A quick update on 2019 mobile predictions made in January.

So far this year, the surreptitious capture of audio and visual data via smartphone cameras and microphones has negatively impacted the world’s richest person and a beloved trillion-dollar company. It’s safe to say that awareness of th… Continue reading A quick update on 2019 mobile predictions made in January.

Behavior Analysis: Getting an Inside Track on Insider Threats

Understanding human behavior can help organizations better identify and root out malicious insiders Whether it’s a former student coming onto a college campus and destroying the school computers with a malicious USB or some other presumably trusted in… Continue reading Behavior Analysis: Getting an Inside Track on Insider Threats

IBM interns find 19 vulnerabilities in corporate check-in systems

A pair of precocious interns at IBM’s red-teaming unit has found 19 previously undisclosed vulnerabilities in the automated systems that companies use to check visitors into their facilities. A hacker exploiting the security flaws could access visitor logs, contact information, and other company data, and use that access to go after corporate networks, the IBM X-Force Red researchers said. The study of five popular visitor-management systems is a warning of the risk of automating common societal tasks without security precautions. These systems are supplanting security guards as an efficient way of enabling access to a building, and apparent negligence in their architecture leaves them vulnerable. The interns, Hanna Robbins and Scott Brink, are students at the University of Tulsa and the Rochester Institute of Technology, respectively, according to their LinkedIn profiles. Robbins and Brink found default administrative login credentials that would give attackers complete control of a visitor-management application. They […]

The post IBM interns find 19 vulnerabilities in corporate check-in systems appeared first on CyberScoop.

Continue reading IBM interns find 19 vulnerabilities in corporate check-in systems

The Deep Disingenuousness of the Leviathan of Redmond

via Nathaniel Mott, writing at Tom’s Hardware comes the truth regarding Microsoft Corporation’s (Nasdaq: MSFT) call to ‘regulate’ Facial Recognition systems.
The post The Deep Disingenuousness of the Leviathan of Redmond appeared first on Security Bo… Continue reading The Deep Disingenuousness of the Leviathan of Redmond

The Tracking of America: Why Are You Letting It Happen?

Why are both Apple Inc. (NASDAQ: AAPL) and Google Inc. (NASDAQ: GOOG) still permitting clearly ill-conceived user tracking via applications marketed and sold on each company’s customer-facing app stores? Surely your privacy and freedom means more to y… Continue reading The Tracking of America: Why Are You Letting It Happen?

US indicts alleged Chinese spies for hacking aerospace companies

The DOJ described five years of stealing turbofan engine designs that relied on insiders, state-sponsored hackers, phishing and malware. Continue reading US indicts alleged Chinese spies for hacking aerospace companies

Security: The Rules of Engagement to Mitigate Insider Risk

It’s well-recognized that staff negligence ranks top of most companies’ insider threats to security. But in our experience, many are failing to mitigate the commercial, reputational and regulatory risks posed by staff inadvertently exposing sensitive … Continue reading Security: The Rules of Engagement to Mitigate Insider Risk