Security News > 2022 > October

Teaching people to think like hackers is better than teaching them to fear the bogeyman, in many dimensions. It's much better to teach people how to write phishing emails.

Apple announced additional security and privacy features for its newest operating system - macOS Ventura. In this Help Net Security video, you'll learn about new security and privacy features in macOS Ventura.

MasterCard has named its effort Crypto Secure and says it "Allows to better assess the risk profile of crypto exchanges or other providers." Kelly told The Register that crypto exchanges are currently rated as similar risks to purveyors of gambling and prostitution - sectors known as "Risky and frisky" in the payments industry.

Role-based access control is a simple, understandable approach to making data access permit/deny decisions. Their contract negotiation teams often needed access to prepare quotes for new business, and accounts receivable needed access for accurate billing based on performance-related contract terms.

IT leaders around the world share a ubiquitous appetite for greater network visibility. The findings of a Forrester Consulting study underscore a convergence in security with networking, which IT decision-makers now view as the missing strategy that will improve security response, automate compliance tasks, and better manage processes and outcomes.

Bob Kolasky, SVP for Critical Infrastructure at Exiger, previously served as Assistant Director for Cybersecurity and Infrastructure Security Agency, and in this Help Net Security interview talks about protecting critical infrastructure, the importance of information-sharing, national cybersecurity preparedness, and more. Defining critical infrastructure is the backbone of risk prioritization for cybersecurity activities.

Hornetsecurity has found an urgent need for greater backup for Microsoft Teams with 45% of users sending confidential and critical information frequently via the platform. Users sharing confidential and sensitive information via Teams.

There is a disconnect between the boardroom and CISOs when evaluating the risk posed by today's sophisticated cybercriminals: 65% of board members believe that their organization is at risk of material cyber attack in the next 12 months, compared to 48% of CISOs. Board members and CISOs have similar concerns about the threats they face: board members ranked email fraud/business email compromise as their top concern, followed by cloud account compromise, and ransomware.

Intel has confirmed that a source code leak for the UEFI BIOS of Alder Lake CPUs is authentic, raising cybersecurity concerns with researchers. On Friday, a Twitter user named 'freak' posted links to what was said to be the source code for Intel Alder Lake's UEFI firmware, which they claim was released by 4chan.

For those who don't know, the internet is a network of connected networks. More specifically, the internet consists of networks called autonomous systems that advertise their IP address prefixes via routers to neighboring networks using BGP, again to ultimately construct this routing map.