You are here
Home > Posts tagged "ZDNET"

Samsung admits fingerprint reader flaw, promises software fix

A PR nightmare for Samsung, far worse than the FaceID 'twins' problem. This case highlights the need to have a security mindset ("I wonder what happens if I do this...") during product development, or at the very least engage some cynical field testers before signing off the product for launch. We see a lot of articles about DevSecOps for the software development lifecycle (SDLC), what about introducing DevSecProd for product development?...: Samsung has promised to provide

Cyberbit discovers international airport riddled with Bitcoin-mining malware

I often have to demonstrate how 'traditional' AV can be bypassed. For example, if you want to steal credentials using mimikatz or similar, you can run it in memory with no files present on the target device. It looks like someone has been making money at airports using similar techniques...: Cyberbit says its computer security software helped uncover a large infection of cryptocurrency mining software at an unnamed "international airport in Europe" where the majority of work

Mind-reading technology is everyone’s next big security nightmare

Brain computer interfaces (BCI) are already here in the form of external (non-invasive) and internal (invasive) systems. Putting aside the risks from invasive surgery, do you want your data 'out there'?...: [...] That said, once the data is collected by BCI and passed on to other software, it's just as secure as any other set of information. In the wake of many, many data breaches it's clear there are no guarantees that sensitive information is better protected than other ki

Linux security hole: Much sudo about nothing

Nothing to see here, move along...: [...] As the sudo manual points out, "using ALL can be dangerous since in a command context, it allows the user to run any command on the system." In all my decades of working with Linux and Unix, I have never known anyone to set up sudo with ALL. That said, if you do have such an inherently broken system, it's then possible to run commands as root by specifying the user ID -1 or 4294967295. Thus, if the ALL keyword is listed first in t

Security pro confessional: The time I almost got hacked

I've done some stupid things in the past but generally my scepticism prevents clicking on dodgy links (unless from a fully sandboxed, disposable virtual machine that gets destroyed afterwards). Looks like I'm not alone...: [...] I travel often, and on occasion I head to states with plenty of toll roads. Back in 2016 I'd recently traveled to Northern Virginia, New Jersey, and New York all within a couple of weeks. I returned home and about a week later I got the email below (

Data breach at Russian ISP impacts 8.7 million customers

Wow. This happened 2 years ago. It's fortunate for Beeline that these are not European 'natural persons' otherwise the full wrath of GDPR would be upon them...: [...] Beeline, a Russian telecommunications company with clients in Russia, all of Asia, and Australia, admitted to the breach. Speaking to Russian news agency Kommersant, which first reported the security incident, the ISP said the breach happened in 2017 and that they found the persons responsible at the time, a

Microsoft: MFA bypass attacks are so rare we don’t have good statistics on them

A few years ago I attempted to turn on MFA for Office 365 accounts in one business I support. Half of the users were unable to use it or, more accurately, would not bother to read and follow instructions. Still, I'm amazed that less than 10% have made the switch...: Attacks on Microsoft user accounts that are capable of bypassing multi-factor authentication (MFA) protections are so rare that the Redmond-based company doesn't even have stats for them. "Compared to password

Malindo Air identifies employees of e-commerce contractor behind data breach

I'd be interested to see what security controls were in place to detect rogue activity. Remembering the GDPR distinction between 'Data Owner' and 'Data Processor'; irrespective of who actually stole the data, it's the airline that is responsible...: [...] The two former employees were based at GoQuo's development centre in India and "improperly accessed and stole" personal data of the airlines' customers, said Malindo Air in the latest of a series of statements regarding the

Dear network operators, please use the existing tools to fix security

Using the public internet for mission-critical workloads? Time to make sure plan B is in place...: [...] The BGP standard includes so-called Resource Public Key Infrastructure (RPKI) Route Origin Authorisations (ROAs) to certify the truth of routing messages, but they're not deployed as widely as they might be. As APNIC's chief scientist Geoff Huston says, internet routing is therefore a "system that relies on the propagation of rumours". False rumours can be mistakes

Top