• Bitcoin scams on the rise in Edmonton, police warn
    Edmonton police are warning the public about an increase in fraud rates and emerging scams that rely on digital currencies such as bitcoin to extract money from victims.Reports of fraud and identity theft increased by 89 per cent between 2013 and 2017, police said in a statement Wednesday.Read More
  • Password-less security arrives on macOS with HYPR
    The addition of macOS marks a milestone in expanding enterprise-wide coverage of HYPR’s Decentralized Authentication Platform, enabling businesses to secure password-less access to corporate resources, eliminate credential reuse and stop phishing attacks while improving workforce productivity on a global scale. With existing support for Windows 7, 8 and 10, the launch of MacOS rounds off the HYPR Employee Access offering and accelerates HYPR’s continued transformation of enterprise security. Unlike authentication providers that rely on centralized passwords, HYPR moves user authentication keys to their personal mobile devices and secures them against malicious hackers. Decentralized Authentication eliminates the hackers’ favorite target – the centralized password store – forcing attackers to focus on each device individually and diffusing the mass credential breach. When factoring in the large-scale breaches caused by credential stuffing, phishing and password reuse attacks – it is clear that eliminating passwords is a huge win for the C-Suite and IT teams,” said George Avetisov, CEO of HYPR.Read More
  • 50 CVEs in 50 Days: Fuzzers Create a Breakthrough in Discovering Vulnerabilities
    A target function is a term that WinAFL uses to describe the function that is used as the entry point to the fuzzing process. The harness includes a function which will be used as our target function. We can see that JP2KCodeStm::IsSeekable calls a function from our vtable passing 0xbaaddaab as the first parameter, so it’s basically a thin wrapper around our vtable function #7. The next function, JP2KImageDataCreate, takes no arguments and its return value is passed to the following function JP2KImageGetMaxRes. The target function was inlined by the compiler which causes WinAFL to miss the entry to the target function and results in WinAFL termination with program abort. We try to understand what functionality is related to this function and proactively find samples that will trigger this functionality.Read More
  • Border Agents Fail to Delete Personal Data of Travelers After Electronic Searches, Watchdog Says
    But a new government report found that the majority of officers fail to delete the personal data.The Department of Homeland Security’s internal watchdog, known as the Office of the Inspector General (OIG), released a new report yesterday detailing CBP’s many failures at the border. The new report, which is redacted in some places, explains that Customs officials don’t even follow their own extremely liberal rules.Customs officials can conduct two kinds of electronic device searches at the border for anyone entering the country. The second is called an “advanced search” and allows the officer to transfer data from your device to DHS servers for inspection by running that data through its own software. Both searches are legal and don’t require a warrant or even probable cause—at least they don’t according to DHS.It’s that second kind of search, the “advanced” kind, where CBP has really been messing up and regularly leaving the personal data of travelers on USB drives.According to the new report [PDF]:[The Office of the Inspector General] physically inspected thumb drives at five ports of entry.Read More
  • Google’s AI Guru Wants Computers to Think More Like Brains
    WIRED caught up with Hinton last week at the first G7 conference on artificial intelligence, where delegates from the world’s leading industrialized economies discussed how to encourage the benefits of AI, while minimizing downsides such as job losses or algorithms that learn to discriminate. WIRED: More than 4,500 of your Google colleagues signed a letter protesting a Pentagon contract that involved applying machine learning to drone imagery. WIRED: You’ve said that thinking about how the brain works inspires your research on artificial neural networks. Artificial neural networks feed data through networks of mathematical neurons, linked by connections termed weights. Deep learning is good at learning using many fewer connections between neurons, when it has many episodes or examples to learn from. LEARN MORE The WIRED Guide to Artificial IntelligenceRead More
  • Unit 42 research reveals 29% of organizations have potential account compromises
