Cloud Security
Taking A Layered Approach To Cybersecurity
In the world of data protection, there’s a classic analogy experts use to describe the ideal security strategy. Here’s how it goes: Think of your school district’s digital infrastructure as a medieval ...
Raspberry Robin Malware Now Using Windows Script Files to Spread
The threat actors behind Raspberry Robin are using highly sophisticated evasion techniques to stay under the radar of antivirus software ...
Security Boulevard
FCC Mulls Rules to Protect Abuse Survivors from Stalking Through Cars
Jeffrey Burt | | automobile, automobiles, Car, connected car security, domestic abuse, fcc, government, MVNO, telematics
To protect domestic violence survivors from abusers, the FCC wants to include internet-connected vehicles under the Safe Communication Act ...
Security Boulevard
HHS: Health Care IT Helpdesks Under Attack in Voice Scams
Jeffrey Burt | | cyberattacks in healthcare, Generative AI risks, healthcare, helpdesk, MFA, social engineering, SpearPhishing, Voice Cloning
Scammers are impersonating employees in voice calls to gain access to healthcare organizations' systems and steal money, the agency says ...
Security Boulevard
Here Comes the US GDPR: APRA, the American Privacy Rights Act
Richi Jennings | | American Data Privacy and Protection Act, APRA (American Privacy Rights Act), Cathy McMorris Rodgers, Consumer privacy rights, customer privacy, EU GDPR, GDPR, GDPR (General Data Protection Regulation), gdpr legislation, Maria Cantwell, Privacy, SB Blogwatch
Enter the lobbyists: A draft federal privacy act has Washington DC buzzing. But it’s just a bill—and it’s a long, long journey before it becomes a law ...
Security Boulevard
FCC: Phone Network Bugs Must Be Fixed — But are SS7/Diameter Beyond Repair?
Richi Jennings | | Big Telecom, carrier, Carriers, Diameter, digital telecom, fcc, FCC Failures, FCC Follies, FCC privacy rules, Federal Communications Commission, Federal Government, Location, location access risks, location data, Location data privacy, location history, location intelligence, location privacy, location sharing location tracking, location tracking, mobile carrier, mobile carrier vulnerability, Mobile carriers, Mobile Location Tracking, Mobile Tracking, Phone Carrier, RADIUS, roaming, Ron Wyden, SB Blogwatch, Sen. Ron Wyden, Smartphone Location Tracking, ss7, telco, Telecom, Telecom Cybersecurity, Telecom Industry, Telecom Industry Vulnerabilities, telecommunications, Telecommunications Security, telephone, telephones, U.S. Federal Communications Commission, wireless carrier
Fast enough for government work: The Federal Communications Commission is finally minded to do something about decades-old vulnerabilities ...
Security Boulevard
Ivanti CEO Promises Stronger Security After a Year of Flaws
Ivanti CEO Jeff Abbott, in an open letter and a video, outlined the steps the embattled company is taking to improve its security ...
Security Boulevard
Mapping Your Path to Passwordless
Denny LeCompte | | Authentication, Cybersecurity, Password, passwordless, passwordless-authentication, passwords, vulnerability
Navigating the shift to passwordless authentication via digital certificates demands a visionary approach that considers the immediate benefits while strategically planning for future scalability and adaptability ...
Security Boulevard
Google Chrome Enlists Emerging DBSC Standard to Fight Cookie Theft
Google is prototyping a new technology in Chrome that is designed to thwart the growing trend among cybercriminals of stealing browser session cookies, which enables hackers to bypass multifunction authentication (MFA) protections ...
Security Boulevard
A K-12 Guide To Post-Incident Analysis
K-12 cyberattacks are increasing. According to a survey of over 3,000 information technology (IT) and cybersecurity leaders, 80% of school IT professionals experienced ransomware attacks in 2022 — up from just 52% ...