS devices managed by…
Illinois relaxes biometric privacy law so snafus won’t cost businesses billions
Some scowl, some smile, as fines no longer apply every time your mugshot or fingerprint is shared The US state of Illinois has reduced penalties for breaches of its tough Biometric Information Privacy Act (BIPA).… This article has been indexed…
NFL to begin using face scanning tech across all of its stadiums
Smile for the camera to get in, or buy a beer without lining up The National Football League and all 32 of its teams will use tech from facial recognition software vendor Wicket to verify the identity of thousands of…
That cyber-heist of 2.9B personal records? There’s a class-action lawsuit looming for that
Background check biz accused of negligence A lawsuit has accused a Florida data broker of carelessly failing to secure billions of records of people’s private information, which was subsequently stolen from the biz and sold on an online criminal marketplace.……
Your copilot for improved cyber protection
Watch this video to learn how Palo Alto Networks is using GenAI to automate and simplify cybersecurity Sponsored Post Cyber security is complex right, particularly when you’re tyring to monitor and configure multiple tools across a host of different on-…
Sneaky SnakeKeylogger slithers into Windows inboxes to steal sensitive secrets
Malware logs users’ keystrokes, pilfers credentials, exfiltrates data Criminals are preying on Windows users yet again, this time in an effort to hit them with a keylogger that can also steal credentials and take screenshots.… This article has been indexed…
CrowdStrike unhappy about Delta’s ‘litigation threat,’ claims airline refused ‘free on-site help’
Vendor plans to aggressively defend its case before listing catalog of shortcomings at the airline CrowdStrike says it is “highly disappointed” and rejects the claims made by Delta and its lawyers that the vendor exhibited gross negligence in the events…
China starts testing national cyber-ID before consultation on the idea closes
Eighty-one apps signed up to pilot facial recognition and real name ID system Chinese app developers have signed up to beta test a national cyberspace ID system that will use facial recognition technology and the real names of users, according…
Google gamed into advertising a malicious version of Authenticator
Plus: CISA’s AI hire; and Canuck SIM swappers busted Infosec in brief Scammers have been using Google’s own ad system to fool people into downloading a borked copy of the Chocolate Factory’s Authenticator software.… This article has been indexed from…
DARPA suggests turning old C code automatically into Rust – using AI, of course
Now that’s a TRACTOR pull request To accelerate the transition to memory safe programming languages, the US Defense Advanced Research Projects Agency (DARPA) is driving the development of TRACTOR, a programmatic code conversion vehicle.… This article has been indexed from…
Israeli hacktivist group brags it took down Iran’s internet
WeRedEvils alleges successful attack on infrastructure, including data theft Israel-based hacktivists are taking credit for an ongoing internet outage in Iran.… This article has been indexed from The Register – Security Read the original article: Israeli hacktivist group brags it…
Respect your data, and protect it
Hear how AI runtime security secures applications in the complete journey from design to build to run Sponsored Post Ensuring access to mission critical, AI-enabled applications is important for modern businesses keen on boosting employee productivity and transforming customer operations.…
Fortune 50 biz coughed up record-breaking $75M ransom to halt leak of stolen data
They say crime doesn’t pay. They’re right – it’s the victims doing the paying An unnamed Fortune 50 corporation paid a stonking $75 million to a ransomware gang to stop it leaking terabytes of stolen data.… This article has been…
UK plans to revamp national cyber defense tools are already in motion
Work aims to build on the success of NCSC’s 2016 initiative – and private sector will play a part The UK’s National Cyber Security Centre (NCSC) says it’s in the planning stages of bringing a new suite of services to…
UK crimebusters shut down global call-spoofing outfit that claimed 170K-plus victims
Suspected devs behind Russian Coms cuffed – now to find the users of the nastyware The UK’s National Crime Agency (NCA) has shut down an outfit called Russian Coms – a call-spoofing service believed to have swindled hundreds of thousands…
Japan mandates app to ensure national ID cards aren’t forged
First delays, then data leaks – now fraud detection needed at point of use The Japanese government has released details of of an app that verifies the legitimacy of its troubled My Number Card – a national identity document.… This…
India contemplates compulsory dynamic 2FA for digital payments
SMS OTPs are overused, so bring on the tokens and biometrics India’s central bank on Wednesday proposed a requirement for dynamically generated second authentication factors for most digital payments.… This article has been indexed from The Register – Security Read…