Categories
Featured

Top security guard firm exposed over a million files online

[ad_1]

A security guard firm was found leaking data that could lead to identity theft, physical breaches, theft, and even terrorism.

The news comes from cybersecurity researcher Jeremiah Fowler, who found an online database containing more than 1.2 million documents. The database did not have any sort of protection and could be accessed by anyone who knew where to look, WebsitePlanet reported. 

[ad_2]

Source Article Link

Categories
Featured

Security flaw in popular proxy service leaves 50,000 hosts vulnerable

[ad_1]

More than half of Tinyproxy service hosts are running a flawed version which hackers could use in remote code execution attacks, a new report from researchers from Cisco Talos has claimed.

Tinyproxy is a lightweight HTTP/HTTPS proxy server commonly used to improve internet access speed by caching frequently accessed web pages, filtering out unwanted content, and providing anonymity. 

[ad_2]

Source Article Link

Categories
Featured

Microsoft adds more security chiefs following recent cyberattacks

[ad_1]

Microsoft has just unveiled the next step in its major cybersecurity overhaul, and that is to hire security executives for different product groups.

Following a string of major cyberattacks, and the subsequent US government “call to arms” of sorts, Microsoft decided to completely revamp its cybersecurity practices, and “put security above all else”, as CEO Satya Nadella recently put it. 

[ad_2]

Source Article Link

Categories
Featured

Major industries reported two critical security incidents every day in 2023

[ad_1]

Major industries, including finance, IT, industrial and government sectors, report over two critical security incidents with direct human involvement per day, new research from Kaspersky shows.

The Managed Detection and Response Analyst Report for 2023 details that more than one in five (22.9%) of high-severity incidents in 2023 were reported by the government sector, closely followed by the IT sector (15.4%).

[ad_2]

Source Article Link

Categories
Featured

Security and interoperability on the cards for US government use of Zoom, Slack and Teams

[ad_1]

Popular collaboration tools such as Microsoft Teams, Zoom, Slack and Google may be required to implement end-to-end encryption and interoperability if used by US federal agencies.

Legislation put forward by US Senator Ron Wyden, titled as the Secure and Interoperable Government Collaboration Technology Act is looking to boost security for such tools following a number of high-profile recent incidents.

[ad_2]

Source Article Link

Categories
Featured

CISOs are nervous Gen AI use could lead to more security breaches

[ad_1]

Chief Information Security Officers (CISO) are becomingly ever more concerned the increasing use of Generative AI tools could lead to more cybersecurity incidents.

A new pape by security experts Metomic surveying more than 400 CISOs in the UK and the US found security breaches linked to generative AI worry almost three-quarters (72%) of the respondents.

[ad_2]

Source Article Link

Categories
Featured

Over a billion users could be at risk from keyboard logging app security flaw

[ad_1]

Almost a billion mobile users, holding various devices, could have had their communications revealed to malicious third parties, a report from cybersecurity researchers Citizen Lab claims.

It says different device manufacturers have used different keyboard apps which were relaying unencrypted communications, transmitting keystrokes via plaintext, and similar. Tencent QQ Pinyin, Baidu IME, iFlytek IME, Samsung Keyboard on Android, Xiaomi (with keyboard apps from Baidu, iFlytek, and Sogou), OPPO, Vivo, Honor, all of these allowed potential threat actors to decrypt Chinese mobile users’ keystrokes, completely passively, and without the users needing to send any extra network traffic.

[ad_2]

Source Article Link

Categories
Featured

Microsoft says Russian hackers are exploiting an ancient printer security flaw

[ad_1]

Russian state-sponsored threat actors were observed abusing an old printer vulnerability to drop custom malware on target endpoints.

The malware helped them exfiltrate sensitive data and login credentials. This is according to a new report from Microsoft Threat Intelligence, published earlier this week.

[ad_2]

Source Article Link

Categories
Featured

A critical security flaw could affect thousands of WordPress sites

[ad_1]

Hundreds of thousands of WordPress websites are vulnerable to a critical severity flaw which allows threat actors to upload malware to the site through a bug in a plugin. 

As reported by BleepingComputer, Japan’s CERT recently found a critical severity flaw (9.8) in the Forminator plugin, built by WPMU DEV. The flaw, now tracked as CVE-2024-28890, allows threat actors to obtain sensitive information by accessing files on the server.

[ad_2]

Source Article Link

Categories
Bisnis Industri

How to activate iPhone security feature

[ad_1]

iPhone Stolen Device Protection offers increased safety for your accounts and financial information if someone steals your handset and its passcode.

Here’s how to activate the security feature that debuted in iOS 17.3, and — more importantly — why you should do it now.

Stolen Device Protection: How to activate

You don’t have to take my word that this new feature is a valuable enhancement. Tony Anscombe, chief security evangelist for global cybersecurity leader ESET, told Cult of Mac:

“Stolen Device Protection makes it harder for unauthorised access or alteration of sensitive settings making iPhones less appealing to criminals. This enhanced protection serves as a long-awaited deterrent, increasing the difficulty for thieves targeting such devices.

“While it’s impossible to completely prevent theft as perpetrators continually find new workarounds and exploits, this feature adds a significant hurdle. Organised crime groups, often involved in handling stolen phones, may now need to work that much harder to bypass it.”

The new feature in iOS 17.3 is intended to counter a specific type of crime: muggers who steal someone’s iPhone and then demand the passcode to unlock it. That gives the criminal access to all the personal information stored on the device.

Advantages of iPhone Stolen Device Protection

With iPhone Stolen Device Protection activated, changing the Apple ID passcode requires Face ID/Touch ID and an hour-long wait. It can’t be changed quickly.

What that means is if a mugger steals your iPhone and forces you to give them the passcode, you have an hour to get to another computer, go to icloud.com and lock the device so it can’t be accessed even with the passcode.

To keep that restriction from being burdensome, SDP is only in effect when the iPhone is away from your home or workplace.

And iPhone Stolen Device Protection does more to stymie criminals. It requires Face ID to access saved passwords. The same goes for erasing the device, accessing saved credit card info in Safari, applying for an Apple Card and more.

More security never hurt

How to activate iPhone Stolen Device Protection
Look for Stolen Device Protection in the Face ID & Passcode section of the Settings apps.
Screenshots: Ed Hardy/Cult of Mac

iPhone Stolen Device Protection is optional and must be activated by you. If you don’t, it’s off. But if you want to upgrade the security on your handset, here’s what to do.

The first step in taking advantage of the new security feature is installing iOS 17.3. Apple released this to the public on January 22, so head to Settings -> General -> Software Update to get the latest version.

Next, go to Settings -> Face ID & Passcode. You’ll be required to enter your passcode to access this section.

Scroll down until you get to Stolen Device Protection. It’ll be off, so tap Turn On Protection.

And there, you’re done. You get all the benefits described above.

iPhone Stolen Device Protection can't be quickly deactivated
A thief trying to deactivate iPhone Stolen Device Protection has to wait an hour.
Screenshot: Ed Hardy/Cult of Mac

If you decide to reactivate the feature at some later date, go through these same steps but tap Turn Off Protection. You’ll have to pass Face ID and wait an hour to make the change. If canceling SDP was quick and easy, the person who stole your iPhone could simply turn it off.

For more details on the security feature, read the Apple support document “About Stolen Device Protection for iPhone.”

We originally published this post on how to turn on iPhone Stolen Device Protection on January 25, 2024. We updated the info.



[ad_2]

Source Article Link