Posts filtered by tags: Cybersecurity[x]


 


The best free VPNs for 2021

Learn how to protect your personal data from cybercriminals and sneaky advertisers without spending a dime.
Tags: Android, Security, Mobile, Trends, Web, Cybersecurity, Computing, Vpn, Virtual Private Networks


Didi has fallen a stunning 52% since its US IPO as China's crackdown pummels the ride-hail giant

FILE PHOTO: The logo of Didi Chuxing is seen at a Didi station in Beijing Reuters Didi is vying for China's worst US IPO this year as its stock has lost more than half its value. Not long ago, Didi was eyeing a $70 billion valuation. Less than a month from its debut, it is now worth less than $40 billion. Didi has been spared the title of worst IPO this year by RLX Technology, a vaping company that has fallen 78%. See more stories on Insider's business page. Didi is vying for Chin...
Tags: China, Ipo, US, Trends, Markets, Cybersecurity, Beijing, Didi, Chinese company, Didi Chuxing, Full Truck Alliance, MI Exclusive, Bloomberg Didi, RLX Technology, Ethan Wu, Reuters Didi


Russia disconnected itself from the rest of the internet, a test of its new defense from cyber warfare, report says

Russian President Vladimir Putin. Mikhail Svetlov/Getty Images Russia tested disconnecting itself from the global internet, Russian outlet RBC Daily said. It said the disconnect happened from mid-June to July, though Insider couldn't verify that. Russia has wanted total control over the internet, to avoid US firms and potential cyber attacks. See more stories on Insider's business page. Russian successfully tested disconnecting itself from the global internet, according to a repo...
Tags: Internet, Vladimir Putin, China, Russia, US, Trends, Cybersecurity, News UK, Moscow, Cyber Attack, Dpi, Reuters, Ural, Novaya Gazeta, Military & Defense, Ashley Collman


Is BlueStacks safe? How to keep yourself protected while using the Android emulator

Make sure to download BlueStacks from the official website. Westend61/Getty Images Table of Contents: Masthead Sticky BlueStacks, the popular Android emulator for Mac and PC, is generally safe to use. Cybersecurity experts recommend only downloading Android apps that you know are safe. When you download BlueStacks, it'll see your IP address and device settings, along with your public Google account. Visit Insider's Tech Reference library for more stories. If you're like most p...
Tags: Google, Android, Google Play Store, Gaming, Samsung, Trends, Cybersecurity, Internet Safety, Emulators, McAfee, Emulator, AMD Intel, Tech Insider, BlueStacks, ProPrivacy, Dave Hatter


Banks are reportedly scrambling to move IPOs of Chinese companies from New York to Hong Kong after regulators cracked down on overseas listings

Martin Puddy/Getty Images Regulators' harsh response to Didi's IPO has forced the 20 or so Chinese companies that had plans to go public in New York to re-evaluate, according to a Financial Times report. 34 Chinese firms raised $12.4 billion in New York capital markets in the first half of this year, according to Dealogic data. Data-oriented companies have been most eager to plan for Hong Kong listings, in large part because the mainland government's crackdown has centered aro...
Tags: Hong Kong, New York, China, Ipo, US, Trends, Markets, Cybersecurity, IPO market, Financial Times, Nyse, Didi, Didi Chuxing, MI Exclusive, Martin Puddy Getty, Ethan Wu


XDR FAQ — Frequently Asked Questions On Extended Detection And Response

As is expected with any new market segment or capability, questions about extended detection and response (XDR) abound. I wrote this blog to answer a few of the more common questions I’m getting from Forrester clients and from security vendors that are trying to figure this space out. What Is XDR? An incredibly simplified way […]
Tags: Marketing, Cybersecurity, Incident response, Forrester, Age Of The Customer, Endpoint Security, Security Operations, Security Analytics, Cybersecurity Trends, Security Vendors


It’s Christmas In July For Three Threat Intelligence Startups

Christmas came early for three vendors in the threat intelligence and attack surface management space this past week. In a reported all-cash $500 million deal (no need for layaway when your market cap is north of $2 trillion), Microsoft acquired threat intelligence and attack surface management vendor RiskIQ. In Europe, Swedish vulnerability risk management firm […]
Tags: Europe, Microsoft, Marketing, Cybersecurity, Threat Intelligence, Cybersecurity Trends


