Thu.Apr 02, 2020

article thumbnail

‘War Dialing’ Tool Exposes Zoom’s Password Problems

Krebs on Security

As the Coronavirus pandemic continues to force people to work from home, countless companies are now holding daily meetings using videoconferencing services from Zoom. But without the protection of a password, there’s a decent chance your next Zoom meeting could be “Zoom bombed” — attended or disrupted by someone who doesn’t belong.

Passwords 363
article thumbnail

Morrisons Not Liable for Breach Caused by Rogue Employee

Data Breach Today

Employees' Attempt to Receive Financial Compensation Dismissed by Supreme Court Supermarket giant Morrisons is not liable for a data breach caused by a rogue employee, Britain's Supreme Court has ruled, bringing to a close the long-running case - the first in the country to have been filed by data breach victims.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New COVID19 wiper overwrites MBR making computers unusable

Security Affairs

A recently discovered strain of malware exploits the current COVID19 pandemic to render computers unusable by overwriting the MBR. SonicWall’s security researchers have discovered a new piece of malware that exploits the current COVID19 outbreak to render computers unusable by overwriting the master boot record (MBR). Unfortunately, this is one of the numerous attacks conducted by cyber criminals and nation-state actors in an attempt to take advantage of the COVID19 epidemic.

article thumbnail

Zoom Rushes Patches for Zero-Day Vulnerabilities

Data Breach Today

Researcher Found Flaws in Zoom's Teleconference Platform The day after security researcher Patrick Wardle disclosed two zero-day vulnerabilities in the macOS client version of Zoom's teleconferencing platform, the company on Thursday rushed out patches for these flaws and one other.

Security 266
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

List of data breaches and cyber attacks in March 2020 – 832 million records breached

IT Governance

With organisations across the globe turned upside down by the COVID-19 pandemic, there has never been a worse time to suffer a data breach or cyber attack. And the bad news is that unsettled employees, many of whom are being asked to work from home, and depleted workforces mean there is an increased chance of an incident occurring. Thankfully, we’ve only found 67 incidents this month, with a total of 832,486,418 affected records – which is only slightly higher than last month’s figures.

More Trending

article thumbnail

Crooks use tainted Zoom apps to target users at home due to Coronavirus outbreak

Security Affairs

Crooks target Android users working from home due to the Coronavirus outbreak with a Trojanized version of the popular video messaging app Zoom. Security experts from Bitdefender have spotted tainted versions of the Android Zoom video-conferencing application that is targeting users working from home due to the Coronavirus outbreak. Researchers detected re-packaged Zoom mobile applications that are distributed via third-party markets. “The samples documented in this article spread outside

Marketing 141
article thumbnail

Coalition Offers Remote Workforce Security Tips

Data Breach Today

Andy Bates of Global Cyber Alliance on 'Work From Home, Secure Your Business' The Global Cyber Alliance is one of 13 nonprofit organizations that have banded together to offer businesses security tips for their newly remote workforces. Andy Bates, executive director of the alliance, discusses the coalition's core guidelines for reducing cyber risk.

Security 194
article thumbnail

Microsoft issues targeted notification to hospitals vulnerable to Ransomware attacks

Security Affairs

Microsoft is sending notifications to dozens of hospitals about vulnerable VPN devices and gateways exposed online in their network. Microsoft is warning dozens of hospitals of the risks of ransomware attacks due to insecure VPN devices and gateways exposed online. Recently Microsoft has published details about human-operated ransomware attacks that targeted organizations in various industries.

article thumbnail

COVID-19 Crisis Triggers More HIPAA Policy Changes

Data Breach Today

Business Associates Cleared to Make 'Good Faith' Disclosures of PHI In the latest move to relax certain HIPAA requirements during the COVID-19 crisis, federal regulators Thursday paved the way for business associates to share protected health information for public health-related activities during the pandemic.

179
179
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Hackers exploited IE and Firefox flaws in attacks on entities in China, Japan

Security Affairs

An APT group is exploiting the flaws patched earlier this year in Firefox and Internet Explorer in attacks aimed at China and Japan. An APT group is exploiting two vulnerabilities patched earlier this year in Firefox and Internet Explorer in attacks aimed at China and Japan. The first issue, tracked as CVE-2019-17026 , affects the Firefox browser and was addressed in January.

article thumbnail

Australian Kids' Smartwatch Maker Hit By Same Bug Again

Data Breach Today

TicTocTrack Fixes Bug That Exposed Data, Allowed Tampering With Kids' Location An Australian company that sells a GPS tracking smartwatch for kids accidently exposed personal data a second time. But this time around, it has not notified users about the bug, which also could have been used to spoof the location of children.

article thumbnail

[Podcast] The Universal Translator – Not Just for Star Trek Anymore

AIIM

The show Star Trek always had the coolest futuristic technology. For example, I can’t tell you how many times I’ve wished I could tell Scotty to “Beam me up!” and be teleported back home. Another thing that really caught my eye on that show was their “universal translator.” It was basically this handheld device that allowed you to easily communicate across any language – be it human or alien!

article thumbnail

Realizing the unimaginable in distance learning

Jamf

With 48 hours notice, the faculty of the Sewanhaka Central High School District completely re-imagined education. They are teaching students from their living rooms. They are providing counseling sessions, and the essential services for special education and ELL students, entirely online. Read how Sewanhaka realized a goal they previously thought "unimaginable".

