Advertisement

Immunity Passports Are a Threat to Our Privacy and Information

immunity passports are a threat to our privacy and information

BEGIN ARTICLE PREVIEW:

With states beginning to ease shelter-in-place restrictions, the conversation on COVID-19 has turned to questions of when and how we can return to work, take kids to school, or plan air travel.Several countries and U.S. states, including the UK, Italy, Chile, Germany, and California, have expressed interest in so-called “immunity passports”—a system of requiring people to present supposed proof of immunity to COVID-19 in order to access public spaces, work sites, airports, schools, or other venues. In many proposed schemes, this proof would be stored in a digital token on a phone. Immunity passports would threaten our privacy and information security, and would be a significant step toward a system of national digital identification that can be used to collect and store our personal information and track our location.Immunity passports are purportedly intended to help combat the spread of COVID-19. But there is little evidence that they would actually accomplish that.On a practical level, there is currently no test for COVID-19 immunity; what we have are antibody tests. But we don’t know whether people with antibodies have immunity. Meanwhile, there has been a flood of flawed tests and fraudulent marketing schemes about antibody tests. …

END ARTICLE PREVIEW

READ MORE FROM SOURCE ARTICLE

Security Vulnerabilities In Android Devices Differ Drastically By Region – Security Intelligence Expert Reaction | Information Security Buzz

security vulnerabilities in android devices differ drastically by region – security intelligence expert reaction | information security buzz

BEGIN ARTICLE PREVIEW:

Android smartphone devices produced by the world’s most prominent manufacturers, including Huawei, Samsung and Xiaomi, are being openly shipped and sold with radically different levels of on-board security in different countries, according to researchers at Finland’s F-Secure.

END ARTICLE PREVIEW

READ MORE FROM SOURCE ARTICLE Continue reading “Security Vulnerabilities In Android Devices Differ Drastically By Region – Security Intelligence Expert Reaction | Information Security Buzz”

Top Affordable A.I. Cyber Security Software for Small Businesses, MSPs Launches

Information Access and Management (IAM) Platform powers IAM Network - 60,000 + engaged information professionals worldwide.

BEGIN ARTICLE PREVIEW:

Transmosis CyberOps is bringing first to market military grade, affordable cybersecurity A.I. software to small businesses and MSPs for maximum protection against cyber attacksPHOENIX, May 28, 2020 /PRNewswire/ — Transmosis, a nationally recognized leader in cyber security workforce development, today announced the launch of CyberOps, a new affordable AI cybersecurity software service for helping small businesses and MSPs protect against cyber attack.  Increasingly, cyber criminals are targeting small companies as “easy pickings” – whether to steal customer data or hold computer networks ransom.  More than half of all cyber attacks last year were against small business resulting in 60% of them being closed within six months (*Cisco).  The average cost in 2019 for small businesses to recover from a ransomware attack was $84,000 (*Forbes).More information can be found at:  https://www.transmosis.com/cyberops.Compounding the problem is that many small businesses work electronically with partners or share consumer data online, making them not just financially responsible for breaches to their own systems but also to third parties.  New laws in States like New York (Shield Act) and California (CCPA) open up increased liability and statutory damages for data breaches if increased cyber security protections are not met, even if not headquartered in …

END ARTICLE PREVIEW

READ MORE FROM SOURCE ARTICLE Continue reading “Top Affordable A.I. Cyber Security Software for Small Businesses, MSPs Launches”

Expert Comments On Brand-impersonation Spear Phishing Attacks | Information Security Buzz

expert comments on brand-impersonation spear phishing attacks | information security buzz

BEGIN ARTICLE PREVIEW:

Remote workers have been targeted by up to 65,000 Google-brand impersonation attacks, according to the most recent ‘Threat Spotlight’ report from Barracuda Networks. This type of spear phishing scam uses branded sites to trick victims into sharing login credentials.
Of the nearly 100,000 form-based attacks Barracuda detected between January 1, 2020, and April 30, 2020, Google file sharing and storage websites were used in 65 per cent of attacks. This includes storage.googleapis.com (25 per cent), docs.google.com (23 per cent), storage.cloud.google.com (13 per cent), and drive.google.com (4 per cent).

END ARTICLE PREVIEW

READ MORE FROM SOURCE ARTICLE Continue reading “Expert Comments On Brand-impersonation Spear Phishing Attacks | Information Security Buzz”

Basic Tactics to Defend Business Against Cyberattacks

basic tactics to defend business against cyberattacks

BEGIN ARTICLE PREVIEW:

Companies from all sectors of the economy should protect their business from cyber threats. Small and medium-sized businesses are often more vulnerable to cyberattacks. This is because it is easier for large companies to invest in information security, while small businesses may not afford serious protection costs. In addition, many small business executives still believe that cybercriminals are not interested in their companies, so it is not worth spending money on security. However, this is not true. Information is the most valuable asset of modern business, regardless of its size, and protecting that information should be a priority for every organization.According to the report, the number of data leaks increased by 424% last year, which was caused by hackers targeting small businesses. SMB definitely should not hope for cybercriminals to ignore them. Cybercriminals do know that small businesses are worse protected, so they are easier to attack. And attacking small businesses is not a trend of the future, it is a reality that we are already living in today.
There is also no hope that a cyber-incident will be cheaper than organizing protective measures. Moreover, money is not the only thing a company will lose in case of a successful …

END ARTICLE PREVIEW

READ MORE FROM SOURCE ARTICLE Continue reading “Basic Tactics to Defend Business Against Cyberattacks”

German intelligence services find Berserk Bear in German infrastructure. Android vulnerabilities reported. Notes on COVID-19.

german intelligence services find berserk bear in german infrastructure. android vulnerabilities reported. notes on covid-19.

