Understanding The Importance of Designing for Security

Understanding The Importance of Designing for Security

By Camille Morhardt, Director of Security Initiatives and Communications at Intel, and Tom Garrison, VP and GM of Client Security Strategy and Initiatives at Intel Robust security is a necessary and critical component of achieving a high-quality product. This is obvious when we consider security in a home or safety in a car or an airplane. And it’s the same with computing devices. From the initial architecture formation through the device build process to ongoing…

Read More

Maintaining access control for employees and preventing new hire fraud

Maintaining access control for employees and preventing new hire fraud

Maintaining access control for employees and preventing new hire fraud | 2021-08-20 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Great Resignation hits IT departments and companies are switching strategies

Great Resignation hits IT departments and companies are switching strategies

To ensure business continuity amid high turnover, many CIOs are planning to alter their strategies to make the company “less dependent on employee institutional knowledge,” says PwC. Image: iStock/alphaspirit After a year of layoffs and hiring freezes, companies have increased hiring in recent months. At the same time, a tight labor market and Great Resignation of sorts has companies using deal sweeteners to attract top talent and fill openings. On Thursday, PwC released the results…

Read More

Attack that defeats AMD chip security possible, unlikely

Attack that defeats AMD chip security possible, unlikely

AMD likes to crow about how its Epyc server processors can encrypt the content of virtal machines while they’re in operation so they are secure and isolated, preventing other VMs on the processor from accessing the encrypted contents. Well, researchers from the Technical University of Berlin have found a weakness in that feature, known as Secure Encrypted Virtualization (SEV), and published a theoretical attack that defeats the protection. The paper ”One Glitch to Rule Them…

Read More

How to protect your T-Mobile account in light of the latest data breach

How to protect your T-Mobile account in light of the latest data breach

In response to a breach that compromised the personal data of millions of subscribers, T-Mobile customers should change their password and PIN and set up two-step verification. A cyberattack against T-Mobile has resulted in the theft and compromise of certain personal data of almost 50 million people. This week, the carrier acknowledged a major data breach in which cybercriminals obtained the first and last names, dates of birth, Social Security numbers (SSNs) and driver’s license/ID…

Read More

Anti-Money Laundering Fines Fall by 50% in 1H 2021

Anti-Money Laundering Fines Fall by 50% in 1H 2021

Global fines for anti-money laundering (AML) and data privacy compliance breaches have fallen by nearly 50% year-on-year in the first half of 2021, but could bounce back quickly as financial crime continues apace, according to Fenergo. The digital transformation company claimed that 85 individual fines were levied on global financial institutions for breaches of AML, Know Your Customer (KYC) and data privacy laws in the first six months of 2021 — a drop of 26% on…

Read More

Man Gets Three Years for Stealing Nude Photos from College Victims

Man Gets Three Years for Stealing Nude Photos from College Victims

A New York man has been sentenced to three years behind bars after stealing nude images of dozens of female victims whose social media accounts he hacked. Nicholas Faber, 25, of Rochester, pleaded guilty back in February to one count of computer intrusion causing damage and one count of aggravated identity theft. From around 2017 to 2019, Faber admitted to working with co-conspirator Michael Fish to access the email accounts of dozens of female college…

Read More

Crunch Time for Liquid as Cryptocurrency Exchange Loses $97m to Hackers

Crunch Time for Liquid as Cryptocurrency Exchange Loses m to Hackers

A Japanese cryptocurrency exchange is estimated to have lost $97m after threat actors targeted the company. Tokyo-headquartered Liquid revealed the incident on Thursday evening local time. “We are sorry to announce that #LiquidGlobal warm wallets were compromised, we are moving assets into the cold wallet,” it said in a brief update. “We are currently investigating and will provide regular updates. In the meantime, deposits and withdrawals will be suspended.” According to London-based blockchain analysis company Elliptic, the cyber-thieves…

Read More

How US security teams can learn from the events of the Manchester Arena terror attack and the subsequent Protect Duty

How US security teams can learn from the events of the Manchester Arena terror attack and the subsequent Protect Duty

How US security teams can learn from the events of the Manchester Arena terror attack and the subsequent Protect Duty | 2021-08-20 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of…

Read More

Confronting your fear of ransomware

Confronting your fear of ransomware

Confronting your fear of ransomware | 2021-08-20 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More
1 3,655 3,656 3,657 3,658 3,659 4,063