New US Bill Will Punish Foreign Firms’ IP Theft

New US Bill Will Punish Foreign Firms’ IP Theft

The US Senate has unanimously passed a new bipartisan bill designed to punish foreign firms that actively seek to steal American intellectual property (IP). Co-authored by senators Chris Van Hollen and Ben Sasse, the Protecting American Intellectual Property Act will allow the authorities to place sanctions on firms and individuals associated with such activity. It will require a report to Congress every six months identifying any individual or firm that has engaged in or benefitted…

Read More

When strength in numbers is on the wrong side

When strength in numbers is on the wrong side

When strength in numbers is on the wrong side | 2020-12-21 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

US Indicts Former Zoom China Liaison for Doing PRC’s Bidding

US Indicts Former Zoom China Liaison for Doing PRC’s Bidding

A former China liaison at Zoom has been indicted by the US for interfering in meetings, monitoring users and fabricating evidence against them as per Beijing’s instructions. Xinjiang (“Julien”) Jin, faces a maximum 10 years in prison if found guilty of conspiracy to commit interstate harassment and unlawful conspiracy to transfer a means of identification. However, Jin is unlikely to face trial given that he’s based in China. The former Zoom man was originally hired…

Read More

Shadow IT was a security crisis. Now Shadow IT 2.0 is looming. Let’s skip the crisis this time.

Shadow IT was a security crisis. Now Shadow IT 2.0 is looming. Let’s skip the crisis this time.

Shadow IT was a security crisis. Now Shadow IT 2.0 is looming. Let’s skip the crisis this time. | 2020-12-21 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit…

Read More

The kids are not alright: How some Millennials and Gen Zers are cybersecurity liabilities

The kids are not alright: How some Millennials and Gen Zers are cybersecurity liabilities

The kids are not alright: How some Millennials and Gen Zers are cybersecurity liabilities | 2020-12-21 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and…

Read More

#TripwireBookClub – A Review of The Ghidra Book

#TripwireBookClub – A Review of The Ghidra Book

It’s been a little while since we last reviewed a book, but a lot of my team has been spending time with Ghidra this year. Craig Young taught a course on the subject, and I’ve used it with my students at Fanshawe College in their Malware Analysis course. Given our fascination with Ghidra, reviewing The Ghidra Book: The Definitive Guide by Chris Eagle and Kara Nance from No Starch Press made sense. I have a…

Read More

The Most Common Website Security Attacks (and How to Protect Yourself)

The Most Common Website Security Attacks (and How to Protect Yourself)

Every website on the Internet is somewhat vulnerable to security attacks. The threats range from human errors to sophisticated attacks by coordinated cyber criminals. According to the Data Breach Investigations Report by Verizon, the primary motivation for cyber attackers is financial. Whether you run an eCommerce project or a simple small business website, the risk of a potential attack is there. It’s more important than ever to know what you’re up against. Each malicious attack…

Read More

All Aboard The COVID-19 Train: Malware Trends Taking Advantage of The Pandemic – Cyber Defense Magazine

All Aboard The COVID-19 Train: Malware Trends Taking Advantage of The Pandemic – Cyber Defense Magazine

By Bar Block, Threat Intelligence Researcher at Deep Instinct Since the outbreak of COVID-19, plenty of COVID-19 themed malware attacks have surfaced around the globe. Attackers take every chance they get to spread their malware, and the pandemic has given them ripe opportunities. Based on data from D-Cloud, Deep Instinct’s Threat intelligence and telemetry cloud environment, the number of attacks has overall risen. This is particularly seen in the number of malicious executables and Office…

Read More

Financial Data Security Risks in The Hands of Online Shops or Intermediary Applications – Cyber Defense Magazine

Financial Data Security Risks in The Hands of Online Shops or Intermediary Applications – Cyber Defense Magazine

By Ben Hartwig, Web Operations Executive, InfoTracer Online retail fraud continues to rise year on year. Fraudsters are becoming more sophisticated and although we can put more and more consumer protection laws in place for protection, there is always a risk when providing your personal information online. Even if apps and stores that have access to your credit card or other details take measures to keep data safe, there is always the chance that hackers…

Read More

VERT Alert: SolarWinds Supply Chain Attack

VERT Alert: SolarWinds Supply Chain Attack

Vulnerability Description The United States Cybersecurity & Infrastructure Security Agency (CISA) has advised that an advanced persistent threat (APT) actor was able to insert sophisticated malware into officially signed and released updates to the SolarWinds network management software [1]. The attacks have been ongoing since at least March 2020 and CISA has warned that many high-value targets within government, critical infrastructure, and the private sector have been compromised. Private security firm FireEye has also disclosed…

Read More
1 2,462 2,463 2,464 2,465 2,466 2,541