Security News

Research finds consumer-grade IoT devices showing up... on corporate networks
2021-10-21 09:27

Increasing numbers of "Non-business" Internet of Things devices are showing up inside corporate networks, Palo Alto Networks has warned, saying that smart lightbulbs and internet-connected pet feeders may not feature in organisations' threat models. According to Greg Day, VP and CSO EMEA of the US-based enterprise networking firm: "When you consider that the security controls in consumer IoT devices are minimal, so as not to increase the price, the lack of visibility coupled with increased remote working could lead to serious cybersecurity incidents."

Romance scams with a cryptocurrency twist – new research from SophosLabs
2021-10-13 18:01

All those dubious excuses needed by traditional romance scammers to talk you into using wire transfer services to send money, or into buying them gift cards and sending through the redemption codes, are replaced by a sense of structure: there's a genuine app for this investment! The cryptorom scammers will even offer you an app if you have an iPhone, where Apple's "Walled garden" approach of requiring all consumer app downloads to come from the Apple App Store almost certainly persuades many victims that the cryptorom app must indeed have some sort of official authorisation or approval.

Is it OK to use stolen data? What if it's scientific research in the public interest?
2021-09-17 13:02

There's a fine line between getting hold of data that may be in the public interest and downright stealing data just because you can. To kick off, Marcello Ienca, a research fellow at the Swiss Federal Institute of Technology, and Effy Vayena, deputy head of the Swiss Institute of Translational Medicine, offered the definition that "Hacked" data is "Data obtained in an unauthorized manner through illicit access to a computer or computer network." They claim it is increasingly being used in scientific research such as conflict modelling studies based on WikiLeaks datasets, and studies on sexual behaviour based on data leaked from Ashley Madison, a dating website whose database was pilfered by a group of attackers calling themselves The Impact Team in 2015.

Security bods boost Apple iPhone hardware attack research with iTimed toolkit
2021-09-14 16:45

Openc8... is applicable to a range of iPhone models all the way up to the iPhone X - though the research paper focuses on its use in the iTimed toolkit to audit and attack the Apple A10 Fusion chip inside an iPhone 7. The trio's - Seetal Potluri was the third researcher - checkm8 reimplementation, which brings with it a range of claimed improvements, is dubbed openc8, and is applicable to a range of iPhone models all the way up to the iPhone X - though the research paper focuses on its use in the iTimed toolkit to audit and attack the Apple A10 Fusion chip inside an iPhone 7.

Rapid7 says Computer Misuse Act should include 'good faith' infosec research exemption
2021-09-03 15:16

Infosec firm Rapid7 has joined the chorus of voices urging reform to the UK's Computer Misuse Act, publishing its detailed proposals intended to change the cobwebby old law for the better. "It's worth noting that neither the National Crime Agency or the CPS seem to be recklessly pursuing frivolous investigations or prosecutions of good-faith security research. Nonetheless, the current legal language does expose researchers to legal risk and uncertainty, and it would be good to see some clarity on the topic," said Rapid7 in a blog post published over the sleepy summer period.

Education and research sector hit by highest number of cyberattacks in July
2021-08-18 13:48

Facilities in the sector saw an average of 1,739 attacks per organization each week last month, according to Check Point Research. A report published Wednesday by cyber threat intelligence provider Check Point Research looks at the latest wave of cyberattacks against educational and research facilities in particular and offers tips on how to better combat them.

Kaustubh Medhe joins Cyble as Head of Research and Intelligence
2021-08-16 12:42

In his new role as the Head of Research and Intelligence at Cyble, Kaustubh will be driving the research initiatives of Cyble and overseeing and operationalize the development of the company's security research and client delivery initiatives. He will play a pivotal role in leading Cyble's threat intelligence capabilities to foster the production of strategic and actionable threat research and accelerate the integration of Cyble's services across the world.

Mismanagement Driving Cybersecurity Skills Gap: Research
2021-08-03 16:09

"To some extent, this data supports the theory that the cybersecurity skills shortage is related to mismanagement rather than a dearth of qualified candidates or advanced skills." The skills gap is partly a self-inflicted wound on the industry by the industry.

Research finds cyber-snoops working for 'Chinese state interests' lurking in SE Asian telco networks since 2017
2021-08-03 04:01

Attack protection specialist Cybereason has fingered threat actors working on behalf of "Chinese state interests" as being behind attacks on telcos operating in Southeast Asia - with some having been prowling the penetrated networks for information on high-value targets since 2017. "Telcos are a prime target for nation-state espionage programs for various reasons, among them, the ability to collect information about the telco's subscribers," Assaf Dahan, senior director and head of threat research at Cybereason, told.

Paving the way for women in industrial cybersecurity research
2021-07-12 05:00

That's why I believe the first step to bringing more women into the field of cybersecurity - and the greatest catalyst to their success in the industry - is female inspiration and mentorship. Today, many women base their decisions to join a company on whether there are other women working there, especially in positions of leadership.