Posts filtered by tags: Security[x]


 

VC funding of cybersecurity companies hits record $5.3B in 2018

2018 wasn’t all bad. It turned out to be a record year for venture capital firms investing in cybersecurity companies. According to new data out by Strategic Cyber Ventures, a cybersecurity-focused investment firm with a portfolio of four cybersecurity companies, more than $5.3 billion was funneled into companies focused on protecting networks, systems and data across the world, despite fewer deals done during the year. That’s up from 20 percent — $4.4 billion — from 2017, and up from close to d...
Tags: Security, Europe, Technology, Maryland, California, Finance, China, Virginia, Funding, Tech, Economy, Cybercrime, United States, Washington Dc, Venture Capital, National Security


Twitter bug revealed some Android users’ private tweets

Twitter accidentally revealed some users’ “protected” (aka, private) tweets, the company disclosed this afternoon. The “Protect your Tweets” setting typically allows people to use Twitter in a non-public fashion. These users get to approve who can follow them and who can view their content. For some Android users over a period of several years, that may not have been the case – their tweets were actually made public as a result  of this bug. The company says that the issue impacted Twitter fo...
Tags: Android, Security, Social, TC, Apps, Twitter, Tweets, Tech, Data, Public, Bug, Private Data


How to Secure Your Accounts After the Massive 'Collection #1' Password Breach

“Another day, another migraine” is a wonderful morning mantra from Spongebob’s Squidward Q. Tentacles, which you can also apply to your account security on a near-weekly basis. It feels like there is always some new data breach or unfortunate leak you have to deal with, and today’s exercise is the big one. The biggest…Read more...
Tags: Security, Password, How To, Lifehacks, Account, Spongebob


These are all the federal HTTPS websites that’ll expire soon because of the US government shutdown

We like to think of ourselves as nerds here at TechCrunch, which is why we’re bring you this. During the government shutdown, security experts noticed several federal websites were throwing back browser errors because the TLS certificate, which lights up your browser with “HTTPS” or flashes a padlock, on many domains had expired. And because so many federal workers have been sent home on unpaid leave — or worse, working without pay but trying to fill in for most of their furloughed department — ...
Tags: Security, Python, Internet, Congress, Government, Senate, White House, US, Tech, Url, Fbi, United States, House, Food Safety, Securities And Exchange Commission, Federal Aviation Administration


These are all the federal HTTPS domains that’ll expire soon because of the US government shutdown

We like to think of ourselves as nerds here at TechCrunch, which is why we’re bring you this. During the government shutdown, security experts noticed several federal websites were throwing back browser errors because the TLS certificate, which lights up your browser with “HTTPS” or flashes a padlock, on many domains had expired. And because so many federal workers have been sent home on unpaid leave — or worse, working without pay but trying to fill in for most of their furloughed department — ...
Tags: Security, Python, Internet, Congress, Government, Senate, White House, US, Tech, Url, Fbi, United States, House, Food Safety, Securities And Exchange Commission, Federal Aviation Administration


Data breach compromises 773 million records, 21 million passwords

A security researcher was alerted to a collection of breached data that included more than 773 million compromised records. After digging deeper, the breach was revealed to contain more than 21 million passwords. The post Data breach compromises 773 million records, 21 million passwords appeared first on Digital Trends.
Tags: Security, News, Trends, Data Breach, Computing, Collection 1


How to Pick a Web Host That Isn't GoDaddy

I’m not sure there are many people who like GoDaddy, but there are plenty who still use the web registrar and host because they don’t know any better. I can’t fault them. I’m pretty sure I used GoDaddy to register my first domain name, either because I heard the company’s name on a commercial and associated them with…Read more...
Tags: Security, Godaddy, Web Hosting, Website, Lifehacks


Mother of All Breaches Exposes 773 Million Emails, 21 Million Passwords

There’s no shortage of data breaches these days, but this one should make you sit up and pay attention. The newly discovered “Collection #1" is the largest public data breach by volume, with 772,904,991 unique emails and 21,222,975 unique passwords exposed.Read more...
Tags: Security, Science, Passwords, Data, Data Breach, HIBP, Collection 1, Yes Youve Been Pwned


Wealth inequality is literally killing us. The economy should work for everyone.

