FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdaySecurity

Radware Launches SkyHawk Security, a Spinoff of Its Cloud Native Protector Business

Tiger Global Management invests $35 million in SkyHawk Security to accelerate growth.
  • May 3rd 2022 at 14:25

Teleport Raises $110 Million Series C at $1.1 Billion Valuation Led by Bessemer Venture Partners

Funding follows dramatic revenue growth as identity-based access requirements skyrocket.
  • May 3rd 2022 at 14:15

OccamSec Unveils New Cybersecurity Platform

Providing continuous penetration testing with context, and a host of other features, the Incenter platform is built to give organizations what they need to effectively secure their environment.
  • May 3rd 2022 at 14:10

Developing Software? Get Accountability Right First

By Guillermo Perez, CEO and Co-Founder, Octobot
Software accountability offers a fresh perspective for creating and managing digital products, mainly by making processes more reliable and transparent for every stakeholder.

  • May 3rd 2022 at 14:00

TLS Flaws Leave Avaya, Aruba Switches Open to Complete Takeover

By Robert Lemos, Contributing Writer
In the latest incarnation of the TLStorm vulnerability, switches from Avaya and Aruba β€” and perhaps others β€” are susceptible to compromise from an internal attacker.

  • May 3rd 2022 at 10:00

DoD Scammed Out of $23M in Phishing Attack on Jet-Fuel Vendors

By Dark Reading Staff, Dark Reading
A California man faces prison time and steep fines stemming from cybertheft of US military funds intended to pay jet-fuel suppliers.

  • May 2nd 2022 at 17:11

Google Offers $1.5M Bug Bounty for Android 13 Beta

By Tara Seals, Managing Editor, News
The security vulnerability payout set bug hunters rejoicing, but claiming the reward is much, much easier said than done.

  • May 2nd 2022 at 20:43

New Regulations in India Require Orgs to Report Cyber Incidents Within 6 Hours

By Dark Reading Staff, Dark Reading
CERT-In updates cybersecurity rules to include mandatory reporting, record-keeping, and more.

  • May 2nd 2022 at 17:46

6 Best Practices to Ensure Kubernetes Security Meets Compliance Regulations

By Glen Kosaka, Head of Product Security, SUSE
Security must be precise enough to meet compliance requirements without impeding DevOps and developer productivity. Here's how to strike that balance.

  • May 2nd 2022 at 16:48

Name That Edge Toon: Flower Power

By John Klossner, Cartoonist
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.

  • May 2nd 2022 at 16:19

Security Stuff Happens: What Do You Do When It Hits the Fan?

By Tyler Farrar, CISO, Exabeam
Breaches can happen to anyone, but a well-oiled machine can internally manage and externally remediate in a way that won't lead to extensive damage to a company's bottom line. (Part 1 of a series.)

  • May 2nd 2022 at 14:00

2022 Security Priorities: Staffing and Remote Work

By Edge Editors, Dark Reading
A comprehensive security strategy balances technology, processes, and people β€” and hiring and retaining security personnel and securing the remote workforce are firmly people priorities.

  • April 30th 2022 at 02:00

Good News! IAM Is Near-Universal With SaaS

By Dark Reading Staff, Dark Reading
The less-good news: IAM only works for applications your IT department knows about, so watch for "shadow IT" programs installed or written by users that leave a security gap.

  • April 29th 2022 at 22:49

Critical Vulnerabilities Leave Some Network-Attached Storage Devices Open to Attack

By Jai Vijayan, Contributing Writer
QNAP and Synology say flaws in the Netatalk fileserver allow remote code execution and information disclosure.

  • April 29th 2022 at 21:48

Cloudflare Flags Largest HTTPS DDoS Attack It's Ever Recorded

By Dark Reading Staff, Dark Reading
This scale of this month's encrypted DDoS attack over HTTPS suggests a well-resourced operation, analysts say.

  • April 29th 2022 at 19:36

GitHub issues final report on supply-chain source code intrusions

By Paul Ducklin
Learn how to find out which apps you've given access rights to, and how to revoke those rights immediately in an emergency.

Take a Diversified Approach to Encryption

By Dr. Vincent Berk, Chief Strategy Officer, Quantum Xchange
Encryption will break, so it's important to mix and layer different encryption methods.

