menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Dev

2w

read

138

img
dot

Image Credit: Dev

TIL: One Missing 'Encrypted' Prefix = $2.3M Android Security Breach

  • A food delivery app's simple SharedPreferences implementation led to a massive data breach.
  • The app failed to encrypt sensitive data in SharedPreferences, resulting in a security vulnerability.
  • A simple fix involving the implementation of encrypted SharedPreferences could have prevented the breach.
  • The breach led to the compromise of 200k users and $2.3M in losses.

Read Full Article

like

8 Likes

source image

Tech Radar

2w

read

299

img
dot

Image Credit: Tech Radar

Should you ditch unencrypted messaging apps? Here's what the experts say about the FBI's warning

  • The FBI has advised Americans to use encrypted messaging apps to keep their mobile communications secure. This comes in response to the Salt Typhoon, a group linked to China, using a new backdoor malware to hack network operators including AT&T and Verizon, spying on the activity of their customers. WhatsApp, Signal and Facebook Messenger all offer end-to-end encryption, adding an important layer of security to digital conversations. However, end-to-end encryption is not the total solution as the key to the encrypted messages is held on the device, which can be accessible by anyone.
  • Cyberattacks have become rampant with hackers exploiting backdoors that are meant to allow law enforcement agencies to obtain communication data from suspected criminals. Privacy experts have long advocated for wider use of encrypted communication systems especially with heavily targeted industries such as government agencies and political figures. Regular SMS messages aren't encrypted while encrypted messages are secure, only as far as the device receiving them is protected.
  • According to the FBI, once hackers have compromised networks, they were able to deploy further malware and gather information, including the contents of phone calls and text messages. Encrypted messages cannot be read or intercepted, making it impossible for even adversaries to gain access to important information. However, cybersecurity experts have long warned that any backdoor access, even if put in place with good intentions, is at risk of being used for nefarious purposes.
  • Greg Nojeim, Senior Counsel and Director of the Security and Surveillance Project at the Center for Democracy & Technology, has commented that if anti-encryption advocates had their way, the United States would be defenseless to this type of mass snooping from a foreign power. While end-to-end encryption is important, it isn’t the complete solution that the FBI seems to suggest.
  • It is recommended to use end-to-end encrypted messaging services like Signal, FaceTime or Messages. End-to-end encryption ensures that your data is scrambled into a form that's unreadable if accessed by a third-party and the contents can only be unscrambled with the key - only known to the sender and receiver. SMS and RCS are unencrypted messaging protocols, which can be easily read if intercepted by cybercriminals. To ensure privacy, you can use the best password generators to help you choose a strong password.
  • It's also important to secure personal devices, including keeping them updated with the latest software versions and ensuring the use of a strong password. For added security, users can consider using two-factor authentication to strengthen critical internet accounts.

Read Full Article

like

17 Likes

source image

Pymnts

2w

read

359

img
dot

Image Credit: Pymnts

Featurespace Receives US Patent for AI-Powered Fraud Detection Technology

  • UK-based technology company Featurespace has been granted a US patent for its adaptive behavioral analytics technology.
  • The AI-powered technology uses transactional data to learn the behavior of genuine customers, enabling it to detect and prevent fraud in real-time without requiring sensitive information.
  • Featurespace's ARIC Risk Hub, which delivers adaptive behavioral analytics, has been successfully used to monitor individual behaviors and catch fraud attacks for years.
  • The patent grant recognizes Featurespace's innovation and its mission to make the world a safer place to transact.

Read Full Article

like

21 Likes

source image

Securitysales

2w

read

108

img
dot

Image Credit: Securitysales

Security Industry Association Announces the 2025 Security Megatrends

  • The Security Industry Association (SIA) has announced the 2025 Security Megatrends.
  • The trends selected for the report were based on fall 2024 survey data and focus group input from industry leaders.
  • The most impactful trend identified is the evolution of the channel, driven by factors like AI, cloud technology, and changing end-user requirements.
  • Other trends identified include IT-OT security convergence, growth of advanced detection technologies, and the shift from hardware to software influence.