Economic hardship is linked to physical and psychological illness, resulting in added healthcare expenses people can't afford.The gig economy – think Uber, Lyft, TaskRabbit, Handy – is marketed as a 'be your own boss' revolution, but it can be dehumanizing and dangerous; every worker is disposable.The cooperative business model can help reverse wealth inequality. Squeezed: Why Our Families Can't Afford America by now at amazo...
Tags: Security, Work, Uber, Journalism, Economics, Teaching, Mental Health, Work-life balance, Innovation, Inequality, Afford America


A popular WordPress plugin leaked access tokens capable of hijacking Twitter accounts

A popular WordPress plugin, installed on thousands of websites to help users share content on social media sites, left linked Twitter accounts exposed to compromise. The plugin, Social Network Tabs, was storing so-called account access tokens in the source code of the WordPress website. Anyone who viewed the source code could see the linked Twitter handle and the access tokens. These access tokens keep you logged in to the website on your phone and your computer without having to re-type y...
Tags: Security, Apps, Twitter, Florida, Developer, Wordpress, Tech, Software, Password, Computing, Search Engine, Oklahoma, Free Software, Bangkok, Cyberwarfare, Computer Security


Facebook finds and kills another 512 Kremlin-linked fake accounts

Two years on from the U.S. presidential election, Facebook continues to have a major problem with Russian disinformation being megaphoned via its social tools. In a blog post today the company reveals another tranche of Kremlin-linked fake activity — saying it’s removed a total of 471 Facebook pages and accounts, as well as 41 Instagram accounts, which were being used to spread propaganda in regions where Putin’s regime has sharp geopolitical interests. In its latest reveal of “coordinated inaut...
Tags: Security, Social, Facebook, Europe, Instagram, Putin, Russia, US, Social Media, Tech, Ukraine, United States, Nato, Kyrgyzstan, Sputnik, Moscow


773 million email addresses have been leaked – check if yours is on the list

We’re just over two weeks into 2019, and one of the biggest data leaks in recent years has surfaced. Today, renowned security researcher Troy Hunt reported a massive leak consisting of  773 million unique email IDs and 21 million unique passwords, which he refers to as Collection #1.  Hunt said that multiple people reached out to him last week and pointed to a constellation of 12,000 files with a total size of 87GB, and nearly 2.7 billion records, hosted on MEGA. He added that the files have bee...
Tags: Security, Startups, Insider, Hunt, Troy Hunt


Most Facebook users don't know their interests are tracked for ad targeting, Pew study finds

Most Facebook users have no idea how the company tracks and profiles everything they do to target ads, a new Pew Research study confirms. Pew reports that three-quarters (74%) of Facebook users surveyed in the study did not know that Facebook tracks their interests and various personal traits so they can be more efficiently targeted with ads. Those users only discovered this when the researchers directed them to take a look at the Facebook ad preferences page for their accounts. Most (51%) of...
Tags: Security, Facebook, Mark Zuckerberg, Post, Technology, News, Privacy, Tech, Ad Targeting, Zuckerberg, Pew Research, GfK, Facebook Algorithms, Picks, U S Facebook


FBI arrests Georgia man suspected of planning to bomb White House

Federal agents today arrested a man in Georgia who they say was planning an attack with weapons and explosives on the White House, the Washington Monument, and the Lincoln Memorial in Washington, DC. The attack was to have taken place tomorrow, Thursday, January 17, and the man met with FBI agents yesterday and today before his arrest. Scott MacFarlane at NBC Washington reports that court documents say the suspect possessed a "hand-drawn diagram of ground floor of the West Wing." “The FBI und...
Tags: Security, Post, News, Nbc, Washington, White House, Georgia, US news, Fbi, Attack, Washington Dc, Lincoln Memorial, Scott, West Wing, Buford Georgia, Washington Monument


Bug in reservation system used by 140+ international airlines exposes passenger data and allows for manipulation

Noah Rotem got an intriguing error message from El Al's reservation system ("PNR: https://fly.elal.co.il/LOTS-OF-NUMBERS-HERE*) and by tugging at the loose thread it revealed, he was able to view any "Passenger Name Record" in El Al's system, allowing him to "make changes, claim frequent flyer miles to a personal account, assign seats and meals, and update the customer’s email and phone number, which could then be used to cancel/change flight reservation via customer service." The bug was n...
Tags: Security, Video, News, Infosec, Aviation, Amadeus, Rotem, Breach Me Amadeus, Noah Rotem


How would you like to change HIPAA?

