Security News
The UK's ruling Conservative Party has been using personal data in a way that spots an individual's likely county of origin, ethnic origin and religion based on their first and last name. According to an ICO report, the Tory party purchased so-called "Estimated onomastic data" and appended it to the records of 10 million voters.
The Czech Republic's intelligence agency said Tuesday Russian and Chinese spies posed an imminent threat to the EU member's security and other key interests last year. All Russian intelligence services were active on Czech territory in 2019.
The DontTouchTheGreenButton.com website just launched by the Trump campaign in relation to the recently filed Arizona "Rejected votes" lawsuit was discovered to be leaking voter data. The data included the voter name, address, and a unique identifier.
UPDATE. Video game giant Capcom has confirmed that it has been hit by a ransomware attack that affected access to certain systems - including email and file servers - and encrypted 1 terabyte of sensitive data. According to Bleeping Computer, the Ragnar Locker ransomware was used in the cyberattack.
Cybersecurity professionals know there are fundamental gaps in most cyber operations centers, one of which is the overwhelming level of effort required to understand cyber threat information. As a result, cyber analysts are rarely allowed to produce their primary work product: actionable intelligence.
NetMarketShare announced on Sunday plans to shut down its public browser share reporting tool, which has been available for more than 14 years. According to Net Applications, the data provided by NetMarketShare is a primary source in "Tens of thousands of articles and publication".
Microsoft this week announced the availability of a new vulnerability management report in Microsoft Defender, to provide information on vulnerable devices. The new built-in report complements existing Microsoft Defender for Endpoint threat and vulnerability management capabilities and is catered for those looking to gain insights on devices that pose potential risks due to unpatched vulnerabilities.
As the number one threat vector for most organizations, email continues to be widely used by cybercriminals to penetrate organizations in support of a wide variety of cyberattacks. Unlike other attack vectors, email enables cybercriminals to directly leverage humans in an effort to bypass security controls and facilitate attacks.
Details of bank vault floor plans, alarm systems and the security arrangements for Swedish authorities have been leaked online after a security company was hacked, local media reported Tuesday. A total of 19 gigabytes of information and around 38,000 files were stolen from security group Gunnebo by one or more hackers in August, according to newspaper Dagens Nyheter.
The infrastructure reviews - published by Jisc today - took place between 2016 and 2020 and covered 118 institutions, including 59 Further Education colleges. The research went on to note that most colleges found managing the upgrade cycle of both end user kit and infrastructure "Very difficult".