A week in security (August 5 – 11)

Credit to Author: Malwarebytes Labs| Date: Mon, 12 Aug 2019 15:38:31 +0000

The latest cybersecurity news for the week of August 5–11. We touch on problematic backdoors, the grim possibility of the Internet of Thoughts, and smart home improvement. We also released a retrospective report on ransomware.

Categories:

Tags:

(Read more…)

The post A week in security (August 5 – 11) appeared first on Malwarebytes Labs.

Read more

Facial recognition technology: force for good or privacy threat?

Credit to Author: Christopher Boyd| Date: Mon, 12 Aug 2019 15:00:00 +0000

It seems facial recognition technology, as technology so often does, has raced far ahead of our ability to define its ethical use. We take a hard look at major concerns brewing in cities around the world.

Categories:

Tags:

(Read more…)

The post Facial recognition technology: force for good or privacy threat? appeared first on Malwarebytes Labs.

Read more

Customer Perspective: Catching the thief lurking in the shadows with EDR and MDR

Credit to Author: Trend Micro| Date: Mon, 12 Aug 2019 15:17:00 +0000

A guest blog by Ian Loe, Senior Vice President, Cybersecurity, NTUC Enterprise Co-operative Limited News flash: aided by time, persistence and smarts, advanced cybersecurity felons are leapfrogging traditional security systems to compromise confidential data. Realising this, we at NTUC Enterprise have been looking into new security technologies that help address these rising concerns. One of…

The post Customer Perspective: Catching the thief lurking in the shadows with EDR and MDR appeared first on .

Read more

Cyberattack Lateral Movement Explained

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Mon, 12 Aug 2019 15:11:56 +0000

[Lightly edited transcript of the video above] Hi there, Mark Nunnikhoven from Trend Micro Research, I want to talk to you about the concept of lateral movement. And the reason why I want to tackle this today is because I’ve had some conversations in the last few days that have really kind of hit that…

The post Cyberattack Lateral Movement Explained appeared first on .

Read more

Apple will hand out unlocked iPhones to vetted researchers

Credit to Author: Lisa Vaas| Date: Mon, 12 Aug 2019 11:44:22 +0000

It formalizes the reality: “pre-jailbroken” iPhones were already on the black market.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/SFMBPoyjIsk” height=”1″ width=”1″ alt=””/>

Read more

Facebook facial recognition: class action suit gets court’s go ahead

Credit to Author: Lisa Vaas| Date: Mon, 12 Aug 2019 11:34:30 +0000

The court said facial recognition could well harm privacy rights, given its “detailed, encyclopedic, and effortlessly compiled” biometrics collection.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/En8PlzNDHD0″ height=”1″ width=”1″ alt=””/>

Read more

GDPR privacy can be defeated using right of access requests

Credit to Author: John E Dunn| Date: Mon, 12 Aug 2019 11:07:10 +0000

A British researcher has uncovered an ironic, gaping security hole in the EU’s General Data Protection Regulation (GDPR) – right of access requests.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/EyJdhSW2bqw” height=”1″ width=”1″ alt=””/>

Read more