‘FragAttack’ flaws threaten Wi-Fi, but not too seriously

‘FragAttack’ flaws threaten Wi-Fi, but not too seriously

Almost all Wi-Fi is potentially vulnerable to flaws that date back to 1997 when it became commercially available, but even the person who discovered the weaknesses says some of them are difficult to exploit. Mathy Vanhoef, a post-doctoral student at NYU Abu Dhabi, has created attacks—FragAttacks—that take advantage of the vulnerabilities, but in an academic paper about them, says the most widespread vulnerabilities can be exploited only under specific, rare conditions, and require either user…

Read More

Palo Alto Networks Appoints Aparna Bawa to Its Board of Directors

Palo Alto Networks Appoints Aparna Bawa to Its Board of Directors

SANTA CLARA, Calif., May 14, 2021 /PRNewswire/ — Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, today announced the appointment of Aparna Bawa to the company’s board of directors. “Aparna is a proven leader who has helped technology companies rapidly scale, and I’m pleased to welcome her to our board,” said Nikesh Arora, chairman and CEO of Palo Alto Networks. “She embodies our commitment to an experienced, creative and diverse leadership team. Along with other…

Read More

Forrester Recognizes Cisco Secure Endpoint Advancements – Promotes to Strong Performer – Cisco Blogs

Forrester Recognizes Cisco Secure Endpoint Advancements – Promotes to Strong Performer – Cisco Blogs

Secure Endpoint offers more as shown in new Forrester Wave report At the publishing of the previous Q3 2019 Forrester Wave report for Endpoint Security Suites, Secure Endpoint was lauded as one of the least obtrusive security products to end-user productivity. Now, per Forrester’s Q2 2021 report, Cisco has increased its market presence to the next level and has moved upward from a Contender to a Strong Performer, well poised to break into the nearby…

Read More

Expert: Intel sharing is key to preventing more infrastructure cyberattacks

Expert: Intel sharing is key to preventing more infrastructure cyberattacks

Old technology and fear of sharing proprietary information are keeping companies from helping each other thwart attacks. TechRepublic’s Karen Roby spoke with Neal Dennis, a threat intel specialist at Cyware Labs, about threats to the U.S. power grid. The following is an edited transcript of their conversation. Karen Roby: Intel sharing, this is something that you’ve been immersed in for many years as a former Marine and then made cybersecurity your specialty. Talk a little…

Read More

Lemonade Denies “Unforgivably Negligent” Security Gaffe

Lemonade Denies “Unforgivably Negligent” Security Gaffe

Insurtech company Lemonade has refuted claims put forward by a short seller that it has an “unforgivably negligent security flaw” on its website. Muddy Waters Research LLC alleges that a vulnerability exists on Lemonade’s website that could potentially expose customers’ personally identifiable information.  The investor claims that it was able to log in to and edit Lemonade customer accounts without having to enter any user credentials.  In an open letter to Lemonade CEO Dan Schreiber dated May 13, Muddy Waters…

Read More

US Sentences Cyber-Stalker Who Sent Sex Workers to Family’s Home

US Sentences Cyber-Stalker Who Sent Sex Workers to Family’s Home

A cyber-stalker from Hawaii who tormented a Utah family by sending more than 500 unwanted service people to their home has been placed under three years of supervision. Loren M. Okamura was arrested in December 2019 on charges of cyber-stalking, making interstate threats, and transporting a person over state lines for the purpose of prostitution.  Over a seven-month period that started in August 2018, Okamura sent up to 20 people a day to the North…

Read More

Rapid7 Source Code Accessed in Cyber-attack

Rapid7 Source Code Accessed in Cyber-attack

Source code and credentials belonging to cybersecurity company Rapid7 were accessed by an unauthorized third party during a supply-chain attack on Codecov. Starting on January 31, hackers gained restricted access to hundreds of networks belonging to Codecov’s customers by tampering with one of the San Francisco–based company’s software development tools. Codecov, whose customers include IBM and Hewlett-Packard, announced on April 15 that a malicious party had gained access to its Bash Uploader script and modified it. “The actor gained access…

Read More

Executive impersonation attacks increased substantially between Q1 2020 and Q1 2021

Executive impersonation attacks increased substantially between Q1 2020 and Q1 2021

Executive impersonation attacks increased substantially between Q1 2020 and Q1 2021 | 2021-05-14 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

New Executive Order Seeks to Strengthen Security of Fed Gov Networks

New Executive Order Seeks to Strengthen Security of Fed Gov Networks

The Biden Administration published a new executive order (EO) to strengthen the digital security of U.S. federal government networks. Published on May 12 by The White House, the executive order covered much of what many media outlets reported would appear in the draft. This included the issue of supply chain security. For example, the EO stated that the U.S. federal government will begin requiring developers to make security data about their tools publicly available. It…

Read More
1 3,379 3,380 3,381 3,382 3,383 3,571