Apple’s shock Siri surveillance demands a swift response

Credit to Author: Jonny Evans| Date: Mon, 29 Jul 2019 07:51:00 -0700

News that Siri records snippets of our conversations with the voice assistant isn’t new, but claims that those short recordings are listened to by human agents is– particularly in light of the company’s big push on privacy.

These are bad optics

I’m a passionate believer in the importance of privacy.

It isn’t only important in terms of preserving hard-won liberties and protecting public discourse, it’s also of growing importance across every part of human existence, for every school, medical facility or enterprise. History shows that the absence of privacy has a corrosive effect on society, turning family members against each other and dampening innovation.

To read this article in full, please click here

Read more

Will XDR Improve Security?

Credit to Author: Jon Clay (Global Threat Communications)| Date: Mon, 29 Jul 2019 14:06:36 +0000

Cybercriminals and malicious hackers have been shifting their tactics, techniques, and procedures (TTPs) to improve their ability to infiltrate an organization and stay under the radar of security professionals and solutions. Moving to more targeted attack methods appears to be a mainstay among threat actors, which requires organizations to improve their visibility into the entire…

The post Will XDR Improve Security? appeared first on .

Read more

Android security: Analysis, advice, and next-level knowledge

Credit to Author: JR Raphael| Date: Fri, 26 Jul 2019 09:39:00 -0700

It’s tough to talk about Android security without venturing into sensational terrain.

A large part of that is due to the simple fact that the forces driving most Android security coverage are companies that make their money by selling Android security software — and thus companies with strong interests in pushing the narrative that every Android phone is on the perpetual brink of grave, unfathomable danger. Plus, let’s face it: A headline about 70 gazillion Android phones being vulnerable to the MegaMonsterSkullCrusher Virus is far more enticing than one explaining the nuanced realities of Android security.

In actuality, though, Android security is a complex beast — one with multiple layers in place to protect you and one that almost never warrants an alarmist attitude. I’ve been covering Android security closely since the platform’s earliest days, and I’ve busted more myths and called out more shameless publicity stunts than I can even count at this point.

To read this article in full, please click here

Read more

Windows Server 2008 End of Support: Are you Prepared?

Credit to Author: Pawan Kinger (Director, Deep Security Labs)| Date: Fri, 26 Jul 2019 13:42:36 +0000

On July 14th, 2015, Microsoft’s widely deployed Windows Server 2003 reached end of life after nearly 12 years of support. For millions of enterprise servers, this meant the end of security updates, leaving the door open to serious security risks. Now, we are fast approaching the end of life of another server operating system –…

The post Windows Server 2008 End of Support: Are you Prepared? appeared first on .

Read more

Mozilla blames 'interlocking complex systems' and confusion for Firefox's May add-on outage

Credit to Author: Gregg Keizer| Date: Fri, 26 Jul 2019 03:00:00 -0700

Mozilla has issued multiple after-action reports analyzing the major mix-up in May that crippled most Firefox add-ons. The reports also made recommendations for preventing similar incidents in the future.

The fiasco started just after 8 p.m. ET on Friday, May 3, when a certificate used to digitally sign Firefox extensions expired. Because Mozilla had neglected to renew the certificate, Firefox assumed add-ons could not be trusted – that they were potentially malicious – and disabled any already installed. Add-ons could not be added to the browser for the same reason.

To read this article in full, please click here

Read more

Researchers to launch intentionally ‘vulnerable’ blockchain at Black Hat

Credit to Author: Lucas Mearian| Date: Thu, 25 Jul 2019 14:06:00 -0700

Hoping to raise awareness about blockchain vulnerabilities, cybersecurity firm  Kudelski Security next week plans to launch the industry’s first “purposefully vulnerable” blockchain – and will demo it at next month’s Black Hat conference.

Kudelski Security’s FumbleChain project is aimed at highlighting vulnerabilities in blockchain ecosystems, according to Nathan Hamiel, head of cybersecurity research at Kudelski.

The flawed blockchain ledger is written in Python 3.0, making it easy for anyone to read and modify its source code, and it’s modular – allowing users to hack and add new challenges to promote continuous learning.

To read this article in full, please click here

Read more