Security News > 2020

Why The Cloud Is The New Network
2020-02-27 14:18

Barracuda Networks has released the findings of its latest survey on public cloud security. Fleming Shi, chief technology officer of the company, describes what is holding organizations back from fully embracing the public cloud.

Less Than Half of Vulnerabilities in Popular Docker Images Pose Risk: Study
2020-02-27 14:06

Cloud security company Rezilion has analyzed some of the most popular Docker container images and determined that while they include many vulnerabilities, less than half of these flaws pose an actual risk. Rezilion's researchers have analyzed 20 of the most popular container images hosted on DockerHub, the largest library and community for container images.

Framework Isolates Libraries in Firefox to Improve Security
2020-02-27 13:35

A group of researchers has built a sandbox framework that can improve the security of Firefox by isolating third-party libraries used by the browser. Similar to other major browsers, Firefox relies on third-party libraries to render content - such as audio, video, and images - and these libraries often introduce additional vulnerabilities, researchers from the University of California San Diego, University of Texas at Austin, Stanford University and Mozilla say.

S2 Ep28: Stalkerware, when cybercrooks return, and phishing gone wild – Naked Security Podcast
2020-02-27 13:19

This week we discuss the stalkerware app that spilled bucketloads of ultrapersonal data, a double-whammy ransomware attack on a homeless charity, and an Amazon Prime-themed phishing attack with a skull-and-crossbones twist. LISTEN NOW. Click-and-drag on the soundwaves below to skip to any point in the podcast.

Online 'Impersonator' Tried to Contact Campaigns, DNC Says
2020-02-27 12:54

The Democratic National Committee has warned its presidential candidates to be cautious after Bernie Sanders' campaign reported that an "Impersonator" with a domain registered overseas had posed as one of its staffers and sought conversations with members of at least two other campaigns. Bob Lord, the DNC's chief security officer, wrote in an email to his party's presidential campaigns on Wednesday that "Adversaries will often try to impersonate real people on a campaign" to get people to "Download suspicious files, or click on a link to a phishing site." Lord said attackers may also try to set up a call or in-person meeting that they can record and publish.

Hacker Earns $8,500 for Vulnerability in HackerOne Platform
2020-02-27 12:15

Earlier this month, a hacker who uses the online moniker msdian7 discovered that a new feature introduced by the HackerOne bug bounty platform had resulted in a vulnerability that could have been exploited to obtain any HackerOne user's email address. The vulnerability could have been exploited for malicious purposes through HackerOne's demo programs.

The Urgency for Having a True Security Platform
2020-02-27 12:06

A true security platform should be able to deliver essential security solutions into a complex network environment while reducing things like management, configuration, and orchestration overhead. But to differentiate between a real platform strategy that can simplify the lives of your IT team members, and a set of solutions that simply shift the complexity of managing independent security tools from the wiring closet to a box, we need to define exactly what we mean when we use the term platform. To qualify as broad, a cybersecurity platform needs to provide effective and consistent security across the entire distributed network - including multi-clouds, branch offices, edge networks, mobile devices, and data centers - to enable digital innovation and protect every edge in the infrastructure.

Securing the Internet of Things through Class-Action Lawsuits
2020-02-27 12:03

This law journal article discusses the role of class-action litigation to secure the Internet of Things. Basically, the article postulates that market realities will produce insecure IoT devices, and political failures will leave that industry unregulated.

Sophos was gearing up for a private life – then someone remembered the bike scheme
2020-02-27 11:57

There's been a bump in the road, a stick in the wheel, because Sophos was a member of the UK government's "Cycle to work" scheme - which offers staff loans to pay for bicycles and related stuff like lights, helmets and panniers. The trouble is that the bike scheme is regulated by the Financial Conduct Authority.

Spotting a Norman: How to Root Out Those Wasting Organizational Resources
2020-02-27 11:54

How many times have you met someone full of promises and big on talk, only to be disappointed by what results from your engagement with them? Normans not only let organizations down, they adversely affect the information security postures of those organizations by taking valuable time and resources away from other value-added activities. If you know someone who has these traits, they might be a Norman.