How Apple’s Safari Browser Will Try to Thwart Data Tracking
New privacy features in Apple’s Safari browser seek to make it tougher for companies such as Facebook to track you. Companies have long used cookies to remember your past visits. This can be helpful for saving sign-in details and preferences. But now they’re also being used to profile you in order to fine-tune advertising to […] more…Attempt to Break Into Democratic Party Voter Data Thwarted
An attempt to break into the Democratic National Committee’s massive voter database has been thwarted, a party official said Wednesday, two years after Russian operatives sent the party into disarray by hacking into its computers and facilitating the release of tens of thousands of emails amid the presidential election. read more more…Gartner Peer Insight Award for McAfee SIEM
I’m proud to say that McAfee has received recognition from our customers with the 2018 Gartner Peer Insights Customers’ Choice for the Security Information and Event Management (SIEM). This is a recognition of high satisfaction from a number of reviews by verified end-user professionals. To ensure fair evaluation, Gartner maintains rigorous criteria for recognizing vendors […] more…Apple Steps Up Encryption to Thwart Police Cracking of iPhones
Apple said Wednesday it was strengthening encryption on its iPhones to thwart police efforts to unlock handsets without legitimate authorization. The move by Apple, the latest in an ongoing clash with law enforcement, comes amid reports of growing use of a tool known as GrayKey which can enable police to bypass iPhone security features. read […] more…Using Insights From DefPloreX-NG to Thwart Web Defacement Attacks
By Federico Maggi, Marco Balduzzi, Ryan Flores, Lion Gu, and Vincenzo Ciancaglini The ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS) is an avenue for cybersecurity research breakthroughs, techniques, and tools. At the ACM ASIACCS 2018 in Incheon, South Korea, we presented our research using DefPloreX-NG, a tool for identifying and tracking web defacement […] more…Could these grain-sized computers using blockchain networks thwart counterfeiters?
Within five years, IBM researchers hope to deploy granular microcomputers that, in conjunction with a blockchain electronic ledger, could be used to verify and track goods all over the world. IBM has created a microcomputer technology called cryptographic anchors (abbreviated: crypto-anchors) and says they could be used to authenticate anything from pharmaceuticals to luxury goods, […] more…World’s largest DDoS attack thwarted in minutes
What has been tagged the largest DDoS attack ever disclosed slammed into the servers of software development site GitHub at 17:21 UTC last Wednesday. more…Now That Most Artifacts Are Digital, Software Experts Need to Play Archeologist
Now That Most Artifacts Are Digital, Software Experts Need to Play Archeologist l33tdawg Wed, 02/21/2018 – 00:20 more…What is a supply chain attack? Why you should be wary of third-party providers
A supply chain attack, also called a value-chain or third-party attack, occurs when someone infiltrates your system through an outside partner or provider with access to your systems and data. This has dramatically changes the attack surface of the typical enterprise in the past few years, with more suppliers and service providers touching sensitive data […] more…Security firm claims to thwart iPhone X’s Face ID with a mask
Security firm claims to thwart iPhone X’s Face ID with a mask l33tdawg Sun, 11/12/2017 – 01:43 more…McAfee Honors 19 Partners with Awards for Excellence in Security
Today in Las Vegas, we recognized stand out performance by handing out our annual partner awards. This year, 19 partners were selected out of the thousands of partners who we work with, and all demonstrate the embodiment of three foundational pillars of the McAfee Partner Program: strategic relationships, profitable partnerships and customer outcomes. Partners received […] more…Stuxnet explained: How code can destroy machinery and stop (or start) a war
Stuxnet is an extremely sophisticated computer worm that exploits multiple previously unknown Windows zero-day vulnerabilities to infect computers and spread. Its purpose was not just to infect PCs but to cause real-world physical effects. Specifically, it targets centrifuges used to produce the enriched uranium that powers nuclear weapons and reactors. Stuxnet was first identified by […] more…News in brief: update bricks 500 smart locks; Hutchins pleads not guilty; drone landed on warship
Your daily round-up of some of the other stories in the news more…When good extensions go bad: buyer turns Particle into adware
The tale of what happened when the Particle extension was sold and turned by its buyer into adware is a reminder that it’s a good idea to keep an eye on what you’ve added to your browser more…Encryption thwarting investigators as federal government taps increase
Annual wiretap report lifts the lid on crime investigation, revealing that the cost is rising sharply – and partly funded by drugs busts more…SLocker Mobile Ransomware Starts Mimicking WannaCry
by Ford Qin Early last month, a new variant of mobile ransomware SLocker (detected by Trend Micro as ANDROIDOS_SLOCKER.OPST) was detected, copying the GUI of the now-infamous WannaCry. The SLocker family is one of the oldest mobile lock screen and file-encrypting ransomware and used to impersonate law enforcement agencies to convince victims to pay their […] more…More information
- Hackers could use connected cars to gridlock whole cities
- ‘Sick sadist’ admits to trolling dead people on social media
- Study warns of human rights risks from censoring online terror content
- Twitter said to be ready to reveal IPO filing this week
- Update: Some online applications for Office 365 are slow
- States sue over rules that allow release of 3D-printed gun blueprints
- NATO Condemns Cyberattacks Against COVID-19 Responders
- Security Challenges of SDN and Cloud: The Critical Role of Visibility
- Microsoft Windows Briefcase CVE-2012-1528 Integer Overflow Remote Code Execution Vulnerability
- AnandTech founder leaves site, joins Apple