Apple's iPhone has a 'major blinking red five-alarm-fire problem with iMessage security,' according to a cybersecurity researcher

Apple CEO Tim Cook. Drew Angerer/Getty Images Apple's iPhones are a lot less secure than Apple says, according to a new report. "Apple has a MAJOR blinking red five-alarm-fire problem with iMessage security," one cybersecurity researcher said. An iMessages security exploit was used by an Israeli spyware firm to give hackers access to iPhones. Visit the Business section of Insider for more stories. Apple's iPhone isn't as secure as Apple says it is, according to a bombshell new ...
Tags: Iphone, Apple, Washington Post, Imessage, Trends, Cybersecurity, Tim Cook, iPhone hacking, Amnesty International, Pegasus, NSO, Marczak, Dana Priest, Ben Gilbert, Tech Insider, NSO Group


Spyware successfully broke into journalists' iPhones by sending iMessages that didn't even need to be read

Amnesty International found evidence of iPhones being hacked with "zero-click" attacks. Stanislav Kogiku/SOPA Images/LightRocket via Getty Images An Amnesty report says NSO Group sold spyware then used to target journalists and activists. The spyware successfully infected victims' iPhones by exploit flaws in iMessage. Amnesty said its findings suggest all iPhones and iOS updates are vulnerable to attack. See more stories on Insider's business page. A forensic analysis by Amnesty In...
Tags: Iphone, Apple, Facebook, News, US, Trends, Cybersecurity, Hack, Vulnerability, Amnesty International, Pegasus, University of Toronto, Amnesty, Marczak, Tech Insider, NSO Group


REvil is Off-Line

This is an interesting development: Just days after President Biden demanded that President Vladimir V. Putin of Russia shut down ransomware groups attacking American targets, the most aggressive of the groups suddenly went off-line early Tuesday. […] Gone was the publicly available “happy blog” the group maintained, listing some of its victims and the group’s earnings from its digital extortion schemes. Internet security groups said the custom-made sites ­- think of them as virtual conference r...
Tags: Russia, Uncategorized, US, Cybersecurity, Ransomware, Cybercrime, Biden, Bruce Schneier, Vladimir V Putin


China Taking Control of Zero-Day Exploits

China is making sure that all newly discovered zero-day exploits are disclosed to the government. Under the new rules, anyone in China who finds a vulnerability must tell the government, which will decide what repairs to make. No information can be given to “overseas organizations or individuals” other than the product’s manufacturer. No one may “collect, sell or publish information on network product security vulnerabilities,” say the rules issued by the Cyberspace Administration of China and t...
Tags: China, Uncategorized, Cybersecurity, Zero-Day, Vulnerabilities, Disclosure, Cyberspace Administration of China, Bruce Schneier, Cyberweapons


Iranian State-Sponsored Hacking Attempts

Interesting attack: Masquerading as UK scholars with the University of London’s School of Oriental and African Studies (SOAS), the threat actor TA453 has been covertly approaching individuals since at least January 2021 to solicit sensitive information. The threat actor, an APT who we assess with high confidence supports Islamic Revolutionary Guard Corps (IRGC) intelligence collection efforts, established backstopping for their credential phishing infrastructure by compromising a legitimate site...
Tags: UK, Uncategorized, Iran, Cybersecurity, Hacking, Phishing, Islamic Revolutionary Guard Corps IRGC, Bruce Schneier, SOAS, University of London, University of London s School of Oriental


Protect your email now against the return of this nasty ransomware botnet

The infamous Trickbot ransomware botnet is on the rise again after being dismantled in 2020. Here's what you need to know to stay safe.
Tags: News, Trends, Cybersecurity, Ransomware, Computing


Using Our Tools Against Us: Adversaries Continue To Abuse Trust In The Supply Chain

I believe that GLaDOS (the evil AI from the Portal video game franchise) may have been trying to make a point about the state of security with her song “Still Alive.” The fictional, artificially super intelligent computer system from Portal once sang, “But there’s no sense crying over every mistake. You just keep on trying ’til you run out […]
Tags: Marketing, Malware, Cybersecurity, Ransomware, Age Of The Customer, Security Architecture, Vendor Management, Vulnerability Management, Security Risk Management, Security Vendors