    Today, we released the latest report from Unit 42, “Cloud Security Trends and Tips: Key Learning to Secure Your AWS, Azure and Google Cloud Environments.” In this report, Unit 42 looked at new and existing threats to cloud security from late-May through early-September 2018 and analyzed how enterprises are faring as they attempt to balance risk with efficiency. Compliance is a work in progress: The numbers are undeniable: 32% of organizations publicly exposed at least one cloud storage service, 49% of databases are not encrypted, and 32% of GDPR compliance checks fail—a significant concern in today’s global operating environment. There are signs of better protection of cloud storage services, but with the rise of sweeping regulations such as GDPR in Europe and California Consumer Privacy Act, many organizations still have much work to do before they achieve comprehensive compliance and governance across public cloud environments.Read More
  • Shamoon Malware Returns With a Bang: New Variant Uploaded to VirusTotal
    A new variant of the destructive Shamoon malware was uploaded to VirusTotal this week, but security researchers haven’t linked it to a specific attack yet. Unlike other malware used in targeted attacks, which focuses on stealing information, Shamoon erases data on infected computers and attempts to destroy the hard disk and render systems unusable. Shamoon typically uses a set of hard-coded domain credentials specific to the target organization to steal credentials, but a malware variant uploaded to VirusTotal on Monday doesn’t contain the credentials necessary for distribution. In a report shared with SecurityWeek, security researchers at Chronicle, one of Google's newest sister companies, say there’s no evidence that the new Shamoon variant is linked to a specific attack. The sample, however, closely matches historic versions of the malware, although it contains elements that set it apart from the previously observed variants. On top of that, the new list does not overlap with previously observed versions of Shamoon, the Chronicle researchers said.Read More
  • Adobe updates Sign with Government ID Authentication feature
    Adobe on Tuesday released new updates to Adobe Sign focused on digital onboarding and enrollment, including what the company is calling an "industry-first" feature that aims to increase signer security using a smartphone and a selfie. Adobe's machine learning software authenticates the ID card's security features automatically and verifies the signer's identity. Adobe also announced that Adobe Acrobat DC and Acrobat Reader on Windows now support Microsoft Information Protection (MIP) for higher document security in PDFs. This new support integration makes Acrobat DC the preferred PDF viewer for MIP, Adobe said. The revamped Adobe DC also brings an expansion of Adobe Sign and touch-enabled PDF editing on mobile devices. Adobe brings new AI features to Experience platformRead More
  • Australian encryption laws under fire from Apple, Facebook, Google and Microsoft
    Australia's anti-encryption laws don't require tech companies to hand over data about their users, but they do require them to assist with cracking the encryption that secures their users' communications.And, as in the US, the Australian laws place a gag order on anyone who has been forced to create a government backdoor.But the tech giants have been anything but gagged in their opposition to the laws.In its submission to the parliamentary joint committee looking into the implications of the "Assistance and Access" bill, Apple came out strongly against the proposed new laws, which it said would weaken the security of the nation."Vital infrastructure – like power grids and transportation hubs – become more vulnerable when individual devices get hacked. Criminals and terrorists who want to infiltrate systems and disrupt sensitive networks may start their attacks by accessing just one person's smartphone."In the face of these threats, this is no time to weaken encryption. There is profound risk of making criminals' jobs easier, not harder.Read More
  • Banks warned against over-reliance on third-party security providers
    This was particularly the case at the board or management committee levels." The review looked at a sample of 20 firms out of the 3,000 that currently operate in the UK financial sector. It said that companies "generally lacked board members with strong familiarity or specific technical cyber-expertise". Not all firms, it noted, "appeared to have considered the risk that their firm may be used as conduits to damage other firms or connected infrastructure. Nor had they considered the risk that attacks may be motivated by attempts to commit market abuse." Malcolm Taylor, director of Cyber Advisory at ITC Secure, told SC Media UK that good cyber-security can be understood and, crucially, led by boards in all sectors. "They see the information security budget and feel that they are taking action, but they don't fully engage with the CISO and his team," Gailey said. The composition of these boards ensure that there is no information security experience at that level and security professionals who can translate the threats and challenges into language the board will understand are still rare," he said.Read More