You are probably familiar with browser extensions, which most of us use on a daily basis. They add a lot of useful features to browsers, but at the same time, they pose threats to both privacy and security.
Let’s discuss what’s wrong with browser extensions and how you can minimize the chances of one of them running amok on you. But first let’s go through what exactly a browser extension is. What are browser extensions, and why do you need them? A browser extension is something like a plugin for your browser that adds certain functions and features to it. Extensions can modify the user interface or add some Web service functionality to your browser.Read more
Hacking isn’t always hard. Some lower-tier hackers use programs to automatically churn through breached login details to break into other accounts, and some penetration testing tools are designed to streamline processes so hackers can get to the more interesting stuff as quickly as possible.
Enter AutoSploit, a program which takes that idea of efficient hacking, but severely ramps up the potential for damage by automating pretty much everything, including the process of finding a vulnerable target to attack. “As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts,” the tool’s Github page reads.Read more
Secretary of Defense James Mattis is actively considering banning US military and civilian personnel from bringing their personal cell phones into the Pentagon, the world's largest office building, according to three US defense officials familiar with an ongoing review of the issue.
The officials told that while the issue is under review and a final decision has not been made, the recent revelations that a fitness tracking app that maps people's exercise habits could pose security risks for US troops has only underscored the need for the review. The officials added that the review was ordered after Mattis expressed his intent to ban personal cell phones in the Pentagon.Read more
Donald Trump’s national security team is looking at options to counter the threat of China spying on US phone calls that include the government building a super-fast 5G wireless network. The official said the option was being debated at a low level in the administration and was six to eight months away from being considered by the president himself.
The 5G network concept is aimed at addressing what officials see as China’s threat to US cyber security and economic security. The Trump administration has taken a harder line on policies initiated by predecessor Barack Obama on issues ranging from Beijing’s role in restraining North Korea to Chinese efforts to acquire US strategic industries.Read more
Let’s be honest, when most people see a little green lock with the word “Secure” to the left of a URL, they think the site is safe. Ditto for spotting the words “this site uses a secure connection” or a URL beginning with the letters “https.” More and more sites these days are switching to HTTPS.
Most have no choice, in fact. So what’s the problem? The more secure sites there are, the better — right? We’re about to let you in on a little secret: Those “Secure” symbols don’t guarantee a website is safe from all threats. A phishing site, for example, can legitimately display that comforting green lock next to its https address.Read more
Basically, phishing is a type of fraud that aims to extract personal data: logins, passwords, wallet numbers, and so forth. It’s essentially digital social engineering.
There’s a variety of phishing known as spear phishing. What distinguishes spear phishing from other types of phishing is that it targets a specific person or employees of a specific company. That targeting makes spear phishing more dangerous; cybercriminals meticulously gather information about the victim to make the “bait” more enticing. A well-produced spear phishing e-mail can be very difficult to distinguish from a legitimate one. So, spear phishing makes it easier to hook the victim.Read more
Allow us to draw your attention to a new document, published by the European Networks and Information Security Agency, called “Baseline Security Recommendations for IoT in the context of Critical Information Infrastructures.”
It’s worth noting not only because our experts contributed to it, but also because it addresses one of the key issues repeatedly raised during the annual cybersecurity conference: the lack of universal cybersecurity standards for industrial automation, including information security standards for industrial Internet-of-Things devices. ENISA put forth recommendations, not requirements.Read more
The U.S. Federal Communications Commission voted along party lines on Thursday to repeal landmark 2015 rules aimed at ensuring a free and open internet, setting up a court fight over a move that could recast the digital landscape.
The approval of FCC Chairman Ajit Pai’s proposal in a 3-2 vote marked a victory for internet service providers such as AT&T Inc, Comcast Corp and Verizon Communications Inc and hands them power over what content consumers can access. It also is the biggest win for Pai in his sweeping effort to undo many telecommunications regulations since taking over at the agency in January.Read more
During the holiday season, an inevitable shopping fever takes hold, commanding the attention of buyers and retailers alike. Cybercriminals and scammers take advantage of the focus on retail, so if you are a seller, pay special attention to cybersecurity from Black Friday until the end of the holidays.
Point-of-sale systems have always been a weak spot for chain stores. Their performance requirements for normal operations are low, so they are often based on old computers running obsolete OSes. Their operators are afraid to create additional load by installing a security solution, so the systems are insecure.Read more
The French government is to ban students from using mobile phones in the country’s primary, junior and middle schools. Children will be allowed to bring their phones to school, but not allowed to get them out at any time until they leave, even during breaks.
A proposed ban was included in Emmanuel Macron’s successful presidential election campaign this year. Jean-Michel Blanquer, the French education minister, said the measure would come into effect from the start of the next school year in September 2018. It will apply to all pupils from the time they start school at age of six – up to about 15 when they start secondary school.Read more