Germany Bans Facebook from Processing WhatsApp Data

Germany Bans Facebook from Processing WhatsApp Data

A German privacy watchdog has banned social media company Facebook from harvesting data on WhatsApp users.  Hamburg’s data protection commissioner said that WhatsApp’s privacy policy was in breach of European data protection rules following a recent change.  WhatsApp, which was bought by Facebook in 2014, has more than 2 billion monthly users. In January 2021, the app asked its users to grant WhatsApp additional powers to share their data with its parent company, Facebook.  Users have been given until…

Read More

Panda Stealer targets cryptocurrency wallets and VPN credentials via malicious XLS attachment

Panda Stealer targets cryptocurrency wallets and VPN credentials via malicious XLS attachment

This latest attack also steals credentials from Telegram, Discord and Steam, according to a Trend Micro analysis. Image: iStockPhoto/danijelala Bad actors put a new twist on an existing piece of malware to steal private keys for cryptocurrency accounts and other account credentials, according to analysis from Trend Micro. The entry point is a spam email that contains a request for a quote for business services and malicious Excel files. Panda Stealer uses a fileless approach…

Read More

Good sound versus bad sound and why it matters

Good sound versus bad sound and why it matters

Good sound versus bad sound and why it matters | 2021-05-11 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

The future of AI integration with secured entrances

The future of AI integration with secured entrances

The future of AI integration with secured entrances | 2021-05-11 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Communication changes for remote security teams

Communication changes for remote security teams

Communication changes for remote security teams | 2021-05-11 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Cloud Native Security Approach Comparisons | McAfee Blogs

Cloud Native Security Approach Comparisons | McAfee Blogs

Vinay Khanna, Ashwin Prabhu & Sriranga Seetharamaiah also contributed to this article.  In the Cloud, security responsibilities are shared between the Cloud Service Provider (CSP) and Enterprise Security teams. To enable Security teams to provide compliance, visibility, and control across the application stack, CSPs and security vendors have added various innovative approaches across the different layers. In this blog we compare the approaches and provide a framework for Enterprises to think of these approaches. Overview Cloud…

Read More

#CYBERUK21: Home Secretary Outlines UK Government’s Plan to Tackle Growing Cyber-Threats

#CYBERUK21: Home Secretary Outlines UK Government’s Plan to Tackle Growing Cyber-Threats

Cybersecurity has become a critical component of the UK’s homeland security mission, with more robust action from government required to deal with the dangers in this space. This was the message of UK Home Secretary Priti Patel, speaking during the CYBERUK 2021 online event. Patel noted that as home secretary, it is her duty to keep citizens safe while at the same time protecting economic prosperity, with “cybersecurity and resilience [becoming] increasingly important” aspects of this,…

Read More

AXA to Stop Reimbursing Ransom Payments

AXA to Stop Reimbursing Ransom Payments

A major global insurer has said it will stop reimbursing French clients who fall victim to ransomware, for any costs they incur paying their extorters. AXA said it had taken the decision after listening to the concerns of French officials and cybersecurity experts last month, according to AP. Ransom and associated downtime costs for French corporate victims stood at over $5.5 billion last year, off the back of over 4400 attacks, according to one estimate….

Read More

Industrial Cybersecurity: Guidelines for Protecting Critical Infrastructure

Industrial Cybersecurity: Guidelines for Protecting Critical Infrastructure

Over the weekend, the Alpharetta, GA based Colonial Pipeline was hit by an extensive ransomware attack that shut down its information technology (IT) and industrial operational technology (OT) systems. Simply put, an all-too-common ransomware event targeting IT systems encouraged a voluntary shutdown on the production side (OT) of the business to prevent further exposure. Colonial Pipeline is responsible for 45% of the gasoline, diesel fuel and natural gas transported from Texas to New Jersey. A…

Read More

“Fool’s Gold”: Questionable Vaccines, Bogus Results, and Forged Cards | McAfee Blogs

“Fool’s Gold”: Questionable Vaccines, Bogus Results, and Forged Cards | McAfee Blogs

Preface Countries all over the world are racing to achieve so-called herd immunity against COVID-19 by vaccinating their populations. From the initial lockdown to the cancellation of events and the prohibition of business travel, to the reopening of restaurants, and relaxation of COVID restrictions on outdoor gatherings, the vaccine rollout has played a critical role in staving off another wave of infections and restoring some degree of normalcy. However, a new and troubling phenomenon is…

Read More
1 2,284 2,285 2,286 2,287 2,288 2,578