Security News > 2022 > October

How do you protect your online systems? Cultivate an insider threat
2022-10-10 08:30

Teaching people to think like hackers is better than teaching them to fear the bogeyman, in many dimensions. It's much better to teach people how to write phishing emails.

Security and privacy features in macOS Ventura
2022-10-10 08:00

Apple announced additional security and privacy features for its newest operating system - macOS Ventura. In this Help Net Security video, you'll learn about new security and privacy features in macOS Ventura.

Mastercard moves to protect 'risky and frisky' crypto transactions
2022-10-10 06:57

MasterCard has named its effort Crypto Secure and says it "Allows to better assess the risk profile of crypto exchanges or other providers." Kelly told The Register that crypto exchanges are currently rated as similar risks to purveyors of gambling and prostitution - sectors known as "Risky and frisky" in the payments industry.

Purpose-based access control: Putting data access requests into context
2022-10-10 05:00

Role-based access control is a simple, understandable approach to making data access permit/deny decisions. Their contract negotiation teams often needed access to prepare quotes for new business, and accounts receivable needed access for accurate billing based on performance-related contract terms.

Increasing network visibility is critical to improving security posture
2022-10-10 04:30

IT leaders around the world share a ubiquitous appetite for greater network visibility. The findings of a Forrester Consulting study underscore a convergence in security with networking, which IT decision-makers now view as the missing strategy that will improve security response, automate compliance tasks, and better manage processes and outcomes.

Lack of transparency, systemic risks weaken national cybersecurity preparedness
2022-10-10 04:00

Bob Kolasky, SVP for Critical Infrastructure at Exiger, previously served as Assistant Director for Cybersecurity and Infrastructure Security Agency, and in this Help Net Security interview talks about protecting critical infrastructure, the importance of information-sharing, national cybersecurity preparedness, and more. Defining critical infrastructure is the backbone of risk prioritization for cybersecurity activities.

Microsoft Teams: A channel for sensitive business information sharing that needs better backup
2022-10-10 03:30

Hornetsecurity has found an urgent need for greater backup for Microsoft Teams with 45% of users sending confidential and critical information frequently via the platform. Users sharing confidential and sensitive information via Teams.

Board members should make CISOs their strategic partners
2022-10-10 03:00

There is a disconnect between the boardroom and CISOs when evaluating the risk posed by today's sophisticated cybercriminals: 65% of board members believe that their organization is at risk of material cyber attack in the next 12 months, compared to 48% of CISOs. Board members and CISOs have similar concerns about the threats they face: board members ranked email fraud/business email compromise as their top concern, followed by cloud account compromise, and ransomware.

Intel confirms leaked Alder Lake BIOS Source Code is authentic
2022-10-10 00:53

Intel has confirmed that a source code leak for the UEFI BIOS of Alder Lake CPUs is authentic, raising cybersecurity concerns with researchers. On Friday, a Twitter user named 'freak' posted links to what was said to be the source code for Intel Alder Lake's UEFI firmware, which they claim was released by 4chan.

That thing to help protect internet traffic from hijacking? Here's how to break it
2022-10-09 19:31

For those who don't know, the internet is a network of connected networks. More specifically, the internet consists of networks called autonomous systems that advertise their IP address prefixes via routers to neighboring networks using BGP, again to ultimately construct this routing map.