  • April 29th 2022 at 14:00

Ambient.ai Expands Computer Vision Capabilities for Better Building Security

By Fahmida Y. Rashid, Managing Editor, Features, Dark Reading
The AI startup releases new threat signatures to expand the computer vision platform’s ability to identify potential physical security incidents from camera feeds.

  • April 29th 2022 at 00:47

Microsoft Patches Pair of Dangerous Vulnerabilities in Azure PostgreSQL

By Jai Vijayan, Contributing Writer
Flaws gave attackers a way to access other cloud accounts and databases, security vendor says.

  • April 28th 2022 at 22:23

IT Teams Worry Staff Lack Cloud-Specific Skills

By Edge Editors, Dark Reading
Security, cost, and reliability top the list of concerns IT teams have about their cloud operations, according to a recent report.

  • April 28th 2022 at 21:42

The Ransomware Crisis Deepens, While Data Recovery Stalls

By Robert Lemos, Contributing Writer
Higher probabilities of attack, soaring ransoms, and less chance of getting data back β€” the ransomware plague gets worse, and cyber insurance fails to be a panacea.

  • April 28th 2022 at 19:55

Capital One Ventures, Snowflake Ventures, Verizon Ventures, and Wipro Ventures Join Securonix $1B+ Growth Investment as Strategic Investors

Blue-chip companies deepen commitment based on success of long-standing customer and partner relationships and conviction of Securonix’s vision and hypergrowth potential.
  • April 28th 2022 at 19:55

Bumblebee Malware Buzzes Into Cyberattack Fray

By Tara Seals, Managing Editor, News
The sophisticated Bumblebee downloader is being used in ongoing email-borne attacks that could lead to ransomware infections.

  • April 28th 2022 at 19:41

Microsoft: Russia Using Cyberattacks in Coordination With Military Invasion of Ukraine

By Dark Reading Staff, Dark Reading
Six Russian state-backed threat actors have lunched 237 cyberattacks on Ukraine's infrastructure, new research from MIcrosoft shows.

  • April 28th 2022 at 18:45

Explainable AI for Fraud Prevention

By David Utassy, Data Scientist, SEON
As the use of AI- and ML-driven decision-making draws transparency concerns, the need increases for explainability, especially when machine learning models appear in high-risk environments.

  • April 28th 2022 at 14:00

A Peek into Visa's AI Tools Against Fraud

By Fahmida Y. Rashid, Managing Editor, Features, Dark Reading
Visa has invested heavily in data analytics and artificial intelligence over the past five years to secure the movement of money and keep fraud rates low.

  • April 28th 2022 at 00:06

Doppler Takes on Secrets Management

By Fahmida Y. Rashid, Managing Editor, Features, Dark Reading
The startup is the latest company to try to solve the problem of organizing and sharing secrets.

  • April 27th 2022 at 22:48

Chinese APT Bronze President Mounts Spy Campaign on Russian Military

By Jai Vijayan, Contributing Writer
The war in Ukraine appears to have triggered a change in mission for the APT known as Bronze President (aka Mustang Panda).

  • April 27th 2022 at 22:19

Synopsys to Acquire WhiteHat Security from NTT

Acquisition expands security software-as-a-service capabilities.
  • April 27th 2022 at 20:54

CISA: Log4Shell Was the Most-Exploited Vulnerability in 2021

By Dark Reading Staff, Dark Reading
Internet-facing zero-day vulnerabilities were the most commonly used types of bugs in 2021 attacks, according to the international Joint Cybersecurity Advisory (JCSA).

  • April 27th 2022 at 20:02

Smarter Homes & Gardens: Smart Speaker Privacy

By Natalie Maxfield

So is your smart speaker really listening in on your conversations?Β 

That’s the crux of a popular privacy topic. Namely, are we giving up some of our privacy in exchange for the convenience of a smart speaker that does our bidding with the sound of our voice? After all, you’re using it to do everything from search for music, order online, and control the lights and temperature in your home.Β 

What is your smart speaker really hearingβ€”and recording?Β 

Let’s take a look at what’s going on inside of your smart speaker, how it processes your requests, and what companies do with the recordings and transcripts of your voice.Β 

