Security News > 2020

Facebook asks to be regulated kinda like a newspaper, kinda like telco
2020-02-19 11:37

Facebook gave up trying to hide behind that one long ago, somewhere amongst the outrage sparked by extremist content, fake news and misleading political advertising. During a Q&A session at the Munich Security Conference on Saturday, Zuckerberg admitted that Facebook isn't the passive set of telco pipes he once insisted it was, but nor is it like a regular media outlet that produces news.

WordPress plugin hole could have allowed attackers to wipe websites
2020-02-19 11:21

A WordPress plugin with over 100,000 active installations had a hole which coould have allowed unauthorised attackers to wipe its users' blogs clean, it emerged this week. ThemeGrill is a WordPress theme developer that publishes its own Demo Importer plugin.

OpenSSH eases admin hassles with FIDO U2F token support
2020-02-19 11:00

OpenSSH version 8.2 is out and the big news is that the world's most popular remote management software now supports authentication using any FIDO U2F hardware token. Adding support inside OpenSSH simply means that any U2F token can now be used, including older FIDO1 and more recent FIDO2 hardware.

Hacked Off: Patients Sue Ransom-Paying Hospital Group
2020-02-19 10:18

A lawsuit seeking class action status has been filed against a New Jersey healthcare organization in the wake of a ransomware attack last December in which the entity paid attackers a ransom to unlock its systems. Because of the ransomware attack, patients had their medical care and treatment disrupted, the complaint alleges.

What do a Lenovo touch pad, an HP camera and Dell Wi-Fi have in common? They'll swallow any old firmware, legit or saddled with malware
2020-02-19 08:02

Eclypsium said on Monday that, despite years of warnings from experts - and examples of rare in-the-wild attacks, such as the NSA's hard drive implant - devices continue to accept unsigned firmware. The infosec biz said a miscreant able to alter the firmware on a system - such as by intercepting or vandalizing firmware downloads, or meddling with a device using malware or as a rogue user - can do so to insert backdoors and spyware undetected, due to the lack of cryptographic checks and validations of the low-level software.

What does a Lenovo touch pad, an HP camera and Dell Wi-Fi have in common? They'll swallow any old firmware, legit or saddled with malware
2020-02-19 08:02

Eclypsium said on Monday that, despite years of warnings from experts - and examples of rare in-the-wild attacks, such as the NSA's hard drive implant - devices continue to accept unsigned firmware. The infosec biz said a miscreant able to alter the firmware on a system - such as by intercepting or vandalizing firmware downloads, or meddling with a device using malware or as a rogue user - can do so to insert backdoors and spyware undetected, due to the lack of cryptographic checks and validations of the low-level software.

The top four Office 365 security pain points
2020-02-19 06:45

Many novice Office 365 shops do not know where platform-specific security vulnerabilities lie, or even that they exist. Companies get themselves into trouble when they do not fully understand the way data moves through O365 or they apply on-premise security practices to their cloud strategy.

Jon Callas: Encryption is a technology that rearranges power
2020-02-19 06:30

There are things that have been true for technical people for decades and will continue to be true. About half the things you know will be obsolete after five years, so you'll have to learn new things and maybe pivot your career.

Ring Makes 2-Factor Authentication Mandatory Following Recent Hacks
2020-02-19 06:24

Following several recent reports of hackers gaining access to people's internet-connected Ring doorbell and security cameras, Amazon yesterday announced to make two-factor authentication security feature mandatory for all Ring users. Until now, enabling the two-factor authentication in Ring devices was optional, which definitely would have prevented most Ring hacks, but of course, many never bothered to enable it.

A third of all vulnerabilities in 2019 had a CVSS v2 score of 7.0 and above
2020-02-19 06:00

Risk Based Security's VulnDB team aggregated 22,316 newly-disclosed vulnerabilities during 2019, finding that 37.26% had available exploit code or a Proof of Concept and that 33.43% of all vulnerabilities in 2019 had a CVSS v2 score of 7.0 and above. Risk Based Security also identified a total of 302 vulnerabilities impacting Electronic Voting Machines, 289 of which have no known solution.