The Next Battleground

via Rob Knake, writing at the Council on Foreign Relations’ online outlet: Foreign Affairs and in the Snapshot section, comes this astute examination of the co-called cyberwarfare space’s soft underbelly – power generation. Fear, Uncertainty and Doubt… Continue reading The Next Battleground

Automotive companies are warming up to vulnerability disclosure programs

The automotive industry is looking to step up its collaboration with cybersecurity researchers to identify software and hardware bugs in order to better protect vehicles which are becoming more connected and automated. “We’ve begun to actively develop relationships with the researcher community to encourage them to look at our vehicles and to let us know if they find vulnerabilities,” Harry Lightsey, an executive at General Motors, said Tuesday at the Wilson Center in Washington, D.C. A case in point is a workshop in Detroit next week that will show industry representatives how to set up an effective vulnerability disclosure program, a practice that enlists outside researchers to find bugs in an organization’s equipment. The workshop’s goal will be to “understand what a vulnerability disclosure program is, how to stand one up, what the pitfalls are,” Faye Francy told CyberScoop after the Wilson Center event. She heads the Automotive Information Sharing […]

The post Automotive companies are warming up to vulnerability disclosure programs appeared first on Cyberscoop.

Continue reading Automotive companies are warming up to vulnerability disclosure programs

Robert M. Lee and Jeff Hass’ Little Bobby Comics – ‘Different Hats’

via the Security Mindset of Robert M. Lee and Illustration talents of Jeff Hass at Little Bobby Comics
Permalink
The post Robert M. Lee and Jeff Hass’ Little Bobby Comics – ‘Different Hats’ appeared first on Security Boulevard.
Continue reading Robert M. Lee and Jeff Hass’ Little Bobby Comics – ‘Different Hats’

Q2 Appthority Pulse Report Finds Chat Apps Most Popular, Risky & Blacklisted Apps

Today Appthority released our Q2 Enterprise Mobile Security Pulse Report. The report looks at three areas of interest to enterprise mobility and security teams: 1) the most common iOS and Android apps in enterprises, 2) th… Continue reading Q2 Appthority Pulse Report Finds Chat Apps Most Popular, Risky & Blacklisted Apps

New Android malware hijacks Telegram for surveillance

A new family of malware capable of comprehensive surveillance is targeting Android devices through the encrypted messaging app Telegram, according to research from antivirus vendor ESET. The malware – which has mostly been distributed in Iran – ensnares its victims by posing as an application pledging more social media followers, bitcoin, or free Internet connections, according to ESET.  Once downloaded, the malware can carry out surveillance tasks ranging from intercepting text messages to recording audio and screen images from devices, ESET researcher Lukas Stefanko explained in a blog post. Each compromised device is controlled via a bot that the attacker commandeers via Telegram, which recently boasted 200 million monthly users. “Attackers can control victimized devices by simply tapping the buttons available in the version of the malware they are operating,” Stefanko wrote. The malware family has proliferated since at least last August, according to ESET. In March, its source code was […]

The post New Android malware hijacks Telegram for surveillance appeared first on Cyberscoop.

Continue reading New Android malware hijacks Telegram for surveillance

Appthority Discovers Thousands of Apps with Firebase Vulnerability Exposing Sensitive Data

Appthority has discovered a significant mobile data vulnerability related to Google Firebase which has resulted in the exposure of a wide range and large amounts of sensitive data through thousands of mobile apps. The exposure is not due to malicious c… Continue reading Appthority Discovers Thousands of Apps with Firebase Vulnerability Exposing Sensitive Data

The Georgian Gauntlet, Signed, Sealed and Delivered

Sean Gallagher exposes a US politician – Georgia Governor Nathan Deal, whom, evidently, has done the unthinkable! How odd, during these days of oddity cubed. Read Sean’s superlative post at Ars Technica, where, of course, you may view the Infinity Gau… Continue reading The Georgian Gauntlet, Signed, Sealed and Delivered

WHOIS Behind Cyberattacks? Under GDPR, We May Not Know

The goal of the European Union’s General Data Protection Regulation (GDPR) is, among other things, to standardize data protection laws applicable to EU data subjects. Aimed at enhancing privacy protection, the enforcement of the regulation becomes effective on May 25. GDPR’s implementation on an issue relevant to the cybersecurity industry may well have negative consequences […]

The post WHOIS Behind Cyberattacks? Under GDPR, We May Not Know appeared first on Security Intelligence.

Continue reading WHOIS Behind Cyberattacks? Under GDPR, We May Not Know

PowerHammer, The Mains Exploitation

A new research paper has attracted my attention at arXiv.org; and from Mordechai Guri, Boris Zadov, Dima Bykhovsky, Yuval Elovici, all from the astonishingly prolific Ben-Gurion University of the Negev, in southern Israel’s blooming desert – the Negev… Continue reading PowerHammer, The Mains Exploitation