So, are smart speakers listening in?Β 

More or less, smart speakers are listening to all the time. Each smart speaker has its own β€œwake word” that it listens for, like Alexa, Siri, or Google. When the device hears that wake word or thinks it hears it, it begins recording and awaits your verbal commands. Unless you have the microphone or listening feature turned off, your device indeed actively listens for that wake word all the time.Β 

Here’s where things get interesting, though. There’s a difference between β€œlistening” and β€œrecording.” The act of listening is passive. Your smart speaker is waiting to hear its name. That’s it. Once it does hear its name, it begins recording for a few seconds to record your command. From there, your spoken command goes into the company’s cloud for processing by way of an encrypted connection.Β Β 

There are exceptions to when your command may go to the company’s cloud for processing, like Siri on iPhones, which according to Apple, β€œYou don’t sign in with your Apple ID to use Siri, and the audio of your requests is processed entirely on your iPhone.” Also, Google Assistant may process some requests without going to the cloud, like β€œWhen a user triggers a smart home Action that has a local fulfillment path, Assistant sends the EXECUTE intent or QUERY intent to the Google Home or Google Nest device rather than the cloud fulfillment.” 

In the cases where information does go to the cloud, processing entails a few things. First, it makes sure that the wake word was heard. If it’s determined that the wake word was indeed spoken (or something close enough to itβ€”more on that in a minute), the speaker follows through on the request or command. Depending on your settings, that activity may get stored in your account history, whether as a voice recording, transcript, or both. If the wake word was not detected, processing ends at that point.Β 

Enter the issue of mistaken wake words. While language models and processing technologies used by smart speakers are constantly evolving, there are occasions where a smart speaker acts as if a wake word was heard when it simply wasn’t said. Several studies on the topic have been published in recent years. In the case of research from Northeastern University, it was found that dialogue from popular television shows could be interpreted as wake words that trigger recording. For example, their findings cite:Β 

β€œWe then looked at other shows with a similarly high dialogue density (such as Gilmore Girls and The Office) andβ€―found that they also have a high number of activations, which suggests that theβ€―number of activations is at least in part related to theβ€―density of dialogue. However, we have also noticed that if we consider just the amount of dialogue (in a number of words),β€―Narcosβ€―is the one thatβ€―triggers the most activations,β€―even if it has the lowest dialogue density.” 

Of interest is not just the volume of dialogue, but the pronunciation of the dialogue:Β 

β€œWe investigated the actual dialogue that producedβ€―Narcosβ€˜ activations and we have seen that it was mostly Spanish dialogue and poorly pronouncedβ€―English dialogue.β€―This suggests that, in general, words that are not pronounced clearly may lead to more unwanted activations.” 

Research such as this suggests that smart speakers at the time had room for improvement when it comes to properly detect wake words, thus leading to parts of conversation being recorded without the owner intending it. If you own a smart speaker, I wouldn’t be too surprised to hear that you’ve had some issues like that from time to time yourself.Β 

Is someone on the other end of my smart speaker listening to my recordings?Β 

As mentioned above, the makers of smart speakers make constant improvements to their devices and services, which may include the review of commands from users to make sure they are interpreted correctly. There are typically two types of reviewβ€”machine and human. As the names suggest, a machine review is a digital analysis and human reviews entail someone listening to and evaluating a recorded command or reading and evaluating a transcript of a written command.Β 

However, several manufacturers let you exercise some control over that. In fact, you’ll find that they post a fair share of articles about this collection and review process, along with your choices for opting in or out as you wish:Β 

Setting up your smart speaker for better privacyΒ 

The quickest way to ensure a more private experience with your smart speaker is to disable listeningβ€”or turn it off entirely. Depending on the device, you may be able to do this with the push of a button, a voice command, or some combination of the two. This will keep the device from listening for its wake word. Likewise, this makes your smart speaker unresponsive to voice commands until you enable them again. This approach works well if you decide there are certain stretches of the day where your smart speaker doesn’t need to be on call.Β 

Yet let’s face it, the whole idea of a smart speaker is to have it on and ready to take your requests. For those stretches where you leave it on, there’s another step you can take to shore up your privacy.Β Β 

