Security News > 2020 > October

Disgraced cop, 55, spared prison term after admitting he abused police systems to snoop on his girlfriend's ex
2020-10-07 11:15

A police officer who quit while under investigation for computer misuse crimes has walked free from court after pleading guilty to a total of nine offences. At the time he committed his crimes, Westbury was a constable with Dyfed-Powys Police.

Android's October 2020 Security Update Patches 48 Vulnerabilities
2020-10-07 11:06

The October 2020 security updates for Android patch a total of 48 vulnerabilities, including critical-severity flaws that affect Qualcomm closed-source components. Twenty of the vulnerabilities described in the latest Android Security Bulletin were patched as part of the 2020-10-01 security patch level, the most important of which is a high-risk bug in System that could allow a remote attacker to gain additional permissions.

New Privacy Features in iOS 14
2020-10-07 11:05

A good rundown.

Chrome 86 delivers more security features for mobile users
2020-10-07 11:02

The Password Checkup feature came first in the form of a Chrome extension, then was built into Google Account's password manager and Chrome, and now it has been enhanced with support for the ". Enhanced Safe Browsing mode, which was first introduced in Chrome 83, allows users to get a more personalized protection against malicious sites.

US brokerage firms warned of widespread survey phishing attacks
2020-10-07 10:50

The U.S. Financial Industry Regulatory Authority has issued a notice warning member brokerage firms of widespread phishing attacks using surveys to harvest information. FINRA is a non-profit organization and self-regulatory body authorized by the U.S. government to regulate exchange markets and brokerage firms.

Comcast cable remotes hacked to snoop on conversations
2020-10-07 09:27

Dubbed WarezThe Remote, the attack allowed taking over the remote and snooping on conversations from at least 65 feet, making possible a "Van parked outside" scenario. Unlike regular remotes that use infrared, Comcast's XR11 relies on radiofrequency to communicate with cable set-top boxes and comes with a built-in microphone to allow voice commands.

UK, French, Belgian blanket spying systems ruled illegal by Europe’s top court
2020-10-07 06:54

Mass surveillance programs run by the UK, French and Belgian governments are illegal, Europe's top court has decided in a huge win for privacy advocates. The European Court of Justice announced on Tuesday that legislation passed by all three countries that allows the government to demand traffic and location data from internet and mobile providers in "a general or indiscriminate way" breaks EU data privacy laws - even when national security concerns are invoked.

A Handy Guide for Choosing a Managed Detection & Response (MDR) Service
2020-10-07 05:43

MDR is essentially an outsourced cybersecurity expert service that monitors a company's environment and provides an improved ability to detect, investigate, and respond to threats. Interestingly, Cynet provides MDR service to its customers at no additional cost.

Three common mistakes in ransomware security planning
2020-10-07 04:55

Insufficient DR planning that fails to account for a ransomware threat that could infect your backups. Common mistake #1 - Failing to present security risk in business terms to get funding and policies.

How do I select a data storage solution for my business?
2020-10-07 04:30

Your applications should also drive the essential architecture of your storage system, whether directly connected or networked, whether required to store and deliver data as blocks, files, objects or all three, and whether the storage system must efficiently support a wide range of workloads while prioritizing the performance of the most demanding applications. Consideration should be given to your overall IT data management architecture to support the scalability, data protection, and business continuity assurance required for your enterprise, spanning from core data centers to those distributed at or near the edge and endpoints of your enterprise operations, and integration with your cloud-resident applications, compute and data storage services and resources.