Author Archives: Tomáš Foltýn

WeLiveSecurity: Study: White House email domains at risk of being misused for phishing scams

Most of the White House's email domains have yet to deploy an email authentication protocol known as DMARC that is designed to reduce the risk of attackers impersonating legitimate email addresses for distributing spam or phishing messages.

The post Study: White House email domains at risk of being misused for phishing scams appeared first on WeLiveSecurity



WeLiveSecurity

Study: White House email domains at risk of being misused for phishing scams

Most of the White House's email domains have yet to deploy an email authentication protocol known as DMARC that is designed to reduce the risk of attackers impersonating legitimate email addresses for distributing spam or phishing messages.

The post Study: White House email domains at risk of being misused for phishing scams appeared first on WeLiveSecurity

Saks and Lord & Taylor stores suffer data breach exposing five million cards

Cybercriminals are believed to have stolen information for more than five million credit and debit cards that shoppers had used at dozens of Saks Fifth Avenue, Saks Off 5th and Lord & Taylor stores mainly in the United States between May 2017 and March 2018.

The post Saks and Lord & Taylor stores suffer data breach exposing five million cards appeared first on WeLiveSecurity

WeLiveSecurity: Saks and Lord & Taylor stores suffer data breach exposing five million cards

Cybercriminals are believed to have stolen information for more than five million credit and debit cards that shoppers had used at dozens of Saks Fifth Avenue, Saks Off 5th and Lord & Taylor stores mainly in the United States between May 2017 and March 2018.

The post Saks and Lord & Taylor stores suffer data breach exposing five million cards appeared first on WeLiveSecurity



WeLiveSecurity

WeLiveSecurity: Google banishes cryptocurrency mining extensions from Chrome Web Store

The tech giant is taking the measure after a rise in malicious browser extensions that mine digital money by hijacking the processing power of users' computers. The clampdown follows Google’s recent move to stop serving any and all adverts promoting virtual currencies and initial coin offerings.

The post Google banishes cryptocurrency mining extensions from Chrome Web Store appeared first on WeLiveSecurity



WeLiveSecurity

Google banishes cryptocurrency mining extensions from Chrome Web Store

The tech giant is taking the measure after a rise in malicious browser extensions that mine digital money by hijacking the processing power of users' computers. The clampdown follows Google’s recent move to stop serving any and all adverts promoting virtual currencies and initial coin offerings.

The post Google banishes cryptocurrency mining extensions from Chrome Web Store appeared first on WeLiveSecurity

WeLiveSecurity: World Backup Day: Saving the day by saving data

World Backup Day, celebrated annually on March 31, is a timely reminder of the importance of taking effective measures that can make all the difference when a data loss incident strikes. It is also a good time to pause and reflect on the rising tide of threats that organizations, notably those operating in critical industries, face in cyberspace. 

The post World Backup Day: Saving the day by saving data appeared first on WeLiveSecurity



WeLiveSecurity

World Backup Day: Saving the day by saving data

World Backup Day, celebrated annually on March 31, is a timely reminder of the importance of taking effective measures that can make all the difference when a data loss incident strikes. It is also a good time to pause and reflect on the rising tide of threats that organizations, notably those operating in critical industries, face in cyberspace. 

The post World Backup Day: Saving the day by saving data appeared first on WeLiveSecurity

Employers’ best bet for appealing to security pros? Value their opinions

The report also sheds light on how not to go about attracting new hires. Vague and inaccurate job descriptions along with job postings that include insufficient qualifications were found to top the list of turnoffs for many jobseekers

The post Employers’ best bet for appealing to security pros? Value their opinions appeared first on WeLiveSecurity

One in five healthcare employees willing to sell patient data, study finds

The problem was particularly acute among provider organizations, as opposed to payer organizations (21% vs. 12%). Also, and perhaps counterintuitively, staff with more frequent cybersecurity training were more inclined to such practices.

The post One in five healthcare employees willing to sell patient data, study finds appeared first on WeLiveSecurity

Researchers unveil Veil to make ‘private browsing more private’

The blinding server randomly adds some nonsense code to every webpage. This ‘code obfuscation’, according to the academics, has no effect on what the actual page looks like, but it drastically changes the appearance of the underlying source file.

The post Researchers unveil Veil to make ‘private browsing more private’ appeared first on WeLiveSecurity

One-third of organizations sacrifice mobile security for business performance

Only one in seven organizations have put in place all four basic cybersecurity practices specified by Verizon – changing all default passwords, encrypting data transmitted over public networks, granting employee access on a need-to-know basis, and testing security systems regularly.

The post One-third of organizations sacrifice mobile security for business performance appeared first on WeLiveSecurity

Over 40% of online login attempts are attackers trying to invade accounts

Bots that traverse the internet on behalf of their human operators can fulfill both legitimate and malicious automated tasks. Statistics indicate that bot-driven internet traffic, by helper and harmful bots combined, surpasses human traffic.

The post Over 40% of online login attempts are attackers trying to invade accounts appeared first on WeLiveSecurity

Cybercrime weighs most heavily on financial service firms

A further breakdown of the overall figures shows that, in all, the actual cost hinges on a number of variables. The factors that enter heavily into the equation include attack types and their frequency, along with the organization’s size and even the country in which an organization is based.

The post Cybercrime weighs most heavily on financial service firms appeared first on WeLiveSecurity

US forms dedicated office to help avert cyberattacks on infrastructure

The vulnerability of critical infrastructure, including energy grids, to cyberattacks has been a growing concern worldwide. Many nations have been scrambling to improve their defenses vis-à-vis threats faced by services that are critical to the continuity of our daily lives.

The post US forms dedicated office to help avert cyberattacks on infrastructure appeared first on WeLiveSecurity

US and UK government websites hijacked to mine cryptocurrency on visitors’ machines

If undetected by a user’s security solution or content- or ad-blocker, the script ran in the background unbeknown to the user until the webpage was closed. A number of the affected websites, including that of the ICO, were also offline for hours in the aftermath of the attack.

The post US and UK government websites hijacked to mine cryptocurrency on visitors’ machines appeared first on WeLiveSecurity

Global cybercrime behemoth busted, 36 people indicted

According to US authorities, the enterprise aimed at becoming the premier destination for the buying and selling of stolen payment card data and forged identification documents. It is believed that the losses that the Infraud Organization had intended to cause were north of $2.2 billion.

The post Global cybercrime behemoth busted, 36 people indicted appeared first on WeLiveSecurity