Equity Monday: Cybersecurity startups see deluge of capital as Microsoft looks to buy RiskIQ

Hello and welcome back to Equity, TechCrunch’s venture capital-focused podcast where we unpack the numbers behind the headlines. This is Equity Monday, our weekly kickoff that tracks the latest private market news, talks about the coming week, digs into some recent funding rounds and mulls over a larger theme or narrative from the private markets. You can follow the show on Twitter here and myself here. It was a busy weekend for everyone, regardless of whether you were watching the technology...
Tags: Apple, Fundings & Exits, Startups, Twitter, Microsoft, China, India, Tech, Walmart, Cybersecurity, Virgin Galactic, Tencent, Richard Branson, Equity, Branson, Flipkart


It’s Time For The Infosec Industry To Address Gender Bias And Bullying Head On

The week of July 12 was a big one (not in a good way) for showcasing the persistence and depth of harassment and exclusion for women in cybersecurity. Those on infosec social media were flooded with bikini selfies protesting the harassment that a woman received for posting her own bikini selfie. Men and women took […]
Tags: Marketing, Social Media, Cybersecurity, Age Of The Customer, Employee Experience, Cybersecurity Trends


Microsoft warns users to update their computers immediately over security flaw

Microsoft is urging users to install the fix immediately. Drew Angerer/Getty Images Microsoft told users to install an emergency update that addresses a critical security flaw. The vulnerability affects all Windows systems and could let attackers steal, alter, or view data. "We recommend that you install these updates immediately," the tech giant said in a security update. See more stories on Insider's business page. Microsoft on Wednesday told users to immediately install an emergen...
Tags: News, Microsoft, Windows, US, Trends, Tech, Cisco, Intel, Cybersecurity, Tech Insider, Colonial Pipeline, Tim Levin, Drew Angerer Getty Images Microsoft


Invest Now: Your Interoperability Strategy Will Drive Patient Outcomes

“The first wealth is health.” – Ralph Waldo Emerson These words of perennial wisdom are a compelling reminder that public health is the bedrock for constructing a prosperous economy and nation. This very philosophy beckoned me to the healthcare field as a student and public health professional for the past two decades. My name is […]
Tags: Digital Transformation, Big Data, Marketing, Cybersecurity, Application Security, Ransomware, Data Science, Cloud Security, Data Security, Age Of The Customer, Digital Disruption, Ralph Waldo Emerson, Internet of Things (IoT, robotic process automation (RPA, data management platforms (DMPs, APIs & API management


Businesses around the world left reeling following a ransomware attack on Florida-based IT firm

Thomas Trutschel/Photothek via Getty Images A ransomware attack at Florida-based IT firm Kaseya left businesses around the world scrambling. Cybersecurity experts say the Russian-linked REvil ransomware gang appears to be behind the attack. The REvil ransomware gang was blamed by the FBI for paralyzing meat packer JBS last month. See more stories on Insider's business page. Businesses around the world rushed Saturday to contain a ransomware attack that has paralyzed their computer net...
Tags: Florida, Sweden, Microsoft, Putin, Vladimir Putin, Washington, Germany, Boston, Russia, Trends, Joe Biden, Ap, Cybersecurity, Ransomware, Fbi, Gartner


More Russian Hacking

Two reports this week. The first is from Microsoft, which wrote: As part of our investigation into this ongoing activity, we also detected information-stealing malware on a machine belonging to one of our customer support agents with access to basic account information for a small number of our customers. The actor used this information in some cases to launch highly-targeted attacks as part of their broader campaign. The second is from the NSA, CISA, FBI, and the UK’s NCSC, which wrote that the...
Tags: UK, Microsoft, Nsa, Russia, Uncategorized, Malware, Cybersecurity, Hacking, Gru, Bruce Schneier, NCSC, NSA CISA FBI


Insurance and Ransomware

As ransomware becomes more common, I’m seeing more discussions about the ethics of paying the ransom. Here’s one more contribution to that issue: a research paper that the insurance industry is hurting more than it’s helping. However, the most pressing challenge currently facing the industry is ransomware. Although it is a societal problem, cyber insurers have received considerable criticism for facilitating ransom payments to cybercriminals. These add fuel to the fire by incentivising cybercrim...
Tags: UK, Uncategorized, Insurance, Cybersecurity, Ransomware, Cybercrime, Reports, Bruce Schneier, Mitigation, Academic Papers


