June 23, 2020
Hundreds of popular websites now offer some form of multi-factor authentication (MFA), which can help users safeguard access to accounts when their password is breached or stolen. But people who don’t take advantage of these added safeguards may find it far more difficult to regain access when their account gets hacked, because increasingly thieves will enable multi-factor options and tie the account to a device they control. Here’s the story of one such incident. Read more >>>
Your router plays multiple roles in keeping your home or office network together. Not only does it connect all of your devices to the web, but it also acts as a gateway for the data that comes and goes from the rest of the internet. As a result, it’s the perfect target for malicious hackers that want to take down all of your devices. This is the reason why we strongly recommend doing as much as you can to secure your router. Read more >>>
Researchers have discovered a sophisticated new phishing campaign that uses recognized brand names to bypass security filters as well as to trick victims into giving up Microsoft Office 365 credentials to gain access to corporate networks. A new report from Check Point Software first observed the attacks—the majority of which targeted European companies, with others seen in Asia and the Middle East–in April, when they discovered emails sent to victims titled “Office 365 Voice Mail.” Read more >>>
June 18, 2020
“We must care as much about securing our systems as we care about running them if we are to make the necessary revolutionary change.” -CIA’s Wikileaks Task Force. So ends a key section of a report the U.S. Central Intelligence Agency produced in the wake of a mammoth data breach in 2016 that led to Wikileaks publishing thousands of classified documents stolen from the agency’s offensive cyber operations division. Read more >>>
Zoom says it will begin allowing users of its videoconferencing software to enable end-to-end encryption of calls starting with a beta next month, the company announced on Wednesday. The feature won’t be restricted to paid enterprise users, either. It’s coming to both free and paid users, Zoom says, and it will be a toggle switch any call admin can turn on or disable, in the event they want to allow traditional phone lines or older conference room phones to join. Read more >>>
Security vulnerabilities in modern communication protocol GTP used by mobile network operators can be exploited by attackers to target 4G/5G users. Researchers at cybersecurity firm Positive Technologies Security have discovered several vulnerabilities in communication protocol GPRS Tunnelling Protocol (GTP), that is used by mobile network operators (MNOs). Threat actors could exploit these flaws to conduct several malicious activities against 4G/5G users. Read more >>>