All posts in Cybersecurity

by Harriet Stone Harriet StoneHello, Naked Security readers. I’m Harriet Stone, an intern in the Sophos marketing team. Seven months of working (virtually) with cybersecurity professionals has made me realise just how unaware many students are when it comes to their online security. Even before the COVID-19 pandemic drove a . . . Read more

Anne Neuberger will join the National Security Council, according to sources. President-elect Joe Biden has reportedly tapped the National Security Agency’s cybersecurity director to serve in a brand-new cyber-role on his National Security Council. Anne Neuberger, a more than 10-year veteran of the NSA and its cyber-chief since 2019, will . . . Read more

A fired Stradis Healthcare employee sought revenge by tampering with shipping data for desperately needed healthcare PPE. The FBI has announced that Christopher Dobbins pleaded guilty and was sentenced to a year in prison for breaching and temporarily disabling the Stradis Healthcare shipping system using a secret account, after being . . . Read more
07 Jan, 2021
Breach, Cloud Security, Cyber Insurance, Cybersecurity, Healthcare, Malware, poll, Ransomware, Security News, Vulnerabilities
0
Provide your views on ransomware and how to deal with it in our anonymous Threatpost poll.
06 Jan, 2021
apt, China, Cloud Security, cyber attack, Cybersecurity, Cybersecurity an Infrastructure Security Agency (CISA), Department of Homeland Security, espionage, FBI, federal agencies, Government, Hacks, Malware, National Security Agency, orion, President Trump, russia, Security News, solarwinds, state sponsored attack, supply chain, threat actors, Vulnerabilities, Web Security
0

The widespread compromise affecting key government agencies is ongoing, according to the U.S. government. The U.S. government has identified Russia as the “likely” culprit behind the widespread SolarWinds cyberattack that has so far affected multiple federal agencies and private-sector companies. Cyberespionage is cited as the motivation behind the attack, which . . . Read more
30 Dec, 2020
amongus, Android, Breach, chrome, Cloud Security, cobalt strike, Critical Infrastructure, Cryptography, cyberpunk 2077, Cybersecurity, Editor's Picks, emotet, Gaming, Hacks, IoT, joker malware, Lucifer malware, malicious extension, Malware, Microsoft, Microsoft 365, microsoft credentials, microsoft teams, mobile malware, Mobile Security, most read, Most Recent ThreatLists, nvidia security bugs, Office 365, Phishing, Privacy, ps5, Ransomware, retrospective, scalperbots, Security News, Spear Phishing, top headlines, top stories 2020, Vulnerabilities, Web Security, Xbox Series X
0

A look back at what was hot with readers — offering a snapshot of the security stories that were most top-of-mind for security professionals and consumers throughout the year. As 2020 draws to a close, it’s clear that work-from-home security, ransomware, COVID-19-themed social engineering and attacks by nation-states will go . . . Read more
30 Dec, 2020
Amazon Prime Day, bug bounty program, Bugcrowd, Casey Ellis, Cloud Security, COVID-19, Cybersecurity, ethical hackers, Hacks, holiday shopping, InfoSec Insider, Mobile Security, neighborhood watch, online retailers, retail cybersecurity, Security News, Vulnerabilities, Vulnerability Disclosure, Web Security
0
Bugcrowd CTO Casey Ellis covers new cybersecurity challenges for online retailers.
29 Dec, 2020
asset targeting, choosing a target, Cloud Security, Cybersecurity, david wolpoff, defenses, exploits, hacker logic, Hackers, InfoSec Insider, randori, Security News, Vulnerabilities, Web Security
0

David “moose” Wolpoff at Randori explains how hackers pick their targets, and how understanding “hacker logic” can help prioritize defenses. In the past decade or so, we’ve seen a massive shift toward the cloud. The COVID-19 pandemic and associated pivot to remote work has only accelerated this cloud trend, forcing . . . Read more
29 Dec, 2020
cloud, Cloud Security, collaboration, Cybersecurity, Hacks, lessons learned, mobile, Mobile Security, Phishing, remote working, Security News, takeaways, Vulnerabilities, Web Security, work from home, zero-trust framework
0

Threatpost explores 5 big takeaways from 2020 — and what they mean for 2021. Goodbye, 2020 — and good riddance, right? Most of us don’t want to take too much from this year into the next — but let’s make an exception for what we learned about security in the . . . Read more
23 Dec, 2020
Amazon Alexa, amazon echo, Connected devices, Cybersecurity, data theft, digital home assistant, digital smart home, eavesdrop, IoT, Researchers, secret recording, Security News, security research, sensitive information, smartphone, university of cambridge
0
Research shows that microphones on digital assistants are sensitive enough to record what someone is typing on a smartphone to steal PINs and other sensitive info. The potential for digital-home assistants like Amazon Alexa to infringe on user privacy by making and saving voice recordings of them is already widely . . . Read more