Eskenzi PR ad banner Eskenzi PR ad banner

Top 10 Stories

Singapore is assessing the feasibility of rolling out virtual browsers to reduce the attack surface of healthcare systems, following a critical cybsecurity breach that compromised personal data of 1.5 million patients. Implementing virtual browsers would enable users to browse the web safely via quarantined servers, hence, reducing the number of potential attack points, said Singapore Health Minister Gan Kim Yong, in a statement delivered at a parliamentary session Monday. He said the ministry currently was...

Read more

The boss of Italy’s biggest bank has ordered his staff to cut all the bank’s ties with Facebook in direct response to the social network’s behaviour revealed in the Cambridge Analytica data breach scandal. “Facebook is not acting in an ethical way,” Jean Pierre Mustier, chief executive of UniCredit, said on Tuesday. “We will not use it until it has proper ethical behaviour.” Mustier said that he had ordered the bank – which has more than...

Read more

Industrial attacks are on the rise as threat actors are no longer merely interested in raiding your bank account, while some have set their sights far higher. Cyberattackers targeting industrial control systems (ICS) have demonstrated their potential to disrupt core systems in recent years. From the takedown of the power grid in Ukraine which left residents of Kiev without electricity for an hour to the successful compromise of a dam in New York three years...

Read more

On August 1, HP disclosed two vulnerabilities in certain HP Inkjet printers: CVE-2018-5924 and CVE-2018-5925. To see if your machine was impacted, and to get the patch, click here. On Tuesday, HP announced a bug bounty program that will give hackers and researchers up to $10,000 if they can find security flaws in the company's printers. The move is the industry's first print security bug bounty program, according to a press release. HP will work with Bugcrowd to...

Read more

While ransomware continues to extort factories, hospitals, schools, businesses, and ordinary netizens, BlackBerry reckons it can quickly rescue peeps from malware infections. The Canadian biz's days as the smartphone king long gone, with Apple making quick work of its hardware. And although it still licenses its name to a few handsets, BlackBerry now focuses on software. It is using this year's Black Hat USA security show, held this week in Las Vegas, to unveil what it...

Read more

Singapore is assessing the feasibility of rolling out virtual browsers to reduce the attack surface of healthcare systems, following a critical cybsecurity breach that compromised personal data of 1.5 million patients. Implementing virtual browsers would enable users to browse the web safely via quarantined servers, hence, reducing the number of potential attack points, said Singapore Health Minister Gan Kim Yong, in a statement delivered at a parliamentary session Monday. View Full Story ORIGINAL SOURCE: ZDNet

Read more

A vulnerability has been identified in the Linux Kernel (version 4.9+) which is tracked in the CVE-2018-5390 advisory. It lists several conditions that allow criminals to modify packets leading to the coordination of DOS (Denial of service) attacks. An email message, posted by Juha-Matti Tilli reported yet another security related issue in the Linux Kernel. The CVE-2018-5390 advisory is a newly published security bulletin which gives details upon a Linux Kernel vulnerability. The document shows...

Read more

A fight has begun over another of the US government's mass surveillance systems – with two Senators raising questions about an unusual data deletion by the National Security Agency (NSA). Senators Ron Wyden (D-OR) and Rand Paul (R-KY) have sent a letter to the NSA's inspector general asking him to look into the agency's torching of metadata for hundreds of millions of phone calls. "We write to request that you conduct an investigation into the circumstances...

Read more

The US Department of Energy (DoE) is planning a "hands-on" test of the real-world consequences associated with successful cyberattacks against core country services. Cyberattacks levied against critical infrastructure, smart grids, and utilities are not a future possibility; but rather, they are happening now. Ukraine's power grid blackout in 2016 was one of the first real indicators that if there are bugs which can be exploited, critical services are just as vulnerable as the average consumer...

Read more

New research shows that browser based Tech Support Scams are starting to utilize services normally found in legitimate call center operations. These services, called call optimization services, are typically used by call centers to perform call load balancing, call routing, dynamic generation of phone numbers, and more. When a visitor accesses a browser-based tech support scam, the page typically utilizes some sort of behavior that makes it difficult to close the page. This could be...

Read more
Page 18 of 630 1 17 18 19 630