Category: The Register – Security

Helping Windows 11 fight the hackers

How Intel is using hardware-assisted security to beef up Microsoft OS protection Sponsored Feature  When Windows 11 launched in October 2021, one of its big selling points was a new security architecture. Microsoft designed it from the ground up with…

10 years after Snowden’s first leak, what have we learned?

Spies gonna spy Feature  The world got a first glimpse into the US government’s far-reaching surveillance of American citizens’ communications – namely, their Verizon telephone calls – 10 years ago this week when Edward Snowden’s initial leaks hit the press.… This…

US govt now bans TikTok from contractors’ work gear

BYODALAINGTI (as long as it’s not got TikTok installed) The US federal government’s ban on TikTok has been extended to include devices used by its many contractors – even those that are privately owned. The bottom line: if some electronics…

Taking the art of email security to the next level

AI is beefing up the cyber arsenals of both attackers and defenders Sponsored Feature  Email is a popular target for cybercriminals, offering an easy way of launching an attack disguised as an innocent message. One moment of inattention on the…

Toyota admits to yet another cloud leak

Also, hackers publish RaidForum user data, Google’s $180k Chrome bug bounty, and this week’s vulnerabilities infosec in brief  Japanese automaker Toyota is again apologizing for spilling customer records online due to a misconfigured cloud environment – the same explanation it…

The downside of frenemies

Are DevOps Tools a potential risk to your software supply chain security? Webinar  Popular DevOps tools are great when it comes to helping developers optimize digital infrastructure, but there’s a potential downside – the hidden risks they can contain which…

Barracuda Email Security Gateways bitten by data thieves

Act now: Sea-themed backdoor malware injected via .tar-based hole A critical remote command injection vulnerability in some Barracuda Network devices that the vendor patched 11 days ago has been exploited by miscreants – for at least the past seven months.……

When the popular safeguarding tool is anything but

How to stave off software supply chain attacks Webinar  A software supply chain attack is a hugely painful form of infiltration which can paralyse any business or organization. An attack like a lethal snake bite where the poison silently and…

Alien versus Predator? No, this Android spyware works together

Phone-hugging code can record calls, read messages, track geolocation, access camera, other snooping The Android Predator spyware has more surveillance capabilities than previously suspected, according to analysis by Cisco Talos, with an assist from non-profit Citizen Lab in Canada.… This…

Google settles location tracking lawsuit for only $39.9M

Also, more OEM Android malware, Google’s bug reports (mostly) ditch CVEs, and this week’s critical vulns in brief  Google has settled another location tracking lawsuit, yet again being fined a relative pittance.… This article has been indexed from The Register…

Fighting the five

Hear SANS cyber security experts share advice on how to defend your organization against the latest threats Sponsored Post  Cyber criminals never stop learning so nor should you. Fresh security hacks are being concocted and deployed every week, so it’s…

Cisco squashes critical bugs in small biz switches

You’ll want to patch these as proof-of-concept exploit code is out there already Cisco rolled out patches for four critical security vulnerabilities in several of its network switches for small businesses that can be exploited to remotely hijack the equipment.……

Compliance automation to confound cyber criminals

How you can streamline the auditing process while improving compliance and security Sponsored Post  Eminent US businessman Norman Ralph Augustine – who served as United States Under Secretary of the Army, as well as chairman and CEO of the Lockheed…

No more macros? No problem, say miscreants, we’ll adapt

Microsoft blocking ‘net scripts sparked ‘monumental shift’ in attacks Microsoft’s decision to block internet-sourced macros by default last year is forcing attackers to find new and creative ways to compromise systems and deliver malware, according to threat researchers at Proofpoint.……

UK cops score legal win in EncroChat snooping op

But tribunal punts on whether data was intercepted in transit The UK’s National Crime Agency has partially won an important legal battle in a case that challenged the warrants used to obtain messages from cyber crook hangout EncroChat.… This article…