Security News > 2020

Don't be fooled, experts warn, America's anti-child-abuse EARN IT Act could burn encryption to the ground
2020-03-06 22:17

On Thursday, a bipartisan group of US senators introduced legislation with the ostensible purpose of combating child sexual abuse material online - at the apparent cost of encryption. The law bill is called the Eliminating Abusive and Rampant Neglect of Interactive Technologies Act, which folds up into the indignant acronym EARN IT. Backed by senators Lindsey Graham, Richard Blumenthal, Josh Hawley and Dianne Feinstein, the proposed law intends to make technology companies "Earn" their exemption from liability allowed under Section 230 of the US Communications Decency Act by requiring internet companies to follow a set of best practices to keep CSAM off their networks.

Friday Squid Blogging: The Effect of Noise on Squid
2020-03-06 22:06

Diners, bars, clubs etc through luxury hotels, all places where more than ten or so unrelated people can gather so churches, "Town halls", museums, movie houses, music venues, sports venues and any other entertainment where people come into direct or even indirect physical contact or directly or indirectly share physical objects. Personaly as a person who is very much dependent on public transport, I would argue that they are not actually essential especially if the now obviously necessary lockdowns are implemented.

Next-Gen Ransomware Packs a ‘Human’ Punch, Microsoft Warns
2020-03-06 21:50

"These attacks are known to take advantage of network configuration weaknesses and vulnerable services to deploy devastating ransomware payloads," said researchers on Thursday. "And while ransomware is the very visible action taken in these attacks, human operators also deliver other malicious payloads, steal credentials, and access and exfiltrate data from compromised networks."

Next-Gen Ransomware Packs a ‘Human’ Punch, Microsoft Warns
2020-03-06 21:50

"These attacks are known to take advantage of network configuration weaknesses and vulnerable services to deploy devastating ransomware payloads," said researchers on Thursday. "And while ransomware is the very visible action taken in these attacks, human operators also deliver other malicious payloads, steal credentials, and access and exfiltrate data from compromised networks."

2020 Security Agenda: Who Owns it?
2020-03-06 21:34

It's relatively easy to list an enterprise's cybersecurity priorities for 2020. Who owns them? What are the hurdles to completing these projects? These can be tougher questions to answer, says Ellen Sundra of Forescout.

Hot Topics in Cybersecurity Research
2020-03-06 21:33

Quantifying risk is a significant challenge in cybersecurity. Wade Baker of Cyentia Institute discusses recent research projects.

Assessing the Human Element in Cloud Access
2020-03-06 21:03

Markku Rossi of SSH Communications Security discusses zero standing privileges and cloud access. The theme of "The human element" in terms of cloud access;.

FYI: When Virgin Media said it leaked 'limited contact info', it meant p0rno filter requests, IP addresses, IMEIs as well as names, addresses and more
2020-03-06 21:03

A Virgin Media server left facing the public internet contained more than just 900,000 people's "Limited contact information" as the Brit cable giant's CEO put it yesterday. The marketing database also contained some subscribers' requests to block or unblock access to X-rated and gambling websites, unique ID numbers of stolen cellphones, and records of whichever site they were visiting before arriving at the Virgin Media website.

The Evolution of Cloud Governance
2020-03-06 20:33

The bad news: Visibility and governance take a huge hit. Matt Kraning, CTO and co-founder of Expanse, discusses this challenge and how to improve cloud governance.

How world leaders use big data
2020-03-06 19:58

It's a fine line between countries sharing data in order to help with common interests and imposing on the privacy of those who provide it. The World Economic Forum's director weighs in.