Jones Day Denies Network Breach

Jones Day Denies Network Breach

American legal giant Jones Day says its computer network has not been compromised following a cyber-attack on the firm’s file-transfer vendor Accellion. Accellion’s 20-year-old FTA (Files Transfer Appliance) file-transfer platform was “the target of a sophisticated cyberattack,” according to a statement issued by the company on February 1.  The Wall Street Journal reports that a hacker known as Clop has leaked some documents online that they claim have been stolen from Jones Day. Among the documents are a cover letter for “confidential…

Read More

#DTX Tech Predictions Mini Summit: How to Build a Strong Cybersecurity Culture

#DTX Tech Predictions Mini Summit: How to Build a Strong Cybersecurity Culture

The ways organizations should go about establishing a strong internal cybersecurity culture was discussed by a panel during the Tech Predictions Mini Summit. The speakers firstly acknowledged that cyber-criminals are increasingly exploiting the lack of security awareness amongst staff to target organizations. Javvad Malik, security awareness advocate at Knowbe4, outlined social engineering attacks and credential stuffing attacks as among the main vectors he sees employed, methods which trick users into clicking on a malicious link…

Read More

Top 5 things to know about adversarial attacks

Top 5 things to know about adversarial attacks

Machine learning is helpful to many organizations in the tech industry, but it can have a downside. Tom Merritt lists five things to know about adversarial attacks. Machine learning is being used for a lot of great things, from guiding autonomous cars to creating pictures of cats that don’t actually exist. Of course, as with any technology, if it exists someone will want to hack it. Some of those hackers will be malicious. Adversarial attacks…

Read More

Microsoft’s Power BI gets new tools to prevent leakage of confidential data

Microsoft’s Power BI gets new tools to prevent leakage of confidential data

Information protection makes sure that only people with permissions see data in Power BI, while retaining the ability to share top-level trends, balancing productivity and security. Microsoft’s Power BI is used to build complex analytical projects spanning multiple data sources. New tooling helps administrators and professionals manage and govern these projects. Image: Microsoft Whatever business intelligence tool you’re using, it connects to Excel. “If you want to build a new BI product, the first feature…

Read More

Security presents the Cybersecurity & Geopolitical video podcast

Security presents the Cybersecurity & Geopolitical video podcast

Security presents the Cybersecurity & Geopolitical video podcast | 2021-02-17 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

New Docker Desktop Preview for Apple M1 Released – Docker Blog

New Docker Desktop Preview for Apple M1 Released – Docker Blog

This is just a quick update to let you know that we’ve released another preview of Docker Desktop for Apple M1 chips, which you can download from our Docker Apple M1 Tech Preview page. The most exciting change in this version is that Kubernetes now works. First, a big thank you to everyone who tried out the previous preview and gave us feedback. We’re really excited to see how much enthusiasm there is for this,…

Read More

Top 100 Cybersecurity Movies

Top 100 Cybersecurity Movies

The Computer Wore Tennis Shoes (1969) In The Computer Wore Tennis Shoes, Kurt Russell stars as an underachieving college student whose intellectual capabilities skyrocket after an electrical accident with a computer when its “brain” fuses with his own. (Note: you’re going to notice this type of theme with multiple movies on this list — someone gets zapped during a storm or electrical overload and, bam, something major happens as a result… yada, yada, yada.) The…

Read More

NIST anticipates upgrades to system for scoring a phish’s deceptiveness

NIST anticipates upgrades to system for scoring a phish’s deceptiveness

A graph representing the NIST Phish Scale scoring methodology. (NIST) Officials from the National Institute of Standards and Technology (NIST) this week teased future improvements to the agency’s recently introduced “Phish Scale” measurement system, which helps companies determine whether phishing emails are hard or easy for their employees to detect.  Future plans for the scoring methodology include the incorporation of operational data pulled from multiple organizations, plus the addition of a user guide for training implementers…

Read More

Don’t Call Us We’ll Call You: McAfee ATR Finds Vulnerability in Agora Video SDK | McAfee Blogs

Don’t Call Us We’ll Call You: McAfee ATR Finds Vulnerability in Agora Video SDK | McAfee Blogs

The McAfee Advanced Threat Research (ATR) team is committed to uncovering security issues in both software and hardware to help developers provide safer products for businesses and consumers. We recently investigated and published several findings on a personal robot called “temi”, which can be read about in detail here. A byproduct of our robotic research was a deeper dive into a video calling software development kit (SDK) created by Agora.io. Agora’s SDKs are used for voice…

Read More
1 2,495 2,496 2,497 2,498 2,499 2,649