Voting machine manual tells officials to reuse weak passwords
The manual turns good advice on its head, telling officials to use, reuse and recycle weak passwords. more…Google Sheets power tips: How to use pivot tables
One of the best ways to master Google Sheets — the powerful spreadsheet app that you use in a web browser — is to learn how to build and use pivot tables. To describe it very generally, a pivot table takes data from a group of cells in your spreadsheet and presents it in more […] more…JNUC 2020 opens with big news for Apple and Azure
Apple in the enterprise focused company, Jamf, kicked off its virtual JNUC conference today with a deluge of news and information for Mac, iPhone and iPad using enterprises. Apple and Microsoft together for work The show comes at a pivotal moment in the transformation of enterprise IT. Not only is work becoming virtual, but Apple’s […] more…SASE helps healthcare company pivot to support remote workers
Security and performance concerns made it challenging for TrialCard to enable its employees to work from home when the COVID-19 pandemic hit. Customer service agents use a voice-over-IP phone and thin-client computer, both of which were designed to work in an on-premises office environment. “They need those systems to do their day-to-day job,” says Ryan […] more…Please Vote: Fourth Annual SANS IR Survey Wants You!
Share your perspective and help benchmark the industry. [And SANS will enter you to win a $400 Amazon gift card!] This is the 4th year that Intel Security/McAfee has co-sponsored the SANS Incident Response survey. We would appreciate your help capturing this year’s insights by completing this survey: https://www.surveymonkey.com/r/2017SANSIRSurvey Past survey findings have helped us […] more…From zero to Zanubis
A few weeks ago we stumbled upon a suspicious Android sample from a tweet from @malwrhunterteam which was only detected by four antivirus engines: Antivirus verdicts didn’t provide specifics about the malware family other than it might be either a banking trojan or spyware, so a first approach to continue the investigation is finding other […] more…Google’s Chrome OS pivot matters more than you think
Don’t look now, but Chrome OS is about to undergo the biggest and most transformative change in the platform’s history. It’s something we’ve actually been hearing about since April but that’s just starting to take shape publicly for the first time this week. And while its practical, surface-level significance is without a doubt massive, the […] more…Uncovering threat infrastructure via URL, domain and IP address advanced pivots a.k.a. Netloc Intelligence
Quick links:https://support.virustotal.com/hc/en-us/articles/360001387057https://developers.virustotal.com/v3.0/reference#intelligence-searchhttps://github.com/VirusTotal/vt-py Ten years ago, VirusTotal launched VT Intelligence; a critical component of VT Enterprise which offers users the capability to search over VirusTotal’s dataset using advanced search modifiers. VT Intelligence allows security professionals to pinpoint malware based on its structural, behavioural, binary, metadata, etc. properties to uncover entire threat campaigns. For example, the following […] more…Growing enterprise revenue boosts Zoom’s first-quarter growth
Despite falling revenue from online sign-ups, videoconferencing company Zoom remains positive about its future outlook, posting a 5% year-on-year increase in total revenue for the three months to April 30. The company saw unprecedented levels of growth during the COVID-19 pandemic but since the end of global lockdown orders has sought to pivot to connect […] more…Cyber Leader Calls for Nonpartisan Path to Securing the Vote
Those entrusted with securing the nation’s voting systems must remain nonpartisan as a myriad of complex and growing risks continue to threaten U.S. elections, one of the nation’s top cybersecurity officials said Saturday. read more more…2020 Voters: What You Need to Know About Election Security
Voters across the country are preparing to cast their ballot for the all-important 2020 U.S. presidential elections. Whether you’re a new voter eager for your voice to be heard or a parent looking to guide your family members on exercising their right to vote, consumers can be certain about one thing: election security should be […] more…MIT researchers say mobile voting app piloted in U.S. is rife with vulnerabilities
Elections officials in numerous states have piloted various mobile voting applications as a method of expanding access to the polls, but MIT researchers say one of the more popular apps has security vulnerabilities that could open it up to tampering by bad actors. The MIT analysis of the application, called Voatz, highlighted a number of […] more…EU closes in on AI Act with last-minute ChatGPT-related adjustments
The European Parliament is set to formalize its position on what could be the world’s first set of regulations for AI by a major legislative body, as EU lawmakers reached a provisional political agreement on Thursday. Members of the European Parliament (MEPs) have been debating the content of the EU’s AI Act and have agreed […] more…APT annual review: What the world’s threat actors got up to in 2020
We track the ongoing activities of more than 900 advanced threat actors; you can find our quarterly overviews here, here and here. Here we try to focus on what we consider to be the most interesting trends and developments of the last 12 months. This is based on our visibility in the threat landscape; and […] more…Healthcare company pivots quickly to support remote workers
Security and performance concerns made it challenging for TrialCard to enable its employees to work from home when the COVID-19 pandemic hit. Customer service agents use a voice-over-IP phone and thin-client computer, both of which were designed to work in an on-premises office environment. “They need those systems to do their day-to-day job,” says Ryan […] more…Election Website Security: Protect Your Vote in 2020
The 2020 U.S. presidential primaries are right around the corner. As people gear up to cast their ballots for party candidates, they may not realize that website security shortcomings could leave the U.S. elections susceptible to digital disinformation campaigns or possibly worse seeking to influence and /or manipulate the democratic process. McAfee recently conducted a […] more…More information
- Google Sheets vs. Microsoft Excel: Which works better for business?
- The Linux desktop is already the new normal
- Malware from Yahoo ads did not affect US and Mac and mobile users
- Introducing App Reputation For Android Apps
- Facebook steps up security by allowing physical keys for log-in
- Is There a Future of Security Without People?
- Busts, Bounties and Backdoors – 60 Sec Security [VIDEO]
- Adobe Flash Player Exploit Served Via ‘iPhone 5 Battery Images Leak’ Emails
- Iran’s discovery of Flame malware turning into political hot potato
- McAfee research shows sharp rise in malware signed with legitimate digital certificates