Security Think Tank: Ensure cyber insurance is right and helps reduce risk

Cyber insurance policies for businesses, and the criteria used to write premiums, can vary. The size and type of business is typically assessed, but beyond this, the questions asked can start to look quite different.

Cyber insurance policies for businesses, and the criteria used to write premiums, can vary. The size and type of business is typically assessed, but beyond this, the questions asked can start to look quite different.

Continue reading “Security Think Tank: Ensure cyber insurance is right and helps reduce risk”

Security Firms Say Windows 10 Behavior is Anti-Competitive

Kaspersky Lab Accuses Microsoft of Aggressive Attitude Towards Endpoint Security Firms With Windows 10

On Thursday November 10, the Russian Federal Anti-Monopoly Service (FAS) announced that it was investigating Microsoft following a complaint from endpoint security firm Kaspersky Lab.

Kaspersky Lab Accuses Microsoft of Aggressive Attitude Towards Endpoint Security Firms With Windows 10

Continue reading “Security Firms Say Windows 10 Behavior is Anti-Competitive”

Shazam for Mac Keeps Listening Even When Disabled

The Mac version of the Shazam music discovery application keeps the device’s microphone active even after the user has switched off the app. While it doesn’t appear that Shazam is trying to spy on users, this behavior does have some security implications.

The Mac version of the Shazam music discovery application keeps the device’s microphone active even after the user has switched off the app. While it doesn’t appear that Shazam is trying to spy on users, this behavior does have some security implications.

Continue reading “Shazam for Mac Keeps Listening Even When Disabled”

CrySiS Ransomware Master Decryption Keys Released

The master decryption keys for the CrySiS ransomware were released on Monday, allowing security researchers to help victims recover their files.

The move is surprising, but not unique. Last year, the alleged author of the crypto ransomware known as Locker published the keys required to decrypt victims’ files, and TeslaCrypt authors made a similar move earlier this year, when they decided to shut down their malicious project.

The master decryption keys for the CrySiS ransomware were released on Monday, allowing security researchers to help victims recover their files.

Continue reading “CrySiS Ransomware Master Decryption Keys Released”

Kovter Trojan Fuels Spike in New Malware Variants

The Kovter Trojan family was responsible for a significant increase in new malware variants in October, a recent report from Symantec reveals.

The number of new unique malware variants jumped to 96.1 million in October, almost twice the number registered in September (50.1 million), and the Kovter family of threats is responsible for this impressive growth, Symantec says.

The Kovter Trojan family was responsible for a significant increase in new malware variants in October, a recent report from Symantec reveals.

Continue reading “Kovter Trojan Fuels Spike in New Malware Variants”

412 million user accounts exposed in FriendFinder Networks hack

Passwords easy to crack

Although most passwords were hashed with SHA-1, this can be easily cracked. According to LeakedSource, 103,070,536 AdultFriendFinder passwords were stored in plain text, while 232,137,460 were hashed with SHA-1, but the site estimated that 99.3% of all passwords from this website had been cracked.

Passwords easy to crack

Although most passwords were hashed with SHA-1, this can be easily cracked. According to LeakedSource, 103,070,536 AdultFriendFinder passwords were stored in plain text, while 232,137,460 were hashed with SHA-1, but the site estimated that 99.3% of all passwords from this website had been cracked.

Continue reading “412 million user accounts exposed in FriendFinder Networks hack”

National Cyber Security Centre to trial cyber defence initiatives on government

The new UK National Cyber Security Centre (NCSC) has promised to test and prove with government departments everything it recommends.

“Our strategy is to use government as a guinea pig for all the measures we want to see done at national scale,” said Ian Levy, technical director of the NCSC.

The new UK National Cyber Security Centre (NCSC) has promised to test and prove with government departments everything it recommends.

Continue reading “National Cyber Security Centre to trial cyber defence initiatives on government”

24 cyber criminals arrested in Europol operation

Card cloning is rife

Criminal gangs are able to create clones of legitimate payment cards once they have copied all the necessary information from the card.

Card cloning has been suggested as one way the criminals who raided Tesco Bank could have tapped into 9,000 accounts in a short period of time to steal £2.5m.

Card cloning is rife

Criminal gangs are able to create clones of legitimate payment cards once they have copied all the necessary information from the card.

Continue reading “24 cyber criminals arrested in Europol operation”