Computer Security Tip of the Day
March 4th
Cyber criminals now have a wealth of information on almost all of us. With so many organizations getting hacked, cyber criminals simply purchase databases with personal information on millions of people, then use that information to customize their attac…
Bruce Schneier on Security
March 4th
Check Point has evidence that (probably government affiliated) Chinese hackers stole and cloned an NSA Windows hacking tool years before (probably government affiliated) Russian hackers stole and then published the same tool. Here’s the timeline: Th…
March 3rd
NASA made an oblique reference to a coded message in the color pattern of the Perseverance Mars Lander ‘s parachute. More information.
March 2nd
This is weird: Once an hour, infected Macs check a control server to see if there are any new commands the malware should run or binaries to execute. So far, however, researchers have yet to observe delivery of any payload on any of the infected 30,000 ma…
March 1st
Early in 2020, cyberspace attackers apparently working for the Russian government compromised a piece of widely used network management software made by a company called SolarWinds. The hack gave the attackers access to the computer networks of some 18,00…
February 27th
The Far Side on squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.
Dark Reading Security News
March 3rd
Traditional security tools focus on the network perimeter, leaving user and service accounts vulnerable to hackers.
February 27th
A new document provides guidance for businesses planning to implement a zero-trust system management strategy.
February 26th
Strata Identity was founded to change businesses' approach to identity management as multicloud environments become the norm.
February 17th
The series A round of funding, led by Menlo Ventures, will help Strata scale its distributed identity technology.
February 13th
In a hybrid and multicloud world, identity is the new perimeter and a critical attack surface for bad actors.
New Security Threats
March 4th
Wireless mouse-utility lacks proper authentication and opens Windows systems to attack.
March 4th
A flaw (CVE-2021-21166) in the Audio component of Google Chrome is fixed in a new update being pushed out to Windows, Mac and Linux users.
March 4th
A third-party IT provider exposed valuable airline data that experts say could be a goldmine for cybercriminals. 
March 4th
Threat actors can use personal information gleaned from images to craft targeted scams, putting personal and corporate data at risk.
March 4th
The Russian-speaking RTM threat group is targeting organizations in an ongoing campaign that leverages a well-known banking trojan, brand new ransomware strain and extortion tactics.