"National Public Data Says Breach Impacts 1.3 Million People"

"National Public Data Says Breach Impacts 1.3 Million People"

National Public Data (NPD) has recently confirmed that it is suffering a data breach following reports of 2.9 billion personal information records being compromised, but the company has recently announced that the incident only affects 1.3 million people in the US.  The information that was suspected of being breached included names, email addresses, phone numbers, social security numbers, and mailing addresses.

Submitted by Adam Ekwall on

"Numerous Manufacturers Use Insecure Android Kernels"

"Numerous Manufacturers Use Insecure Android Kernels"

Researchers at Graz University of Technology (TU Graz) analyzed smartphones from ten manufacturers, finding that the Android kernels used are vulnerable to "one-day exploits" despite the implementation of protection mechanisms. Only 29 to 55 percent of the 994 smartphones tested by the research team could prevent attacks, depending on manufacturer and model. In contrast, the Generic Kernel Image (GKI) version 6.1 provided by Google could prevent about 85 percent of attacks. In comparison to the GKI, manufacturer kernels were up to 4.6 times worse at defending against attacks.

Submitted by Gregory Rigby on

"FBI and CISA Release Joint PSA, Just So You Know: Ransomware Disruptions During Voting Periods Will Not Impact the Security and Resilience of Vote Casting or Counting"

"FBI and CISA Release Joint PSA, Just So You Know: Ransomware Disruptions During Voting Periods Will Not Impact the Security and Resilience of Vote Casting or Counting"

The US Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) have jointly released a Public Service Announcement (PSA) titled "Just So You Know: Ransomware Disruptions During Voting Periods Will Not Impact the Security and Resilience of Vote Casting or Counting." It is the latest in their PSA series aimed at putting potential cyber-related election day disruptions during the 2024 election cycle into context for the American people.

Submitted by Gregory Rigby on

"3 Questions: How to Prove Humanity Online"

"3 Questions: How to Prove Humanity Online"

As Artificial Intelligence (AI) agents advance, it may become harder to distinguish AI-powered users from real humans online. In a new white paper, researchers from MIT, OpenAI, Microsoft, and other technology and academic institutions propose using "personhood credentials" to enable someone to prove they are an actual human online while protecting their privacy. MIT News interviewed co-authors of the paper, Nouran Soliman and Tobin South, about why personhood credentials are important, the risks posed by such credentials, and how to safely implement them.

Submitted by Gregory Rigby on

"New Study Reveals Loophole in Digital Wallet Security—Even if Rightful Cardholder Doesn't Use a Digital Wallet"

"New Study Reveals Loophole in Digital Wallet Security—Even if Rightful Cardholder Doesn't Use a Digital Wallet"

Over 5.3 billion people are expected to use digital wallets such as Apple Pay, Google Pay, and PayPal by the year 2026. Although these wallets are supposed to provide greater security than traditional payment methods, the reliance on outdated authentication methods and a preference for convenience over security make digital wallets vulnerable, according to new research led by computer engineers at the University of Massachusetts Amherst. This article continues to discuss the study "In Wallet We Trust: Bypassing the Digital Wallets Payment Security for Free Shopping."

Submitted by Gregory Rigby on

Interface Spokane

"IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Interface Albuquerque 2024

"IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

The Techno Security & Digital Forensics East Coast Conference

"The Techno Security & Digital Forensics Conference brand has grown into one of the most important resources for corporate network security professionals, federal, state and local law enforcement digital forensic specialists, and cybersecurity industry leaders from around the world. The purpose is to raise international awareness of developments, teaching, training, responsibilities, and ethics in the field of cybersecurity, digital forensics, and eDiscovery."

Techno Security & Digital Forensics West Coast Conference

"The Techno Security & Digital Forensics Conference brand has grown into one of the most important resources for corporate network security professionals, federal, state and local law enforcement digital forensic specialists, and cybersecurity industry leaders from around the world. The purpose is to raise international awareness of developments, teaching, training, responsibilities, and ethics in the field of cybersecurity, digital forensics, and eDiscovery."

"SolarWinds Web Help Desk Vulnerability Possibly Exploited as Zero-Day"

"SolarWinds Web Help Desk Vulnerability Possibly Exploited as Zero-Day"

The US cybersecurity agency CISA recently warned that a fresh critical-severity vulnerability in SolarWinds Web Help Desk has been exploited in attacks.  The bug is tracked as CVE-2024-28986 (CVSS score of 9.8) and is described as a Java deserialization remote code execution (RCE) issue that could allow attackers to run commands on the host machine.  This week, SolarWinds announced a hotfix addressing the vulnerability and noted that authentication is required for successful exploitation without mentioning its in-the-wild exploitation.

Submitted by Adam Ekwall on
Subscribe to