Security News > 2021

Planespotters’ weekends turn traumatic as engine pieces fall from the sky in the Netherlands and the US
2021-02-22 13:03

In what can only be described as a bad day for Boeing, not one but two of its planes suffered engine fire and began shedding parts along their respective flight paths. A Boeing 747-400 cargo plane flying from Maastricht Aachen airport in the Netherlands to New York on Saturday afternoon suffered an engine fire.

GPS Vulnerabilities
2021-02-22 12:17

Really good op-ed in the New York Times about how vulnerable the GPS system is to interference, spoofing, and jamming - and potential alternatives. The 2018 National Defense Authorization Act included funding for the Departments of Defense, Homeland Security and Transportation to jointly conduct demonstrations of various alternatives to GPS, which were concluded last March.

Mysterious Mac Malware Infected at Least 30,000 Devices Worldwide
2021-02-22 12:16

Researchers at managed detection and response firm Red Canary have come across a mysterious piece of Mac malware that appears to have infected at least 30,000 devices around the world. Researchers have come across two variants of the malware, including one designed to run on devices powered by Apple's new M1 chip, which uses the arm64 CPU architecture.

Brave browser leaks visited Tor .onion addresses in DNS traffic, fix released after bug hunter raises alarm
2021-02-22 07:14

Brave has patched up its privacy-focused web browser after it was spotted leaking its Tor users' dark-web habits. Onion domains visited by the browser to whatever DNS servers the software was configured to use for non-Tor websites, allowing whoever operates those DNS servers - or anyone who can snoop on the queries in transit - to figure out the kinds of hidden services frequented by an individual user.

Database encryption: Protecting the crown jewels
2021-02-22 06:30

They can also copy the entire database - including files that contain many of the corporate crown jewels. There are a variety of technologies for database encryption.

How do I select a network monitoring solution for my business?
2021-02-22 06:00

To select a suitable network monitoring solution for your business, you need to think about a variety of factors. Network monitoring is essential for any organization with a network.

10 COVID-19-related lessons for future-ready cybersecurity
2021-02-22 05:30

Set a good example: Establish a security champions program. Champions promote security literacy, quantify risks, and model good practices.

How to Fight Business Email Compromise (BEC) with Email Authentication?
2021-02-22 05:22

An ever-evolving and rampant form of cybercrime that targets emails as the potential medium to conduct fraud is known as Business Email Compromise. This is why industry experts are coming up with email authentication protocols like DMARC to offer a high level of protection against impersonation.

Exploring DevOps adoption among database pros
2021-02-22 05:00

Nearly three quarters of organizations have now adopted DevOps in some form, cross-platform database use has risen markedly and, significantly, IT teams have remained remarkably productive despite working remotely. "It helped to accelerate our understanding of the ways IT teams can cooperate and continue to develop applications and databases when taking a remote-first approach. That, in turn, has accelerated further the take-up of DevOps, the use of multiple database platforms for different use cases, and the move to the cloud."

The state of multicloud adoption, its drivers, and the technologies enabling it
2021-02-22 04:30

Turbonomic announced findings from the survey of over 800 global IT professionals that examines the current state of multicloud adoption, its drivers, and the technologies enabling it, including containers, public cloud, and edge computing. While only 30% of organizations are using three or more clouds, in the coming year advancing a multicloud strategy is the most important initiative for 21% of organizations, coming in second to optimizing existing cloud resources for performance and cost.