We've Moved! Update your Reader Now. This feed has moved to: http://feeds.healthblawg.com/healthblawg Update your reader now with this changed subscription address to get your latest updates from us. http://feeds.healthblawg.com/healthblawg
Tags: Security, Privacy, Law, Hospitals, Hit, Health Law, Compliance, HHS, HIPAA, Health care policy, Physicians, Accountable Care Organization, Healthcare Innovation, Value Based Purchasing, Pay for performance, Anti-Kickback Statute


Biometric phone unlocks can’t be forced by feds, says U.S. judge

Fingerprint and face unlocks used to not be protected by the Fifth Amendment, but that may soon change. A judge in California has ruled biometric unlocking methods of all kinds are protected in the same way as passcodes. The post Biometric phone unlocks can’t be forced by feds, says U.S. judge appeared first on Digital Trends.
Tags: Apple, Ios, Android, Security, Mobile, Legal, News, California, Trends


‘Fortnite’ security flaw let hackers spy on players through microphones

A security vulnerability found in Fortnite allowed hackers to gain access to other players' accounts, potentially letting them spy on conversations using the in-game microphone. It has been addressed. The post ‘Fortnite’ security flaw let hackers spy on players through microphones appeared first on Digital Trends.
Tags: Security, Gaming, News, Trends, Hackers, Epic Games, Check Point, Fortnite


Researcher shows how popular app ES File Explorer exposes Android device data

Why is one of the most popular Android apps running a hidden web server in the background? ES File Explorer claims it has over 500 million downloads under its belt since 2014, making it one of the most used apps to date. It’s simplicity makes it what it is: a simple file explorer that lets you browse through your Android phone or tablet’s file system for files, data, documents and more. But behind the scenes, the app is running a slimmed-down web server on the device. In doing so, it opens up th...
Tags: Security, Apps, Privacy, Wi-fi, Tech, Smartphones, Computing, Robert, Web Server, Elliot Alderson, Baptiste Robert


Your Ultimate Goal: How You Can Find Job Security

--> One of the worst things that can happen to people is getting fired from a job with no notice whatsoever. It can be devastating to lose your source of income unexpectedly, especially in a contracting economy. Losing a job can color our perspective on the world and our future. Going forward, we have a difficult time allowing ourselves to ever feel secure again. We believe that things can change in an instant and that we might be suddenly out of a job again. This fear of sudden job loss is some...
Tags: Security, Yahoo, Russia, Careers, United States, Beverly Hills, Detroit, Boeing, Usc, Add Post Footer Plugin


Critical Flaws Leave Some Government Access Cards Vulnerable to Attack

One of the nation’s leading purveyors of security access badges and plastic ID cards is scrambling to patch multiple vulnerabilities in its system, which could allow attackers to covertly enter secured buildings and obtain top-level access privileges, granting them the ability to modify a building’s list of authorized…Read more...
Tags: Security, Science, Welp, Brady Corp, Building Security, Identicard


Microsoft continues to build government security credentials ahead of JEDI decision

While the DoD is in the process of reviewing the $10 billion JEDI cloud contract RFPs (assuming the work continues during the government shutdown), Microsoft continues to build up its federal government security bona fides, regardless. Today the company announced it has achieved the highest level of federal government clearance for the Outlook mobile app, allowing US Government Community Cloud (GCC) High and Department of Defense employees to use the mobile app. This is on top of FedRamp complia...
Tags: Amazon, Security, TC, Mobile, Cloud, Enterprise, Microsoft, Government, US, Tech, Outlook, Ibm, Pentagon, Oracle, White, Jedi


DuckDuckGo debuts map search results using Apple Maps

DuckDuckGo has a new, unlikely partner in search: Apple. The privacy-focused search engine that promises to never track its users said Tuesday it’s now using data provided by Apple Maps to power its map-based search results. Although DuckDuckGo had provided limited mapping results for a while using data from open-source service OpenStreetMap, it never scaled its features to those of its search engine rivals, notably Google and Bing. Now, DuckDuckGo will return addresses, businesses, geographi...
Tags: Apple, Google, Security, Technology, Privacy, Tech, Smartphones, Ipads, Software, Tim Cook, Computing, Search Engine, Google Maps, Apple Maps, Apple Inc, Duckduckgo


Flaws in Amadeus’ airline booking system made it easy for hackers to change passenger records

You might not know Amadeus by name, but hundreds of millions of travelers use it each year. Whether you’re traveling for work or vacation, most consumers book their flights through one of a handful of bespoke reservation systems used across the commercial aviation industry. Amadeus is one of the largest reservation systems, serving customers of Air France, British Airways, Icelandair, and Qantas and more. And each reservation system has to be able to talk to each other through the global distrib...
Tags: Security, Transportation, Business, Technology, Instagram, Tech, Spokesperson, Pgp, Hack, Qantas, Facial Recognition, Signal, Airline, American-airlines, Amadeus, IATA


