Security News > 2021

Remote hiring: Cybersecurity best practices
2021-03-15 19:54

In the TechRepublic article Amazon, Disney, and Uber reveal remote interviewing and hiring processes, N.F. Mendoza looks at key human resource trends and predictions regarding remote hiring. Aside from figuring how to handle all the subtleties of remote hiring, there are plenty of cybersecurity challenges that also need to be addressed.

Naked Security Live – HAFNIUM explained in plain English
2021-03-15 19:33

The word "Hafnium" can refer [a] to a gang currently involved in a bunch of attacks, [b] to the exploits they're using at the moment, and [c] to the malware they are deploying after they get in. Watch directly on YouTube if the video won't play here.

Blender website in maintenance mode after hacking attempt
2021-03-15 19:24

Blender.org, the official website of the popular 3D computer graphics software Blender, is now in maintenance mode according to a message displayed on the site. According to Blender, parts of the blender.org website and some of the blogs are still down and will remain offline for several hours.

iOS Clock app crashes due to strange Beirut timezone bug
2021-03-15 19:20

A strange bug in iOS is causing the Clock app to crash when creating a new alarm if the device's timezone is set to Beirut, Lebanon. Today, a reader shared the bug with BleepingComputer, and after testing it on devices running iOS 14.4 and 14.4.1, we can confirm that the Clock apps crashes if we are using the Beirut timezone.

Over 80,000 Exchange Servers Still Affected by Actively Exploited Vulnerabilities
2021-03-15 18:50

Roughly 80,000 Exchange servers have yet to receive patches for the actively exploited vulnerabilities, Microsoft says. Over the course of last week, Microsoft released additional fixes for these vulnerabilities, including security updates for older and unsupported Exchange Server versions, or Cumulative Updates, as the company calls them.

Not quite "The Purge," but 70% adopted home tech to increase security amid pandemic
2021-03-15 18:42

Many who were largely confined to their homes contributed to the surge in home improvements like new or upgraded home offices, kitchen and outdoor rec spaces. Home security during the pandemic was critical, notably to those who were working from home, because the change from in-office to in-home was so swift, many IT departments couldn't cover all the employees with access to what-should-be-secure files.

Cyberattacks See Fundamental Changes, A Year into COVID-19
2021-03-15 18:17

Email scamming is still one of the most effective types of attacks in the coronavirus era, according to Kaspersky, since fear and anxiety are two of the most-exploited emotions for this kind of social-engineering attack. In 2020, delivery services entered the top ten most-spoofed organizations for these types of attacks, according to Kaspersky.

Swiss Police Raid Over Hack on U.S. Security-Camera Company
2021-03-15 18:01

Swiss authorities on Monday confirmed a police raid at the home of a Swiss software engineer who took credit for helping to break into a U.S. security-camera company's online networks, part of what the activist hacker cited as an effort to raise awareness about the dangers of mass surveillance. The Federal Office of Justice said regional police in central Lucerne, acting on a legal assistance request from U.S. authorities, on Friday carried out a house search involving hacker Tillie Kottmann.

Twitter now supports multiple 2FA security keys on mobile and web
2021-03-15 18:00

Twitter has added support for multiple security keys to accounts with two-factor authentication enabled for logging into the social network's web interface and mobile apps. "Secure your account with multiple security keys," Twitter said.

Phishing sites now detect virtual machines to bypass detection
2021-03-15 17:20

Phishing sites are now using JavaScript to evade detection by checking whether a visitor is browsing the site from a virtual machine or headless device. Cybersecurity firms commonly use headless devices or virtual machines to determine if a website is used for phishing.