It’s time for security leaders to challenge dogma

What are the key elements of a good security program? Why did you answer that way? Seems a lot of security is ‘handed-down’ knowledge. We pride data and evidence-driven decisions while suggesting security is too hard to measure and pin down. Curious, no?

Five new threats to your mobile device security

A decade ago, mobile malware was considered a new and unlikely threat. Many mobile device users even considered themselves immune from such threats. Fast forward to 2017, and more than 1.5 million new incidents of mobile malware have been detected by McAfee Labs in the first quarter of the year alone – for a total…

Apple Removes Some VPN Services From Chinese App Store

Apple has removed software allowing internet users to skirt China’s “Great Firewall” from its app store in the country, the company confirmed Sunday, sparking criticism that it was bowing to Beijing’s tightening web censorship. Chinese internet users have for years sought to get around heavy internet restrictions, including blocks on Facebook and Twitter, by using…

Researchers Demo Physical Attack via Car Wash Hack

LAS VEGAS – BLACK HAT USA – Researchers have created proof-of-concept (PoC) exploits to demonstrate how hackers can cause physical damage to vehicles and injure their occupants by remotely hijacking a connected car wash. The attack was detailed in a presentation at the Black Hat security conference this week by WhiteScope founder Billy Rios, a…

WikiLeaks Details Mac OS X Hacking Tools Used by CIA

The latest round of documents published by WikiLeaks as part of a leak dubbed by the organization “Vault 7” describes several tools allegedly used by the U.S. Central Intelligence Agency (CIA) to target Mac OS X and other POSIX systems. The tools, said to be part of a CIA project named “Imperial,” are called Achilles,…