Smart Check Validated for New Bottlerocket OS

Credit to Author: Trend Micro| Date: Tue, 10 Mar 2020 23:35:40 +0000

Containers provide a list of benefits to organizations that use them. They’re light, flexible, add consistency across the environment and operate in isolation. However, security concerns prevent some organizations from employing containers. This is despite containers having an extra layer of security built in – they don’t run directly on the host OS. To make…

The post Smart Check Validated for New Bottlerocket OS appeared first on .

Read more

Trend Micro Cloud App Security Blocked 12.7 Million High-Risk Email Threats in 2019 – in addition to those detected by cloud email services’ built-in security

Credit to Author: Chris Taylor| Date: Tue, 10 Mar 2020 17:27:10 +0000

On March 3, 2020, the cyber division of Federal Bureau of Investigation (FBI) issued a private industry notification calling out Business Email Compromise (BEC) scams through exploitation of cloud-based email services. Microsoft Office 365 and Google G Suite, the two largest cloud-based email services, are targeted by cyber criminals based on FBI complaint information since…

The post Trend Micro Cloud App Security Blocked 12.7 Million High-Risk Email Threats in 2019 – in addition to those detected by cloud email services’ built-in security appeared first on .

Read more

Tax Scams – Everything you need to know to keep your money and data safe

Credit to Author: Trend Micro| Date: Tue, 10 Mar 2020 13:08:46 +0000

Tax season has always been a pretty nerve-wracking time for hard-working Americans. But over the years, technology advances have arrived to gradually make the process a bit easier. The bad news is that they can also introduce new cyber risks and even more stress. There are two things that cybercriminals are always on the hunt…

The post Tax Scams – Everything you need to know to keep your money and data safe appeared first on .

Read more

This Week in Security News: 10,000 Users Affected by Leak from Misconfigured AWS Cloud Storage and Massive U.S. Property and Demographic Database Exposes 200 Million Records

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 06 Mar 2020 14:07:12 +0000

week in security

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about how the data of train commuters in the U.K. who were using the free Wi-Fi in Network Rail-managed stations was unintentionally leaked due to an…

The post This Week in Security News: 10,000 Users Affected by Leak from Misconfigured AWS Cloud Storage and Massive U.S. Property and Demographic Database Exposes 200 Million Records appeared first on .

Read more

The Case for Limiting Your Browser Extensions

Credit to Author: BrianKrebs| Date: Tue, 03 Mar 2020 15:39:53 +0000

Last week, KrebsOnSecurity reported to health insurance provider Blue Shield of California that its Web site was flagged by multiple security products as serving malicious content. Blue Shield quickly removed the unauthorized code. An investigation determined it was injected by a browser extension installed on the computer of a Blue Shield employee who’d edited the Web site in the past month. The incident is a reminder that browser extensions — however useful or fun they may seem when you install them — typically have a great deal of power and can effectively read and/or write all data in your browsing sessions. And as we’ll see, it’s not uncommon for extension makers to sell or lease their user base to shady advertising firms, or in some cases abandon them to outright cybercriminals.

Read more

Huge flaw found in how facial features are measured from images

Credit to Author: Lisa Vaas| Date: Tue, 03 Mar 2020 12:48:02 +0000

It has to do with optics: faces appear to flatten out as we get further away. Our brains compensate, but AI-run facial recognition doesn’t.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/A15DxfJxLcc” height=”1″ width=”1″ alt=””/>

Read more

GoodRx stops sharing personal medical data with Google, Facebook

Credit to Author: Lisa Vaas| Date: Tue, 03 Mar 2020 12:47:27 +0000

The mobile app saves people money but was letting 20 companies know who’s taking antipsychotics, erectile dysfunction and HIV meds, and more.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/Mjy_qyNwWEk” height=”1″ width=”1″ alt=””/>

Read more

Microsoft identity acronyms—what do they mean and how do they relate to each other?

Credit to Author: Todd VanderArk| Date: Mon, 02 Mar 2020 17:00:54 +0000

This is the first in a blog series to help lessen confusion around identity by sharing with you some of the terms used at Microsoft.

The post Microsoft identity acronyms—what do they mean and how do they relate to each other? appeared first on Microsoft Security.

Read more

Nvidia patches severe flaws affecting GeForce, Quadro NVS and Tesla

Credit to Author: John E Dunn| Date: Tue, 03 Mar 2020 11:09:05 +0000

In all, the update covers five Windows and Linux desktop CVE vulnerabilities, including one rated as critical.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/YitOMgSO498″ height=”1″ width=”1″ alt=””/>

Read more