Login

Register

Login

Register

Category

software update

Auto Added by WPeMatico

Video conferencing tech used by UK government, but not cleared for ‘secret’ discussions ANALYSIS The lockdown prompted in response to the coronavirus pandemic has seen usage of Zoom skyrocket, renewing security and privacy concerns about the video conferencing app. Zoom has been criticized over aspects of its data collection practices and privacy policy by critics...
Read More
Researchers detected two threat groups exploiting command injection flaws in the wild Two critical vulnerabilities in enterprise networking kit from DrayTek are under active attack, prompting an urgent call to apply a recently released firmware updates. A pair of attack groups are each exploiting separate zero-day command injection flaws in DrayTek Vigor enterprise routers and...
Read More
Sinkhole far from sunk by nonetheless cool web exploit A security researcher has uncovered a neat – though far from critically dangerous – security vulnerability in Pi-hole, the network-based content filtering technology that’s popular with privacy-conscious web users. Pi-hole offers a Domain Name System (DNS) sinkhole that protects devices from unwanted content without the need...
Read More
John Leyden 20 March 2020 at 14:20 UTC Updated: 20 March 2020 at 14:29 UTC Text editor flaw spawns CVE A vulnerability in a third-party library component has had a knock-on effect on software packages that rely on it, including the Drupal content management system. The issue involves a cross-site scripting (XSS) bug in...
Read More
Adam Bannister 20 March 2020 at 16:07 UTC Updated: 20 March 2020 at 16:11 UTC VPN and teleconferencing security spending will enable home networking A White House request for $45.8 billion of emergency funding to help government agencies respond to the escalating coronavirus crisis earmarks tens of millions of dollars for bolstering cybersecurity defences....
Read More
The Pwn must go on The flagship Pwn2Own live hacking event came to a close yesterday, but the winning team may have to wait a little longer than usual to receive their ‘Master of Pwn’ trophy, as this year the competition took place via live stream. Pwn2Own Vancouver was due to set up camp at...
Read More
‘Voight kampff test’ provides warnings about thumb drive malfeasance Google has developed a tool for Linux machines that combats USB keystroke injection attacks by flagging suspicious keystroke speeds and blocking devices classified as malicious. Keystroke injection attacks can execute malicious commands via a thumb drive connected to a host machine, by running code that mimics...
Read More
Rights for consumers? That’s coming, too Businesses in New York will soon be required to adhere to heightened data security measures when a new law is enacted in the state later this week. The Stop Hacks and Improve Electronic Data Security Act, better known as the SHIELD Act, is a two-part data security focused bill...
Read More
Cybercriminals are exploiting Covid-19 concerns as situation worsens Global Computer Emergency Response Teams (CERTs) have doubled down on their warnings for the public to be wary of scams and cyber-attacks referencing the coronavirus pandemic. Attackers ranging from cybercriminals to suspected spies have cynically used alarm about the global health emergency as bait for phishing or...
Read More
John Leyden 16 March 2020 at 15:20 UTC Updated: 16 March 2020 at 15:41 UTC App needs re-binding to guard against PHP-related security flaw A recently patched critical vulnerability in BookStack made it possible to push malware onto vulnerable systems simply by accessing the image upload feature. Exploit scenarios for the remote code execution...
Read More
John Leyden 13 March 2020 at 12:45 UTC Updated: 13 March 2020 at 12:49 UTC Don’t Panic: Potentially wormable flaw only present in latest systems Microsoft released an out-of-band security update to patch a remote code execution (RCE) vulnerability impacting Server Message Block (SMB) on Thursday, just two days after its regular Patch Tuesday...
Read More
Police efforts ‘gearing up’ against SIM hijackers Europol has issued a warning over SIM-swap attacks, a growing mobile threat that results in a victim’s identity being stolen. In a press release issued Friday (March 13), the European law enforcement agency said police across EU member states were “gearing up” against SIM hijackers, highlighting two recent...
Read More
Former military intelligence officer introduces idea of ‘network resident threats’ The Daily Swig recently caught up with security author Richard Bejtlich, a former military intelligence officer and leader at the US Air Force CERT, to talk nation-state threats, APTs, and the cybersecurity industry’s ongoing use of military metaphors. Bejtlich currently serves as the principal security...
Read More
Emma Woollacott 12 March 2020 at 15:38 UTC Updated: 12 March 2020 at 15:42 UTC Interoperability rules largely welcomed, but potential privacy and security issues must be addressed, experts warn New rules giving patients better access to their medical data have been approved by the US Department of Health and Human Services (DHSS) –...
Read More
Four organizations have already taken the antidote Businesses and government bodies hit by the PwndLocker ransomware strain have been given hope of recovering their encrypted files without paying the ransom, following the launch of a free decryptor. Four organizations have already been helped by the tool, less than a week after its launch on Friday...
Read More
Shadowy threat group piggybacks on their peers’ efforts with trojanized hacking tools A cyber threat group has been boobytrapping underground forums with trojanized hacking tools in a campaign lasting several years, according to research published today. The attackers’ weapon of choice, the investigation by Cybereason Nocturnus reveals, is njRat – a remote access trojan (RAT)...
Read More
John Leyden 09 March 2020 at 15:50 UTC Updated: 09 March 2020 at 16:04 UTC Forget crowdsourcing, here’s crooksourcing Computer scientists in the US are working to apply machine learning techniques in order to develop more effective honeypot-style cyber defenses. So-called ‘deception technology’ refers to traps or decoy systems that are strategically placed around...
Read More
Dave Lewis 06 March 2020 at 15:52 UTC Updated: 06 March 2020 at 20:36 UTC Dave Lewis on the much maligned ‘human element’ of security COMMENT I find myself sitting and staring at the TV screen and randomly blinking in an effort to keep my eyeballs from becoming parched. I have this inescapable feeling...
Read More
Adam Bannister 06 March 2020 at 16:41 UTC Updated: 06 March 2020 at 17:49 UTC Shields up The US has committed $8 million to bolstering Ukraine’s cybersecurity defenses as its eastern European ally continues to face a sustained campaign of cyber-attacks linked to neighboring Russia. Announcing the funding, the US Embassy in Ukraine said...
Read More
Adam Bannister 05 March 2020 at 20:07 UTC Updated: 06 March 2020 at 11:11 UTC A simple plan for smart security UPDATED Singapore is launching a cybersecurity labeling initiative designed to give consumers an understanding of the security protections built into Internet of Things (IoT) devices. Under the new Cybersecurity Labeling Scheme (CLS), security...
Read More
1 2 3 5
Shqip Shqip አማርኛ አማርኛ العربية العربية English English Français Français Deutsch Deutsch Português Português Русский Русский Español Español

National Cyber Security Consulting App

 https://apps.apple.com/us/app/id1521390354

https://play.google.com/store/apps/details?id=nationalcybersecuritycom.wpapp


NATIONAL CYBER SECURITY RADIO
HACKER FOR HIRE MURDERS
 

ALEXA “OPEN NATIONAL CYBER SECURITY RADIO”

National Cyber Security Radio (Podcast) is now available for Alexa.  If you don't have an Alexa device, you can download the Alexa App for free for Google and Apple devices.   

nationalcybersecurity.com

FREE
VIEW