Security News > 2020

Ransomware wipes evidence, lets suspected drug dealers walk free
2020-02-28 12:04

Six alleged drug criminals will go free thanks to a ransomware attack on a small Florida city, it was revealed this month. It suffered an attack involving the Ryuk ransomware in April 2019 that took city servers offline.

Firefox rolling out DNS-over-HTTPS privacy by default in the US
2020-02-28 11:31

Mozilla has said it plans to make a privacy technology called DNS-over-HTTPS the default setting for US users of Firefox within weeks. Although not a perfect shield against DNS snooping, DoH makes that a lot harder.

Hacking has become a viable career, according to HackerOne
2020-02-28 11:09

HackerOne announced findings from the 2020 Hacker Report, which reveals that the concept of hacking as a viable career has become a reality, with 18% describing themselves as full-time hackers, searching for vulnerabilities and making the internet safer for everyone. The annual report is a study of the bug bounty and vulnerability disclosure ecosystem, detailing the efforts and motivations of 3,150 hackers from over 120 countries who successfully reported one or more valid security vulnerabilities on HackerOne.

Google has right to censor conservative nonprofit on YouTube
2020-02-28 10:44

Thus did the 9th Circuit Court of Appeals in San Francisco dismiss a top right-wing content creator's allegation that Google had violated its First Amendment rights by tagging dozens of its videos on abortion, gun rights, Islam and terrorism with its Restricted Mode and demonetizing them so the nonprofit can't make money from advertising. It's best known for its many 5-minute videos, some of which, starting in 2016, Google dubbed Restricted, including videos about the 10 Commandments, whether police were racist, and Israel's legal founding.

GhostCat: New High-Risk Vulnerability Affects Servers Running Apache Tomcat
2020-02-28 10:37

If your web server is running on Apache Tomcat, you should immediately install the latest available version of the server application to prevent hackers from taking unauthorized control over it. Yes, that's possible because all versions of the Apache Tomcat released in the past 13 years have been found vulnerable to a new high-severity 'file read and inclusion bug'-which can be exploited in the default configuration.

What is plaguing public sector cyber readiness?
2020-02-28 09:50

IT complexity, insider threats, and an abundance of privileged users plague public sector cyber readiness, a SolarWinds report has revealed, based on the answers from 400 IT operations and security decisionmakers, including 200 federal, 100 state and local, and 100 education respondents. Fifty-two percent of total respondents cited insiders as the top threat; this number is consistent for both federal and state and local respondents.

Photos: RSA Conference 2020, part 4
2020-02-28 08:39

RSA Conference 2020 is underway at the Moscone Center in San Francisco. Check out our microsite for the conference for all the most important news.

Boundless Cybersecurity for Hyper Distributed Era: Tackling the Unknowns
2020-02-28 06:48

The boundaries of your digital empire have become limitless. What was once a finite and defensible space is now a boundless territory - a vast, sprawling footprint of devices, apps, appliances, servers, networks, clouds and users.

Only 38% of US govt workers received ransomware prevention training
2020-02-28 05:30

73% of government employees are concerned about impending ransomware threats to cities across the country, and more employees fear of cyberattacks to their community than natural disasters and terrorist attacks, an IBM survey has revealed. Data in the new Harris Poll found ransomware attacks might be even more widespread, with 1 in 6 respondents disclosing their department was impacted by a ransomware attack.

Tiny cryptographic ID chip can help combat hardware counterfeiting
2020-02-28 05:00

To combat supply chain counterfeiting, which can cost companies billions of dollars annually, MIT researchers have invented a cryptographic ID tag that's small enough to fit on virtually any product and verify its authenticity. Wireless ID tags are becoming increasingly popular for authenticating assets as they change hands at each checkpoint.