Mastercard Introduces Quantum-Resistant Specs to Enhance Contactless Security

Mastercard Introduces Quantum-Resistant Specs to Enhance Contactless Security

Credit card firm Mastercard has unveiled new quantum-resistant standards that are designed to enhance the security and privacy of contactless payments. As a result of the move, Mastercard will become the first payments network to bring quantum-era security and privacy to contactless payments. The Enhanced Contactless (Ecos) specifications have been introduced following a surge in contactless payments over the past year, fuelled by the desire for more hygienic payment methods in-store as a result of…

Read More

TikTok Bug Gave Access to Contacts’ Profile Details

TikTok Bug Gave Access to Contacts’ Profile Details

Researchers have discovered a vulnerability in TikTok which could have allowed attackers to harvest users’ phone numbers and personal profile details. Check Point revealed today that the flaw, which has now been fixed by the popular social network, was found in the app’s “Find Friends” feature. The problem stems from the fact that TikTok allows users to sync their phone contacts with the app, thus connecting user profiles with phone numbers. If exploited, the flaw…

Read More

Using vim to quickly encrypt and decrypt files

Using vim to quickly encrypt and decrypt files

Any time you have a text file on a Linux system that you want to keep private regardless of the privileges that other users with accounts on the system may have, you can resort to encryption. One easy way to do this is to use a feature that is built into the vim editor. You will have to provide a password that will you then need to remember or store in a password safe, but…

Read More

Cook County Leaks 320,000 Court Records

Cook County Leaks 320,000 Court Records

Over 320,000 court records belonging to the second most populous county in the US have been discovered sitting on a misconfigured online database. Security researcher Jeremiah Fowler and a team from Website Planet soon found that the data was all from Cook County, Illinois, which is home to America’s third-largest city, Chicago. “There have been several high -profile data exposures of private companies that affected Cook County residents in the past few years including a…

Read More

Misconfigured Cloud Server Exposes 66,000 Gamers

Misconfigured Cloud Server Exposes 66,000 Gamers

Tens of thousands of users have had their personal details exposed after a popular online gaming site misconfigured the Elasticsearch server they were sitting on. A research team at WizCase found the wide-open server, with zero encryption and no password protection, through a simple search. It was traced back to VIPGames.com, a popular free-to-play card and board game platform with 100,000 Google Play downloads and roughly 20,000 active daily players globally. The site features games…

Read More

2020 cyber security statistics – IT Governance UK Blog

2020 cyber security statistics – IT Governance UK Blog

In 2020, we recorded 1,120 breaches and cyber attacks that were reported on in mainstream media, which accounted for 20,120,074,547 leaked records. Compiling this information enables us to see how security incidents occur and the trends to look out for. Did you know, for example, that the number of disclosed incidents shot up in the second half of the year, showing the impact that COVID-19 has had on organisations? Or that there was a 50%…

Read More

5 minutes with Wade Lance – Ransomware and lateral movement

5 minutes with Wade Lance – Ransomware and lateral movement

5 minutes with Wade Lance – Ransomware and lateral movement | 2021-01-26 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Climate-influenced weather was key driver of $268B in global damage in 2020

Climate-influenced weather was key driver of 8B in global damage in 2020

Climate-influenced weather was key driver of $268B in global damage in 2020 | 2021-01-26 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy…

Read More

Reliable asset tracking: The importance of IoT, battery life and location accuracy

Reliable asset tracking: The importance of IoT, battery life and location accuracy

Reliable asset tracking: The importance of IoT, battery life and location accuracy| Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

A Look at the Legal Consequence of a Cyber Attack

A Look at the Legal Consequence of a Cyber Attack

Is your system 100% ready to face the severest cyber-attack and mitigate the risk of a possible data breach? If you are unsure about your cyber-safety structure, then it’s time to upgrade it. Otherwise, you could be at risk of lengthy legal battles that result in hefty fines. Beyond that, the cost in terms of reputational loss could be catastrophic if not handled meticulously by professionals within a reasonable time. Despite the best cybersecurity practices,…

Read More
1 106 107 108 109 110 268