Read Full Article

like

6 Likes

source image

Medium

2w

read

4

img
dot

Image Credit: Medium

Protect Your Privacy: The Best VPNs for 2025

  • NordVPN offers robust security features and access to geo-restricted content, making it one of the best VPNs in the market.
  • Its advanced encryption protocols, such as OpenVPN and IKEv2/IPSec, ensure online activities remain private and secure.
  • NordVPN also offers specialized servers for streaming, gaming, and torrenting, optimizing users' online experience.
  • PureVPN stands out in the VPN industry for its advanced technology and dedication to protecting online identities.
  • Military-grade encryption and a vast network of servers across 140 countries allow for seamless streaming and browsing experiences.
  • ProtonVPN provides advanced security protocols, including AES-256 encryption, to ensure a secure and trustful online experience.
  • ProtonVPN's no-logs policy means that user activities remain private and confidential.
  • Windscribe VPN offers robust security features, flexibility in pricing structure, and a generous free version with 10GB of data per month.
  • Its use of AES-256 encryption ensures data is secure, while the TrustedServer technology eliminates the risk of data breaches.
  • ExpressVPN is known for its advanced security protocols, fast connection speeds, and exceptional user interface.

Read Full Article

like

Like

source image

Tech Radar

2w

read

39

img
dot

Image Credit: Tech Radar

Security flaw in top WordPress plugin could allow for Stripe refunds on millions of sites

  • Security researchers discovered a vulnerability in the WPForms WordPress plugin that could allow for Stripe refunds on millions of sites.
  • The bug allows users with low-level accounts to issue arbitrary Stripe refunds and cancel subscriptions.
  • The developers have released a patch and users are advised to update to the latest version or disable the plugin.
  • WPForms is installed on over six million websites, with many still running the vulnerable versions.

Read Full Article

like

2 Likes

source image

Tech Radar

2w

read

268

img
dot

Image Credit: Tech Radar

Microsoft says Russia is hacking Ukrainian military tech by stealing points of entry from third-parties

  • Microsoft warns Russian state-sponsored threat actor is cracking into Ukrainian military tech
  • The Anadey bot malware is dropped onto devices to gather information
  • Secret Blizzard could use hacked devices to escalate compromise to the Ministry level
  • Microsoft recommends mitigation strategies to protect against this attack vector

Read Full Article

like

16 Likes

source image

Siliconangle

2w

read

95

img
dot

Image Credit: Siliconangle

Cloud complexity reshapes identity security strategies for enterprises

  • Identity security is reshaping enterprise strategies by shifting from traditional perimeters to identity-based frameworks.
  • Permissions and entitlements play a critical role in securing access to data in cloud and SaaS environments.
  • Veza Inc. is addressing access management challenges by providing solutions to improve visibility and secure data effectively.
  • Veza's solution integrates data across SaaS platforms, cloud environments, and legacy systems to simplify identity management.

Read Full Article

like

5 Likes

source image

Medium

2w

read

182

img
dot

AI Meets Cybersecurity: How Machine Learning is Detecting Threats in Real-Time

  • As the digital landscape continues to expand, so does the sophistication of cyber threats. Traditional security measures are struggling to keep pace with the growing volume and complexity of attacks. AI and ML address these challenges by providing scalable, efficient, and adaptive solutions that go beyond rule-based systems.
  • Machine Learning’s ability to analyze massive datasets, identify patterns, and make predictions has positioned it as a game-changer in cybersecurity.
  • Modern cyberattacks are not just more frequent; they are also more sophisticated, often bypassing traditional security systems.
  • Machine Learning's ability to detect anomalies, minimize the impact of false alerts and detect evolving threats, make it ideal for predictive security.
  • AI solutions demand significant computational power and expertise, which can be resource-intensive for smaller organizations.
  • AI and Machine Learning are redefining how we approach cybersecurity. By enabling real-time threat detection, predictive analytics, and automated responses, these technologies provide a robust defense against the ever-evolving threat landscape.
  • Future advancements may include Federated Learning, Explainable AI (XAI), proactive threat mitigation, hybrid threat models.
  • The integration of AI into cybersecurity is still evolving, but its trajectory is promising.
  • The key to maximizing the potential of AI and ensuring a harmonious balance between machine intelligence and human expertise.
  • The future of cybersecurity is undoubtedly AI-driven, and organizations that embrace these innovations will be better equipped to safeguard their digital assets in an increasingly hostile cyberspace.

Read Full Article

like

10 Likes

source image

TechCrunch

2w

read

195

img
dot

Image Credit: TechCrunch

Krispy Kreme discloses cyberattack that is disrupting online orders

  • Krispy Kreme disclosed a cyberattack, causing operational disruptions, including online ordering in parts of the US.
  • The company has taken steps to investigate, contain, and remediate the incident with the help of cybersecurity experts.
  • Shops worldwide remain open, with no interruption to deliveries, but disruptions are present in the US.
  • The full scope, nature, and impact of the incident are still under investigation.