BEGIN ARTICLE PREVIEW:

CyberScoop reports that German intelligence services have circulated an advisory warning that the Russian government threat group Berserk Bear is actively working against German industrial operations in the energy and water sectors. Berserk Bear was last mentioned in dispatches during 2018, when the US Government warned that Russian actors had been engaged in some preliminary reconnaissance of US infrastructure. Tageschau identifies the German intelligence services as the Federal Intelligence Service (BND), the Federal Office for the Protection of the Constitution (BfV), and the Federal Office for Information Security (BSI). The warning doesn’t directly name the Russian government, but it prominently links, as evidence, to US documents that do just that, so the intended attribution isn’t seriously in question.Two Android issues have surfaced. F-Secure warns that default configurations specific to regions also create region-specific security problems for “flagship Android devices.” It’s easy to assume that handsets with the same branding will be roughly interchangeable with respect to security, but that assumption, F-Secure says, is unwarranted: “customization done by third party vendors such as Samsung, Huawei and Xiaomi can leave these devices with significantly poor security dependent on what region a device is setup in or the SIM card inside of it.” …

END ARTICLE PREVIEW

READ MORE FROM SOURCE ARTICLE Continue reading “German intelligence services find Berserk Bear in German infrastructure. Android vulnerabilities reported. Notes on COVID-19.”

How to build hands-on cybersecurity skills on a budget – Security Boulevard

Information Access and Management (IAM) Platform powers IAM Network - 60,000 + engaged information professionals worldwide.

BEGIN ARTICLE PREVIEW:


Introduction Cybersecurity is a constantly changing field, so a passion for lifelong learning is a must for infosec professionals. Staying ahead of the bad guys means keeping up with the changing…
Go on to the site to read the full article

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Christine McKenzie. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/xW2rANp3Bdk/

END ARTICLE PREVIEW

READ MORE FROM SOURCE ARTICLE Continue reading “How to build hands-on cybersecurity skills on a budget – Security Boulevard”

BNK BUSAN BANK selects SecuLetter’s security solution to block APT attacks

bnk busan bank selects seculetter’s security solution to block apt attacks

BEGIN ARTICLE PREVIEW:

SecuLetter is a Korean information security company and a member company of the Born2Global Centre that develops and supplies security products capable of detecting, diagnosing, analyzing, and blocking malware attacks that existing signature-based solutions and behavior-based (sandbox-based) APT security solutions find difficult to detect. SecuLetter has been an active member of the Born2Global Centre since 2016.

SecuLetter’s products are equipped with various diagnostic technologies that are used for static, dynamic, and detailed analyses based on its own proprietary technology and are characterized by their accurate and rapid diagnosis.
BNK Busan Bank has been reviewing solutions that detect and block APT attacks using non-PE (portable executable) files, such as Microsoft Office, PDF, and HWP files, which existing APT solutions cannot detect.After thoroughly comparing various solutions and proof of concepts (PoCs), the bank finally selected SLF (SecuLetter FileServer) and could eliminate its security blind spots. With this solution, the bank was able to enhance its security at network bridging environment and satisfied with SLF’s built-in content disarm and reconstruction (CDR) feature, high diagnostic rate, rapid diagnosis speed, and easy integration with various security products.. With this solution, the bank was able to enhance its air-gap security and was especially satisfied …

END ARTICLE PREVIEW

READ MORE FROM SOURCE ARTICLE Continue reading “BNK BUSAN BANK selects SecuLetter’s security solution to block APT attacks”

Hackers Get Access To Apple’s Upcoming iOS 14 Nearly Eight Months Ahead Of Its Expected Release | Information Security Buzz

hackers get access to apple’s upcoming ios 14 nearly eight months ahead of its expected release | information security buzz

BEGIN ARTICLE PREVIEW:

As reported by the Daily Mail, a full leaked version of the upcoming operating system for iPhone and iPad appears to trace back to China, where an anonymous individual purchased a developer’s version of the iPhone 11 with a test version of iOS 14 installed on it.
The pre-release software quickly spread through hacker networks, and has driven a torrent of rumours and leaks about new features throughout the spring. According to a report in Vice, the version obtained by the hacker is dated to December 2019, and was intended to be used only by app developers working on software for iPhone or iPad.

END ARTICLE PREVIEW

READ MORE FROM SOURCE ARTICLE Continue reading “Hackers Get Access To Apple’s Upcoming iOS 14 Nearly Eight Months Ahead Of Its Expected Release | Information Security Buzz”