Security

How to safely dispose of old tech without leaving a security risk – Help Net Security
Every year, millions of old tech are thrown away due to age, malfunctions, or to make way for new ones, which creates security risks related to the data on these devices. The data can often still be recovered if devices are erased without proper tools and procedures. Here’s why securely disposing of old tech is…

Three Ways to Build a More Resilient IoT
Because the IoT is fundamental to our daily lives, engineers are working hard to implement systems that ensure it keeps operating even when things go wrong. (Source: Ar_TH/stock.adobe.com) Industry, healthcare, and energy utilities are using the Internet of Things (IoT) to transform the world. For example, industrial automation relies on the IoT to enhance productivity…

Feds Link $150M Cyberheist to 2022 LastPass Hacks – Krebs on Security
In September 2023, KrebsOnSecurity published findings from security researchers who concluded that a series of six-figure cyberheists across dozens of victims resulted from thieves cracking master passwords stolen from the password manager service LastPass in 2022. In a court filing this week, U.S. federal agents investigating a spectacular $150 million cryptocurrency heist said they had…

Will Social Security Even Exist When I Retire? What Gen Z and Millennials Need to Know
Social Security income is a lifeline many seniors count on to help fund their retirement. But if you’re a millennial or Gen Zer, you might be worried Social Security won’t be around when you retire. It’s a fear I’ve often heard expressed by my own clients. For years, we’ve heard the government-run program is running out…

How to prevent data leakage in collaboration tools like Slack and Teams – Help Net Security
In recent years, collaboration tools have become an absolute necessity for remote and hybrid work. This primarily increased during the COVID-19 pandemic due to the impossibility of communicating in person. So, tools like Slack, Microsoft Teams, and Zoom surged in popularity, enabling employees to stay connected despite physical distances. But this sudden transition to online…

Notorious Malware, Spam Host “Prospero” Moves to Kaspersky Lab – Krebs on Security
One of the most notorious providers of abuse-friendly “bulletproof” web hosting for cybercriminals has started routing its operations through networks run by the Russian antivirus and security firm Kaspersky Lab, KrebsOnSecurity has learned. Security experts say the Russia-based service provider Prospero OOO (the triple O is the Russian version of “LLC”) has long been a…

The Trump Administration Is Deprioritizing Russia as a Cyber Threat
As scam compounds in Southeast Asia continue to drive massive campaigns targeting victims around the world, WIRED took a deeper look at how Elon Musk’s satellite internet service provider Starlink is keeping many of those compounds in Myanmar online. Meanwhile, FTC complaints obtained by WIRED allege that an “OpenAI” job scam used Telegram to recruit…

OT/ICS cyber threats escalate as geopolitical conflicts intensify – Help Net Security
Ransomware attacks against industrial organizations surged by 87% over the past year, while new malware families designed specifically for OT environments emerged. These findings highlight a troubling trend: OT systems are increasingly becoming mainstream targets, and even sophisticated threat actors use relatively unsophisticated tactics to infiltrate and disrupt industrial operations. State-sponsored groups embed themselves in…

Trump 2.0 Brings Cuts to Cyber, Consumer Protections – Krebs on Security
One month into his second term, President Trump’s actions to shrink the government through mass layoffs, firings and withholding funds allocated by Congress have thrown federal cybersecurity and consumer protection programs into disarray. At the same time, agencies are battling an ongoing effort by the world’s richest man to wrest control over their networks and…

Security Awareness Trainings: Schulungen richtig managen
Lesen Sie, welche Aspekte besonders entscheidend sind, damit Ihr Security Awareness Training erfolgreich ist. Foto: nialowwa – shutterstock.com Studien wie die von Verizon oder IBM zeigen immer wieder auf, dass die Manipulation von zwischenmenschlichen Verhaltensweisen die vielversprechendste Vorgehensweise ist, um Zugang zu sensiblen Daten zu erlangen. Social Engineering bleibt die größte, fortbestehende Herausforderung der Cybersicherheit….