In addition to making sure you’re opted out of the review process mentioned above, you can also delete your recordings associated with your voice commands.Β 

Managing your voice history like this gives you yet one more way you can take control of your privacy. In many ways, it’s like deleting your search history from your browser. And when you consider just how much activity and how many queries your smart speaker may see over the course of days, weeks, and months, you can imagine just how much information that captures about you and your family. Some of it is undoubtedly personal. Deleting that history can help protect your privacy in the event that information ever gets breached or somehow ends up in the hands of a bad actor. Β 

Lastly, above and beyond these privacy tips for your smart speakers, comprehensive online protection will help you look out for your privacy overall. In the case of ours, we provide a full range of privacy and device protection, along with identity theft protection that includes $1M identity theft coverage, identity monitoring, and identity restoration assistance from recovery prosβ€”and antivirus too, of course. Together, they can make your time spent online far more secure.Β 

You’re the smart one in this relationshipΒ 

With privacy becoming an increasingly hot topic (rightfully so!), several companies have been taking steps to make the process of managing yours easier and a more prevalent part of their digital experience. As you can see, there are several ways you can take charge of how your smart speaker uses, and doesn’t use, your voice.Β 

It used to be that many of these settings were tucked away deep in menus, rather than something companies would tout on web pages dedicated to privacy. So as far as smart speakers go, the information is out there, and I hope this article helps make the experience with yours more private and secure.Β Β 

The post Smarter Homes & Gardens: Smart Speaker Privacy appeared first on McAfee Blog.

Tenable's Bit Discovery Buy Underscores Demand for Deeper Visibility of IT Assets

By Robert Lemos, Contributing Writer
The four-year-old firm, started by two industry veterans, focuses on gaining visibility into Internet-facing services as more companies seek insight into what attackers see.

  • April 27th 2022 at 19:36

Coca-Cola Investigates Data-Theft Claims After Ransomware Attack

By Becky Bracken, Editor, Dark Reading
The Stormous ransomware group is offering purportedly stolen Coca-Cola data for sale on its leak site, but the soda giant hasn't confirmed that the heist happened.

  • April 27th 2022 at 18:14

5-Year Vulnerability Trends Are Both Surprising and Sadly Predictable

What 5,800+ pentests show us: Companies have been struggling with the same known and preventable security bugs year over year. Bandwidth stands at the heart of the problem.
  • April 27th 2022 at 14:00

Ransomware Survey 2022 – like the Curate’s Egg, β€œgood in parts”

By Paul Ducklin
You might not like the headline statistics in this year's ransomware report... but that makes it even more important to take a look!

How Industry Leaders Should Approach Open Source Security

By Stephen Nolan, Head of Product, Anaconda
Here's how to reduce security risk and gain the benefits of open source software.

  • April 27th 2022 at 14:00

Log4j Attack Surface Remains Massive

By Jai Vijayan, Contributing Writer
Four months after the Log4Shell vulnerability was disclosed, most affected open source components remain unpatched, and companies continue to use vulnerable versions of the logging tool.

  • April 26th 2022 at 23:52

How Do I Report My Security Program's ROI?

By John Ayers, Vice President of Product, Advanced Detection & Response, Optiv
If security leaders focus on visibility and metrics, they can demonstrate their programs' value to company leadership and boards.

  • April 26th 2022 at 22:57

Tenable Acquires External Attack Surface Management Vendor for $44.5M

By Dark Reading Staff, Dark Reading
Acquisition will add Internet-facing attack surface mapping and monitoring to Tenable's internal asset management products.

  • April 26th 2022 at 22:11

The Ins and Outs of Secure Infrastructure as Code

By Rory McCune, Cloud Native Security Advocate, Aqua Security
The move to IaC has its challenges but done right can fundamentally improve an organization's overall security posture.

  • April 26th 2022 at 20:00

CISA Taps Veteran CISO Bob Lord for Technical Adviser Role

By Dark Reading Staff, Dark Reading
Lord previously spearheaded security for the Democratic National Committee and held leadership roles at companies including Yahoo, Rapid7, and Twitter.

  • April 26th 2022 at 17:50

The XDR Revolution: Threat Detection and Response for All!