Flaws in Amadeus’ airline booking system made it easy to change passenger records

You might not know Amadeus by name, but hundreds of millions of travelers use it each year. Whether you’re traveling for work or vacation, most consumers book their flights through one of a handful of bespoke reservation systems used across the commercial aviation industry. Amadeus is one of the largest reservation systems, serving customers of Air France, British Airways, Icelandair, and Qantas and more. And each reservation system has to be able to talk to each other through the global distrib...
Tags: Security, Transportation, Business, Technology, Instagram, Tech, Spokesperson, Pgp, Hack, Qantas, Facial Recognition, Signal, Airline, American-airlines, Amadeus, IATA


Data management startup Rubrik gets $261M at a $3.3B valuation as it moves into security and compliance

There is a growing demand for stronger security at every point in the IT ecosystem, and today, one of the the more successful enterprise startups to emerge in the last several years is announcing a big round of funding to provide that. Rubrik, which provides enterprise data management and backup services across on-premise, cloud and hybrid networks, has raised $261 million in funding at a $3.3 billion valuation from Bain Capital Ventures and previous investors Lightspeed Venture Partners, Greylo...
Tags: Security, TC, Cloud, Enterprise, Tech, Symantec, IVP, Rubrik, EMC, Bain Capital Ventures, Andes, Sinha, Bipul Sinha, Enrique Salem


Data management startup Rubrik gets $261M at a $3.1B valuation as it moves into security and compliance

There is a growing demand for stronger security at every point in the IT ecosystem, and today, one of the the more successful enterprise startups to emerge in the last several years is announcing a big round of funding to provide that. Rubrik, which provides enterprise data management and backup services across on-premise, cloud and hybrid networks, has raised $261 million in funding at a $3.3 billion valuation from Bain Capital Ventures and previous investors Lightspeed Venture Partners, Greylo...
Tags: Security, TC, Cloud, Enterprise, Tech, Symantec, IVP, Rubrik, EMC, Bain Capital Ventures, Andes, Sinha, Bipul Sinha, Enrique Salem


Tesla is entering the Model 3 into Pwn2Own, one of the world’s toughest hacking contests

Tesla is handing over its new Model 3 sedan to Pwn2Own this year, the first time a car has been included in the annual high-profile hacking contest. The prize for the winning security researcher: a Model 3. Pwn2Own, which is in its 12th year and run by Trend Micro’s Zero Day Initiative, is known as one of the industry’s toughest hacking contests. ZDI has awarded more than $4 million over the lifetime of the program. Pwn2Own’s spring vulnerability research competition, Pwn2Own Vancouver, will ...
Tags: Security, Tech, Tesla, Cryptography, Automotive, Automotive Industry, Vancouver, Cloning, Trend Micro, Apple Google Microsoft, Pwn2own


Dark markets have evolved to use encrypted messengers and dead-drops

Cryptocurrencies and Tor hidden services ushered in a new golden age for markets in illegal goods, especially banned or circumscribed drugs: Bitcoin was widely (and incorrectly) viewed as intrinsically anonymous, while the marketplaces themselves were significantly safer and more reliable than traditional criminal markets, and as sellers realized real savings in losses due to law enforcement and related risks, the prices of their merchandise plummeted, while their profits soared. But much o...
Tags: Security, Post, News, Drugs, Anonymity, Infosec, War On Drugs, Logan, Jonathan, Ian Muttoo, Physsec, Dark Markets, Dead Drops, Dropgangs


Some of the biggest web hosting sites were vulnerable to simple account takeover hacks

A security researcher has found, reported, and now disclosed a dozen bugs that made it easy to steal sensitive information or take over any customer’s account from some of the largest web hosting companies on the internet. In some cases, clicking on a simple link would have been enough for Paulos Yibela, a well-known and respected bug hunter, to take over the accounts of anyone using five large hosting providers — Bluehost, Dreamhost, Hostgator, OVH, and iPage. “All five had at least one serious...
Tags: Security, Web Hosting, Tech, Javascript, Hack, Cybercrime, Hacking, Cross-site Scripting, Phishing, Cyberwarfare, World Wide Web, Cyberspace, Hostgator, Brett Dunst, Bluehost, OVH