Protecting critical infrastructure intrusions with device-level protection

Protecting critical infrastructure intrusions with device-level protection

Protecting critical infrastructure intrusions with device-level protection | 2021-04-21 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Apple supplier Quanta hit with $50 million ransomware attack from REvil

Apple supplier Quanta hit with  million ransomware attack from REvil

Hackers claim to have infiltrated the networks of Quanta Computer Inc., which makes Macbooks and hardware for HP, Facebook and Google. Red binary computer code ransom screen background with stop symbol sign. Suebsiri, Getty Images/iStockphoto Ransomware group REvil claimed in a blog post published on Tuesday to have stolen blueprints for Apple’s latest products. On the same day, Apple CEO Tim Cook announced multiple new products at an online event.  Quanta Computer Inc. acknowledged the…

Read More

Oracle April 2021 Critical Patch Update Addresses 257 CVEs including ‘Zerologon’ (CVE-2020-1472)

Oracle April 2021 Critical Patch Update Addresses 257 CVEs including ‘Zerologon’ (CVE-2020-1472)

Oracle addresses over 250 CVEs in its second quarterly update of 2021 with 390 patches, including 34 critical updates. Background On April 20, Oracle released its Critical Patch Update (CPU) for April 2021, the second quarterly update of the year. This CPU update contains fixes for 257 CVEs in 390 security updates across 32 Oracle product families. Out of the 390 security updates published this quarter, over 50% were assigned a high severity. Critical vulnerabilities…

Read More

The award for the most popular movie used in leaked passwords goes to…

The award for the most popular movie used in leaked passwords goes to…

Ahead of Sunday’s Oscars awards ceremony, password management provider Specops rolls out the red carpet to reveal its list. Image: designer491, Getty Images/iStockPhoto “Rocky” might be your all-time favorite movie, but if you’re using it as a password, beware. This highly popular, feel-good boxing movie of the 1970s has the dubious distinction of showing up on breached password lists nearly 96,000 times, according to password management provider Specops. Just ahead of Sunday’s Oscars, the firm…

Read More

Stallone Classic a Password Favorite

Stallone Classic a Password Favorite

New analysis of leaked login data has revealed which movie titles most frequently feature in passwords. Specops trawled through more than 800 million breached passwords to determine which big-screen hits were favored by users. The selection was a subset of a list of 2 billion passwords that have appeared in breached lists. Topping the list was the sports drama Rocky, written by and starring Sylvester Stallone as a kind-hearted working class Italian-American boxer who dreams of fighting his…

Read More

Q&A on the Optional P2PE Solution Inventory Template

Q&A on the Optional P2PE Solution Inventory Template

  Point-to-Point Encryption (P2PE) technology makes data unreadable so it has no value to criminals even if stolen in a breach. Merchants can take advantage of this technology with a P2PE solution, a combination of secure devices, applications, and processes that encrypt payment card data from the point it is used at a payment terminal until it reaches a secure point of decryption. PCI P2PE Solutions are those that have been validated as meeting the…

Read More

Data Breach at New England’s Largest Energy Provider

Data Breach at New England’s Largest Energy Provider

A misconfiguration error has exposed personal data belonging to customers of New England’s largest energy provider. On March 16, Eversource discovered that one of its cloud data storage folders had erroneously been set to open access rather than to restricted access.  The company serves more than 3.6 million electric and natural gas customers in Connecticut, Massachusetts, and New Hampshire. An investigation into the data breach launched by Eversource’s security team found that the unsecured folder…

Read More

TikTok Sued Over Use of Minors’ Data

TikTok Sued Over Use of Minors’ Data

Video-sharing social networking service TikTok is being sued for billions of dollars over its alleged mishandling of children’s data.  TikTok, which is owned by Chinese company ByteDance, has more than 800 million users worldwide. Internal company data from July 2020 reported by the New York Times showed 18 million TikTok users were aged 14 years or younger. The claim against the company has been filed by Anne Longfield, children’s commissioner for England, on behalf of the millions of minors in…

Read More

Trust Nobody, Not Even Yourself: Time to Take Zero Trust Seriously | McAfee Blogs

Trust Nobody, Not Even Yourself: Time to Take Zero Trust Seriously | McAfee Blogs

In the working world, there’s a chance you’ve come across your fair share of team-building exercises and workshops. There’s one exercise that comes to mind that often results in worried, and uneasy faces during these seminars: The Trust Fall. This is where you fall backward with the expectation that your colleague will catch you before you hit the ground.    Whether you have been with an organization for many years or just started, the same “pit in stomach” feeling reverberates across bellies as…

Read More
1 2,393 2,394 2,395 2,396 2,397 2,657