By Eric Parizo, Principal Analyst, Omdia
In this webinar replay, Omdia outlines the ways in which XDR facilitates faster and easier threat detection and response, and key points organizations should consider when evaluating XDR technology.

  • April 13th 2022 at 20:51

API Attacks Soar Amid the Growing Application Surface Area

By Robert Lemos, Contributing Writer
With Web application programming interface (API) traffic growing quickly, the average cloud-focused company sees three times more attacks.

  • April 26th 2022 at 17:01

Cyber Conflict Overshadowed a Major Government Ransomware Alert

By Hitesh Sheth, CEO, Vectra
The FBI warns that ransomware targets are no longer predictably the biggest, richest organizations, and that attackers have leveled up to victimize organizations of all sizes.

  • April 26th 2022 at 14:00

Introducing Apostro: A Risk Management Platform for Web3 Security

Apostro's system will monitor all transactions to identify malicious behavior that can cause damage to DeFi protocols.
  • April 26th 2022 at 13:19

SecurityScorecard Launches Cyber Risk Quantification Portfolio

SecurityScorecard's Cyber Risk Quantification portfolio helps customers understand the financial impact of a cyber-attack.
  • April 26th 2022 at 13:14

What the ECDSA Flaw in Java Means for Enterprises

By Dark Reading Staff, Dark Reading
This Tech Tip reminds developers and security teams to check what version of Java they are running. Whether they are vulnerable to the ECDSA flaw boils down to the version number.

  • April 25th 2022 at 23:59

Iranian Hacking Group Among Those Exploiting Recently Disclosed VMware RCE Flaw

By Jai Vijayan, Contributing Writer
Threat actor is using the flaw to deliver Core Impact backdoor on vulnerable systems, security vendor says.

  • April 25th 2022 at 23:36

North Korean State Actors Deploying Novel Malware to Spy on Journalists

By Dark Reading Staff, Dark Reading
Spear-phishing campaign loaded with new "Goldbackdoor" malware targeted journalists with NK News, analysts found.

  • April 25th 2022 at 23:10

When Security Meets Development: The DevSecOps Conundrum

By Srinivas Mukkamala, Senior Vice President, Security Products, Ivanti
The DevSecOps journey is well worth undertaking because it can improve communication, speed up development, and ensure quality products.

  • April 25th 2022 at 22:09

Mastercard Launches Next-Generation Identity Technology with Microsoft

New 'trust' tool improves online experience and helps tackle digital fraud.
  • April 25th 2022 at 19:20

Ukraine Invasion Driving DDoS Attacks to All-Time Highs

By Dark Reading Staff, Dark Reading
Unprecedented numbers of DDoS attacks since February are the result of hacktivists' cyberwar against Russian state interests, researchers say.

  • April 25th 2022 at 18:07

Phishing goes KISS: Don’t let plain and simple messages catch you out!

By Paul Ducklin
Sometimes we receive phishing tricks that we grudgingly have to admit are better than average, just because they're uncomplicated.

Trend Micro Launches New Security Platform

An ecosystem of native and third-party integrations provides visibility and control across the entire attack surface.
  • April 25th 2022 at 15:30

Overlapping ICS/OT Mandates Distract From Threat Detection and Response

By Mark Carrigan, Senior Vice President, Process Safety and OT Cybersecurity, Hexagon PPM
It's time for regulators of critical infrastructure β€” including industrial control systems and operational technology β€” to focus more on operational resiliency.

  • April 25th 2022 at 14:00

Many Medical Device Makers Skimp on Security Practices

By Dark Reading Staff, Dark Reading
Barely over a quarter of medical device companies surveyed maintain a software bill-of-materials, and less than half set security requirements at the design stage.

  • April 22nd 2022 at 22:34

Sophos Buys Alert-Monitoring Automation Vendor

By Dark Reading Staff, Dark Reading
Acquisition of cloud-based alert security company will help Sophos automate tasks bogging down security teams, the company says.

  • April 22nd 2022 at 20:16

FBI Warns Ransomware Attacks on Agriculture Co-ops Could Upend Food Supply Chain

By Dark Reading Staff, Dark Reading
Ransomware groups are looking to strike large agriculture cooperatives during strategic seasons, when they are most vulnerable, according to law enforcement.

  • April 22nd 2022 at 19:32
❌