Providing secure access and a frictionless user experience are typically competing initiatives, but they don’t have to be! Read on to learn why. In our world today, context changes quickly. We work from home, coffee shops and the office. We…
(ISC)² Puts Members at the Center of Our Cybersecurity Content in 2023
(ISC)² has adopted a new approach to creating and publishing editorial content such as our news, features, opinions and other educational journalism. Helping our members navigate the cybersecurity landscape is an essential part of what we do. Creating topical, engaging…
Want your endpoint security product in the Microsoft Consumer Antivirus Providers for Windows?
How The UK Is Taking A Stand Against Ransomware Criminals
As part of a new coordinated action against international cybercrime, the UK and the US have sanctioned seven Russian cyber criminals today (Thursday, 9 February). Several ransomware strains have been developed or deployed by these individuals that have targeted the UK…
How to Send Ctrl-Alt-Delete in a Remote Desktop Session?
Control-Alt-Delete is the combination of the Control key, the Alt key, and the Delete key that a user may press at the same time on a personal computer to end an application task or to reboot the operating system. What…
US, UK slap sanctions on Russians linked to Conti, Ryuk, Trickbot malware
Any act that sends so much as a ruble to seven named netizens now forbidden The US and UK have sanctioned seven Russians for their alleged roles in disseminating Conti and Ryuk ransomware and the Trickbot banking trojan.… This article…
Android mobile devices from top vendors in China have pre-installed malware
Researchers reported that the top-of-the-line Android mobile devices sold in China are shipped with malware. China is currently the country with the largest number of Android mobile devices, but a recent study conducted by researchers from the University of Edinburgh…
Live Cyber Forensics Analysis with Computer Volatile Memory
The field of computer Forensics Analysis involves identifying, extracting, documenting, and preserving information that is stored or transmitted in an electronic or magnetic form (that is, digital evidence). Forensics Analysis – Volatile Data: How to Collect Volatile Data: Acquisition of…
US teases more China tech sanctions, this time to deflate balloon-makers
State Dept already has one target, FBI is identifying sources of floating surveillance platform’s components The Chinese surveillance balloon that drifted across the US last week looks set to spark a new round of sanctions against Middle Kingdom tech firms.……
Reddit discloses security breach: what you need to know
Reddit disclosed a security breach today on the site stating that a malicious actor managed to gain access to internal servers. The company became aware of a phishing campaign that targeted Reddit […] Thank you for being a Ghacks reader.…
An email attack can end up costing you over $1 million
75% of the organizations had fallen victim to at least one successful email attack in the last 12 months, with those affected facing average potential costs of more than $1 million for their most expensive attack, according to a new…
The dangers of unsupported applications
Are ageing technologies and infrastructure threatening the security and productivity of your business? A recent investigation by the National Audit Office (NAO – UK’s independent public spending watchdog) revealed that the Department for Environment, Food and Rural Affairs is relying…
New infosec products of the week: February 10, 2023
Here’s a look at the most interesting products from the past week, featuring releases from Cequence Security, Deepwatch, Neustar Security Services, OPSWAT, and SecuriThings. OPSWAT MetaDefender Kiosk K2100 secures critical networks in challenging environments The OPSWAT MetaDefender Kiosk K2100 is…
ChatGPT is malware makers’ new A.I. partner in crime
Over the past two months, we’ve seen the emergence of a concerning new trend: the use of artificial intelligence as a malware development tool. Artificial intelligence (AI) can potentially be used to create, modify, obfuscate, or otherwise enhance malware. It…
KeePass 2.53.1 password manager resolves vulnerability controversy
KeePass 2.53.1 is a new update for the password manager that addresses a potential vulnerability in the application. Last week, word about a vulnerability in the password manager spread online. Reported by […] Thank you for being a Ghacks reader.…
Reddit Suffers Security Breach Exposing Internal Documents and Source Code
Popular social news aggregation platform Reddit has disclosed that it was the victim of a security incident that enabled unidentified threat actors to gain unauthorized access to internal documents, code, and some unspecified business systems. The company blamed it on…
SecuriThings Managed Service Platform secures physical security devices
SecuriThings announced a new Managed Service Platform for the physical security space that enables managed service providers to manage, visualize and maintain customer environments from a single pane of glass. Organizations across the globe invest extensively in buying and installing…
ChatGPT and Cyber Attacks
For the past few days, Microsoft funded OpenAI developed ChatGPT is trending on news headlines for different reasons. While one news channel or resource focuses more on its positives, the other tries to figure out the cons that the AI…
Australian government gives made-in-China CCTV cams the boot
The usual suspects – Hikvision and Dahua – named as a risk to national security, prompting the usual denials Australia’s Defence Department removed all Chinese manufactured surveillance cameras after an audit detailed the number of Hikvision and Dahua devices installed…
Strike Graph integrates assessment and audit capabilities in TrustOperation platform
Strike Graph has integrated a new solution which allows customers to go through security audits powered by technology at a fraction of the cost and time. This new streamlined offering was made available in 2022 and resulted in over 80%…
Acalvio’s ITDR solution combats identity threats and strengthens zero trust
Acalvio launched Identity Threat Detection and Response (ITDR) solution that offers identity attack surface area visibility and management, and Active Defense against identity threats. By incorporating Active Defense, Acalvio’s ITDR solution changes the environment to not only catch and counter…
SentryBay protects business data at the endpoint with Armored Client for AVD & W365
SentryBay adds to its family of Armored Client products with a solution specifically designed to address the client-side security gaps of Microsoft Azure Virtual Desktop and Windows 365 – while harnessing the strengths of Intune. Users of endpoint devices that…
N-able Managed EDR accelerates the investigation of threat events
N-able launched N-able Managed Endpoint Detection and Response (Managed EDR), a threat monitoring, hunting, and response service designed for MSPs that have standardized on N-able Endpoint Detection and Response (EDR). Managed EDR supplements EDR with dedicated managed security services. Powered…
Endpoint security getting easier, but most organizations lack tool consolidation
IT and security teams are consolidating management and security functions to help better deliver new applications to end users, improve regulatory compliance, and reduce cyberattacks resulting from poor coordination between endpoint security and management teams, according to Syxsense. Endpoint security…
Alexa, who else is listening?
Your smart speaker is designed to listen, but could it be eavesdropping too? The post Alexa, who else is listening? appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original article: Alexa, who else is listening?
Romance scammers’ favorite lies cost victims $1.3B last year
Don’t trust your super-hot military boyfriend you’ve never met. He doesn’t exist As Valentine’s Day approaches, if your offshore oil rig worker “boyfriend” – who looks like Bradley Cooper in his online pics and has hinted at proposing to you…
Get Up to Speed With the Latest Cybersecurity Standard for Consumer IoT
With growing concern regarding data privacy and data safety today, Internet of Things (IoT) manufacturers have to up their game if they want to maintain consumer trust. This is the shared goal of the latest cybersecurity standard from the European…