Read Full Article

like

11 Likes

source image

Dev

2w

read

346

img
dot

Image Credit: Dev

What is AWS Step Functions? - A Complete Guide

  • AWS Step Functions simplifies workflow management by connecting AWS Lambda and other AWS services to automates complex processes for seamless execution
  • Common use cases for AWS Step Functions include e-commerce workflows like order validation and payment processing, data processing, error handling, and automation
  • To design a workflow using AWS Step Functions, define your workflow using Amazon States Language (ASL), add state types like Task, Choice, or Parallel states for specific actions, handle errors using Catch and Retry blocks, and integrate with AWS services like Lambda, DynamoDB, and S3
  • Benefits of AWS Step Functions include simplified workflows, built-in error handling, parallel execution, and cost efficiency
  • AWS Step Functions is a serverless orchestration service that connects different AWS services to work together seamlessly
  • Step Functions visualizes workflows using States Language (ASL) and defines each step as a state
  • There are three state types: Task, Choice, and Parallel which can be used for specific actions
  • Best practices include proper error handling, efficient state management, and thorough monitoring using services like AWS CloudWatch and X-Ray
  • Advanced features of AWS Step Functions include Dynamic Parallelism, Integration Patterns, and Performance Optimization
  • To save on cost, optimize state transitions, use Lambda Provisioned Concurrency and service integrations, and design workflows efficiently

Read Full Article

like

20 Likes

source image

Dev

2w

read

421

img
dot

Image Credit: Dev

Data Encryption and Decryption in Laravel

  • This guide explains how to implement encryption and decryption for sensitive data in Laravel models.
  • In the model, we will use Laravel's encrypt() and decrypt() functions to handle encryption and decryption automatically for specified fields.
  • The controller can handle encrypted fields directly without additional encryption code.
  • Secure your APP_KEY and use exception handling in getters for decryption errors.

Read Full Article

like

25 Likes

source image

123-Reg

2w

read

351

img
dot

Image Credit: 123-Reg

No More Spam, Please! How Can I Stop Getting Spam Emails?

  • Spam emails can be a nuisance and can lead to more serious problems, such as phishing attacks.
  • Anti-spam filter is the primary tool to tackle unwanted emails.
  • 123 Reg Professional Email comes with built-in spam filters to keep inbox clear of unwanted emails.
  • Microsoft 365 Email offers essential tools like Safe Sender Lists, phishing protection and Advanced Threat Protection.
  • Consider setting a "disposable" email address for newletters, forums and online shopping.
  • Avoid suspicious "Unsubscribe" buttons and never click on suspicious links to avoid more unwanted messages.
  • Be selective in providing email address and use trusted and secure sites only.
  • Anti-spam tools are available to effectively block spam and phishing emails, consider installing browser extensions.
  • Obfuscating email address might help cut down spam, but a contact form is a better option for keeping things simple and clean.
  • Stay informed to keep up with evolving spam tactics and report any suspicious activities.

Read Full Article

like

21 Likes

source image

Lastwatchdog

2w

read

398

img
dot

News alert: DMD Diamond invites developers to participate in open beta for its v4 blockchain

  • DMD Diamond has announced the start of Open Beta for the DMD Diamond v4 blockchain.
  • The v4 blockchain introduces advanced features to enhance efficiency and usability.
  • Developers and blockchain enthusiasts are invited to test the platform's functionality.
  • Key highlights include the Honey Badger Byzantine Fault Tolerance consensus mechanism and compatibility with the Ethereum Virtual Machine.

Read Full Article

like

23 Likes

source image

Cybersecurity-Insiders

2w

read

21

img
dot

Image Credit: Cybersecurity-Insiders

Rising Cyber Extortion Threats Targeting Large Companies in 2024

  • Hacking groups are increasingly targeting large organizations for significant payouts, exploiting vulnerabilities in the supply chain.
  • A growing number of businesses are opting to pay the ransom, with some paying record amounts.
  • Factors contributing to this shift include increased law enforcement efforts, advanced backup systems, and free decryption tools.
  • Ransomware attacks are expected to increase by 50%, with finance, healthcare, technology, and logistics sectors at higher risk.

Read Full Article

like

1 Like

For uninterrupted reading, download the app