Education 126
article thumbnail

10 Ways to Leverage Buyer Signals and Drive Revenue

In today’s ultra-competitive markets, it’s no longer enough to wait for buyers to show obvious signs of interest. Instead, sales teams must be proactive, identifying and acting on nuanced buyer behaviors — often before prospects are fully ready to make a purchase. In this eBook from ZoomInfo & Sell Better, learn 10 actionable ways to use these buyer signals to transform your sales strategy and close deals faster.

article thumbnail

Zoom Removes Data-Mining LinkedIn Feature

Threatpost

The feature, criticized for "undisclosed data-mining," is only the latest privacy faux pas for Zoom this month.

Mining 108
article thumbnail

DXC employees support Alzheimer Scotland

DXC Technology

A team of DXC Technology employees based in Erskine, Scotland recently won an internal Charity Challenge award for their efforts to raise money and awareness for Alzheimer Scotland. The team consisted of employees across all areas of the business brought together by their passion and enthusiasm for supporting this charitable organisation, which provides much-needed support […].

105
105
article thumbnail

Marriott Was Hacked -- Again

Schneier on Security

Marriott announced another data breach, this one affecting 5.2 million people: At this point, we believe that the following information may have been involved, although not all of this information was present for every guest involved: Contact Details (e.g., name, mailing address, email address, and phone number) Loyalty Account Information (e.g., account number and points balance, but not passwords) Additional Personal Details (e.g., company, gender, and birthday day and month) Partnerships and

article thumbnail

Mitigating the risks of AuthorizationExecuteWithPrivileges and software installers

Jamf

Software installers are a critical part of every organization’s software deployment. See how you can leverage them securely and responsibly.

Risk 90
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

In COVID-19 Scam Scramble, Cybercrooks Recycle Phishing Kits

Threatpost

Old phishing kits are being pressed into service to keep up with the unprecedented volume of new scams that exploit the pandemic.

article thumbnail

A partnership for growth and innovation: IBM Informix and HCL

IBM Big Data Hub

Building on a history of collaboration, in April 2017, IBM and HCL entered into a 15-year partnership that merged the best of their shared knowledge and teaming experience to accelerate the product roadmap and innovation of IBM Informix.

85
article thumbnail

44M Digital Wallet Items Exposed in Key Ring Cloud Misconfig

Threatpost

Millions of IDs, charge cards, loyalty cards, gift cards, medical marijuana ID cards and personal information was left exposed to the open internet.

Cloud 85
article thumbnail

A Hacker's Perspective on Securing VPNs As You Go Remote

Dark Reading

As organizations rush to equip and secure their newly remote workforce, it's important to keep things methodical and purposeful

article thumbnail

Signal-Based Selling: How to Leverage 4 Key Buying Signals

As prospects define their problem, search for solutions, and even change jobs, they are generating high-value signals that the best go-to-market teams can leverage to close more deals. This is where signal-based selling comes into play. ZoomInfo CEO Henry Schuck recently broke down specific ways to put four key buying signals into action with the experts from 30 Minutes to President’s Club.

article thumbnail

Google Squashes High-Severity Flaws in Chrome Browser

Threatpost

Google is rolling out the newest Chrome browser version, 80.0.3987.162, in the coming days.

79
article thumbnail

Prioritizing High-Risk Assets: A 4-Step Approach to Mitigating Insider Threats

Dark Reading

Sound insider threat detection programs combine contextual data and a thorough knowledge of employee roles and behaviors to pinpoint the biggest risks.

Risk 73
article thumbnail

Emerging MakeFrame Skimmer from Magecart Sets Sights on SMBs

Threatpost

Attacks using a brand-new card-harvesting code is targeting small- to medium-sized businesses, claiming 19 sites so far.

article thumbnail

A Day in The Life of a Pen Tester

Dark Reading

Two penetration testers share their day-to-day responsibilities, challenges they encounter, and the skills they value most on the job.

70
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

3 Ways Onehub Can Help Your Team Work From Home During COVID-19

OneHub

The coronavirus has disrupted nearly all aspects of life, changing the way we shop, dine, and probably most importantly – work. Employees have been asked in nearly every state across the country – and in nearly every country across the world – to stay home and work remotely. Whether working from home will be a requirement for a few weeks or months, employers need to understand that it is more than simply giving your employees a laptop and sending them home without any direction.

article thumbnail

New Magecart Skimmer Infects 19 Victim Websites

Dark Reading

MakeFrame, named for its ability to make iframes for skimming payment data, is attributed to Magecart Group 7.

IT 70
article thumbnail

Webinar Invitation — AdTech and Privacy: Managing Risk in a Complex and Evolving Digital Economy

HL Chronicle of Data Protection

Join Hogan Lovells and Ankura to learn about the impact of the GDPR and CCPA on cookies and similar AdTech tracking technologies. James Denvil from Hogan Lovells’ Privacy and Cybersecurity practice by senior directors from Ankura to share best practices and their perspectives. Program topics will include: Cookies and Similar Tracking Technologies Defined.

Privacy 59
article thumbnail

Reassuring Words and Good Intentions Don't Mean Good Security

Troy Hunt

How much can you trust the assertions made by an organisation regarding their security posture? I don't mean to question whether the statements are truthful or not, but rather whether they provide any actual assurance whatsoever. For example, nearly 5 years ago now I wrote about how "we take security seriously" was a ridiculous statement to make immediately after a data breach.

Security 101