Tags » Infosec

The Rise of Silence and the Fall of Coinhive

Cryptomining will exist as long as it remains profitable. One of the most effective ways to disrupt that activity is to make it too expensive to run cryptomining malware in your network. 10 more words


WeTransfer sends user file links to wrong people

Popular file transfer service WeTransfer faces embarrassment this week after admitting that it has mailed file links to the wrong users.

Founded in 2009, WeTransfer enables users to transfer large files between each other for free. 783 more words


Presidential text alerts are open to spoofing attacks, warn researchers

Researchers have shown that it’s technically possible for hackers to target the US presidential alerts system to send fake messages on a localised basis.

For anyone who can’t remember what these are, the Federal Emergency Management Agency (FEMA), which manages the system, … 618 more words


Government agencies still send sensitive files via hackable .zips

We – as in, both the public and private sectors – are under the delusion that emailing content as password-protected .zip files is a secure way to share files, Senator Ron Wyden said in a… 572 more words


Cop awarded $585K after colleagues snooped on her via license database

Human Rights Watch estimates that since 2009, there have been at least 14 federal lawsuits filed over cops’ misuse of their access to personal data – think state driver’s license databases – to snoop on fellow officers, public safety personnel, and justice professionals. 966 more words


AWS Security Hub aggregates security alerts and conducts continuous compliance checks

AWS Security Hub gives customers a central place to manage security and compliance across an AWS environment. It aggregates, organizes, and prioritizes security alerts – called findings – from AWS services such as Amazon GuardDuty, Amazon Inspector, and Amazon Macie, and from a large and growing list of AWS Partner Network (APN) solutions. 678 more words


Why businesses need IAM to push their zero trust frameworks forward

Many organizations are finding themselves between a rock and a hard place when it comes to the security of their digital transformation strategies. On the one hand, the number of data breaches continue to increase and damages stemming from cybercrime have businesses losing more than… 782 more words