Security News > 2020 > August

Researchers have once again demonstrated that many printers can be hacked remotely, by hijacking 28,000 devices and instructing them to print out a printer security guide. The researchers said the document was printed by nearly 28,000 of those devices, which suggests that 56% of exposed printers can be hijacked.

If you frequently hand your phone over to others, Guest Mode is a feature you should be using on Android. Jack Wallen shows you how to access the feature from your lock screen.

The BeagleBoyz, part of the North Korean government's hacking apparatus, are back to targeting banks around the world after a brief pause in activity. The US Cybersecurity and Infrastructure Security Agency has released an alert with details of how the BeagleBoyz have made off with an estimated $2 billion in fiat and cryptocurrency since 2015, along with details on how financial institutions can protect themselves against their known patterns of attack.

One very clear area where Vivaldi is absolutely superior to all other browsers is how it makes managing your history not only easy, but intuitive. Let me show you how easy it is to manage that history within Vivaldi.

The IT skills shortage has forced 31% of organizations to prioritize investment in much-needed IT staff education, up from 19% pre-pandemic. Data and network security were tied as the enterprise's No. 1 priority: 76% of organizations named it as one of their most important IT projects for the rest of 2020, and the report credits "The rapidly growing remote workforce" for the renewed push for more robust IT departments.

Among them was Lance Ealy, a serial ID thief from Dayton, Ohio who used Ngo's service to purchase more than 350 "Fullz" - a term used to describe a package of everything one would need to steal someone's identity, including their Social Security number, mother's maiden name, birth date, address, phone number, email address, bank account information and passwords. Ealy used Ngo's service primarily to conduct tax refund fraud with the U.S. Internal Revenue Service, claiming huge refunds in the names of ID theft victims who first learned of the fraud when they went to file their taxes and found someone else had beat them to it.

Facebook is lambasting an upcoming Apple mobile operating system privacy update, which requires application to ask users for permission before collecting and sharing their data. In the iOS 14 update, Apple iPhone and iPad users have an explicit option to opt out of allowing apps to collect data using the Apple device identifier.

State and local governments have made a concerted effort to digitize their systems over the past several years. The "State and Local Government Security Report" released Thursday by security firm BlueVoyant shows how governments are vulnerable to ransomware and other forms of cyberattack and how agencies can better protect themselves and their sensitive data.

The definition of detection is very relevant as extended detection and response solutions become the next hot topic in the security industry. What is meant by extended detection? Is it detecting something new, or finding all the indicators and pulling them together so you can get a complete picture of what is happening and respond effectively? The answer is clear if you back into it.

Content delivery network provider Fastly announced on Thursday that it has agreed to acquire web application security firm Signal Sciences for approximately $775 million in cash and stock. Founded in 2014, California-based Signal Sciences provides web application firewall and runtime application self-protection technologies designed to protect applications, APIs and microservices.