Skip to main content

Security

Report shows fifth of breaches caused by “miscellaneous errors”

posted onApril 28, 2016
by l33tdawg

The number of reported breaches of organizations' data has been growing hyperbolically over the past few years, based on data in Verizon's 2016 Data Breach Investigations Report (DBIR). And a major reason for that is that many organizations are still doing security like they were decades ago. The leading cause of reported data breaches, as documented by Verizon, is "miscellaneous errors"—mistakes made by employees—that open the door to attackers.

Spotify user data ends up online, but company says it wasn't hacked

posted onApril 26, 2016
by l33tdawg

You may want to change your Spotify password now.

A list of hundreds of Spotify usernames, passwords, account types, and other details showed up on Pastebin.com, a text-sharing site, on April 23.

The data is specific to Spotify, and TechCrunch verified that it could, in fact, log into a few of the compromised accounts. While the first possible explanation that came to our minds was "hack", Spotify denied such a data breach occurred.

IoT Security Will Reach $840 Million By 2020, Gartner Finds

posted onApril 26, 2016
by l33tdawg

With the connected world of the Internet of Things (IoT) on the rise, and expected to be an increasing focus for malware attacks in enterprises, Gartner believes worldwide spending on IoT security will reach $348 million in 2016, up 24% over 2015 spending, according to an April 25 report.

Over the next few years, IoT security spending will initially be "moderate," according to Gartner, and will rise to $547.2 million in 2018. Then it will gain real momentum after 2020, "as improved skills, organizational change and more scalable service options improve execution."

Windows 10 flaw lets hackers secretly run any app on your PC

posted onApril 26, 2016
by l33tdawg

A newly identified Windows 10 security flaw lets hackers install malicious apps on any machine, without business owners being made aware anything out of the ordinary is happening. The issue lets anyone familiar with Windows security bypass its defenses without leaving any trace on the machine.

Discovered accidentally, the issue is significant, and Microsoft is yet to issue a patch.

Hackers so far ahead of defenders it's not even a game

posted onApril 26, 2016
by l33tdawg

Cybercriminals are way ahead of the game against defenders without having to try anything new, according to the latest edition of Verizon's benchmark survey of security breaches.

The study shows that miscreants have no need to switch up, because the same old tactics are still working fine. Security defenders are still performing poorly in their attempts to defend against hacking or malware-based attacks. This isn't for a lack of trying or skills on their part, but almost completely down to the fact that the game is rigged against them.

Phishing remains a data breach weapon of choice, says Verizon

posted onApril 26, 2016
by l33tdawg

Eighty-nine percent of the data breaches tracked by Verizon were either financially or espionage motivated and conducted within minutes courtesy of phishing and stolen credentials.

Those are some of the key takeaways from Verizon's 2016 Data Breach Investigations Report (DBIR), which analyzed 100,000 incidents of which 3,141 were confirmed data breaches.

Hack Brief: Site for ‘Beautiful’ People Suffers Ugly Million-Member Breach

posted onApril 26, 2016
by l33tdawg

BeautifulPeople.com, you may remember, is a dating site that allows members to vote on hopeful enlistees based on their looks, ensuring that people who belong meet certain standards of both attractiveness and shallowness. It bills itself as “a dating site where existing members hold the key to the door.” Turns out, the site maybe should have put them in charge of server security, as well. The personal data of 1.1 million members is currently for sale on the black market, after hackers took it from an insecure database.

US drops 'cyberbombs' on ISIS for the first time

posted onApril 25, 2016
by l33tdawg

The US has introduced a new tactic in its war against the Islamic State.

The Department of Defense's Cyber Command unit is mounting cyberattacks against the terrorist organization, the New York Times reported Sunday.

Detecting and dealing with the stealthiest cyberattacks

posted onApril 25, 2016
by l33tdawg

Cyberattacks are getting smarter and stealthier as criminals and nation states use a combination of complex techniques to evade detection. The accepted reality now is that traditional protection techniques that rely on static signatures – such as Anti-Virus (AV) – or take a narrow view and ignore vectors like fileless based attacks, are simply no match for today’s threat landscape. So where does this leave organisations trying to protect against new, ever evolving variants of malware or exploits?