COVID-19 Drives Delivery Model Transformation And A Sustainability Revolution In The Security Consulting Space

“The Forrester Wave™: European Cybersecurity Consulting Providers, Q3 2021,” launched today. Fifteen firms are featured in this report, representing a cross section of large international security consulting providers and more regionally based security pure plays. The European security consultancy market has seen a large transformation in the past 16 months in how it delivers value […]
Tags: Marketing, Cybersecurity, Security Services, Age Of The Customer, Security Architecture, Security Operations, Security Risk Management, Security Vendors, European Cybersecurity Consulting Providers


5 lines of code allowed attackers to wipe tons of data from popular hard drive

After a series of attacks last week, Western Digital says there's another exploit impacting My Book Live and My Book Live Duo hard drives.
Tags: News, Trends, Cybersecurity, Computing, Western Digital, Western Digital My Book Live


When It Comes To Incident Response, Is Your Cyberinsurance Carrier On Your Side?

You know, I really feel for security leaders and professionals. After a year of pandemic-related disruption and an uptick in ransomware and serious cyberattacks of all kinds — just as they’re firming up their policies and strategies to secure hybrid work for the foreseeable future — they get hit with an all-out assault of ransomware […]
Tags: Marketing, Cybersecurity, Ransomware, Incident response, Age Of The Customer, Breaches, Security Risk Management, CISO Trends


When It Comes To Incident Response, Is Your Cyber Insurance Carrier On Your Side?

You know, I really feel for security leaders and professionals. After a year of pandemic-related disruption and an uptick in ransomware and serious cyberattacks of all kinds — just as they’re firming up their policies and strategies to secure hybrid work for the foreseeable future — they get hit with an all-out assault of ransomware […]
Tags: Marketing, Cybersecurity, Ransomware, Incident response, Age Of The Customer, Breaches, Security Risk Management, CISO Trends


Risks of Evidentiary Software

Over at Lawfare, Susan Landau has an excellent essay on the risks posed by software used to collect evidence (a Breathalyzer is probably the most obvious example). Bugs and vulnerabilities can lead to inaccurate evidence, but the proprietary nature of software makes it hard for defendants to examine it. The software engineers proposed a three-part test. First, the court should have access to the “Known Error Log,” which should be part of any professionally developed software project. Next the c...
Tags: Uncategorized, Cybersecurity, Courts, Forensics, Vulnerabilities, Bruce Schneier, False Positives, Lawfare Susan Landau, Ladkin


Cybersecurity

Cybersecurity isn’t what it used to be. Breaches and leaks, once rare and relatively low-impact, have become commonplace, rendering our personal data more vulnerable than ever. Everything from your Social Security number to your health information now lives online, and though it may prove difficult to avoid such attacks, staying up to date on the […]
Tags: Trends, Cybersecurity, Social Security


Sources: SentinelOne expects to raise over $1B in NYSE IPO tomorrow, listing with a $10B market cap

After launching its IPO last week with an expected listing price range of $26 to $29 per share, cybersecurity company SentinelOne is going public tomorrow with some momentum behind it. Sources close to the deal tell us that the company, which will be trading under the ticker “S” on the New York Stock Exchange, is expecting to raise over $1 billion in its IPO, putting its valuation at around $10 billion. Last week, when the company first announced the IPO, it was projected that it would raise $92...
Tags: Security, Enterprise, Ipo, Israel, Tech, Cybersecurity, New York Stock Exchange, Tiger Global, NYSE IPO, SentinelOne, Tomer Weingarten


Zero Trust Doesn’t Mean Zero Breaches

We occasionally get asked this question: “Would Zero Trust have prevented [insert high-profile breach]?” The breach in question could be Equifax, SolarWinds, or the United States Office of Personnel Management. We haven’t been asked (yet) about the announcement from Microsoft this month, where they acknowledged that they were a target of, and indeed had an […]
Tags: Network Security, Microsoft, Marketing, Cybersecurity, Incident response, Age Of The Customer, Equifax, Breaches, United States Office of Personnel Management, Security Architecture, Zero Trust Model, Security Operations, Zero Trust, Security Risk Management