Security News > 2024 > April

UK's Investigatory Powers Bill to become law despite tech world opposition
2024-04-26 12:00

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

Long Article on GM Spying on Its Cars’ Drivers
2024-04-26 11:01

About Bruce Schneier I am a public-interest technologist, working at the intersection of security, technology, and people. I've been writing about security issues on my blog since 2004, and in my monthly newsletter since 1998.

10 Critical Endpoint Security Tips You Should Know
2024-04-26 10:46

In today's digital world, where connectivity is rules all, endpoints serve as the gateway to a business’s digital kingdom. And because of this, endpoints are one of hackers' favorite targets. ...

New 'Brokewell' Android Malware Spread Through Fake Browser Updates
2024-04-26 10:42

Fake browser updates are being used to push a previously undocumented Android malware called Brokewell. "Brokewell is a typical modern banking malware equipped with both data-stealing and...

Palo Alto Networks Outlines Remediation for Critical PAN-OS Flaw Under Attack
2024-04-26 10:18

Palo Alto Networks has shared remediation guidance for a recently disclosed critical security flaw impacting PAN-OS that has come under active exploitation. The vulnerability, tracked...

Kaiser Permanente: Data breach may impact 13.4 million patients
2024-04-26 09:34

Healthcare service provider Kaiser Permanente disclosed a data security incident that may impact 13.4 million people in the United States. "Kaiser Permanente has determined that certain online technologies, previously installed on its websites and mobile applications, may have transmitted personal information to third-party vendors Google, Microsoft Bing, and X when members and patients accessed its websites or mobile applications" - Kaiser Permanente.

Four trends to top the CISO’s packed agenda
2024-04-26 07:34

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
2024-04-26 05:49

Threat actors are attempting to actively exploit a critical security flaw in the WP‑Automatic plugin for WordPress that could allow site takeovers. The shortcoming, tracked as CVE-2024-27956,...

Flaws in Chinese keyboard apps leave 750 million users open to snooping, researchers claim
2024-04-26 05:33

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

Most people still rely on memory or pen and paper for password management
2024-04-26 05:00

These practices reveal a significant gap between recommended security practices and actual user behavior, highlighting how weak password habits and password reuse significantly heighten cybersecurity risks and identity theft. Despite 60% of users claiming they feel confident in identifying a phishing attack and 68% feeling prepared to identify and mitigate AI-enhanced cyberattacks, many respondents still resort to risky password management methods.