Doug Olenick SC Media | Page 2 of 168

Doug Olenick

Online Editor

Most recent articles by Doug Olenick

User-Friendly Security Solutions Simplify Protection of Enterprise Email Communications

By

By Jason Soroko, CTO of IoT, Sectigo According to the FBI, business email compromise (BEC) attacks have resulted in $12 billion in losses since 2013, and global exposed losses increased 136 percent between December 2016 and May 2018, making it imperative for enterprises to protect employees from phishing scams. Posing as legitimate employees, servers, or…

Unauthorized intruder preys on Bayside Covenant Church

By

The Bayside Covenant Church of Roseville, Calif. reported that for three months last year unauthorized personnel accessed some employee information. In a statement, the church said access was gained to certain email accounts through a still unknown means, from Aug. 3, 2018 to Oct. 20, 2018. The information exposed included names, addresses, Social Security Numbers,…

wifi

Marvell Avastar SoCs vulnerable to Wi-Fi attack

By

The Software Engineering Institute CERT/CC has issued an advisory note on a vulnerability (CVE-2019-6496) in Marvell Avastar wireless system on a chip (SoC) models. The affected SoC models – 88W8787, 88W8797, 88W8801, and 88W8897 – can suffer an overflow condition, resulting in overwriting certain block pool data structures due to a block pool memory overflow,…

Google says it is not a flaw that passwords saved in its web browser can be viewed in plain text.

Google adds Password Checkup Chrome extension

By

Google has rolled out a new Chrome extension that will inform users if their passwords have been compromised. The service, which was introduced as part of Google’s Safer Internet Day offerings, is called Password Checkup. The Chrome extension checks a person’s username and password against a list of four billion credentials that are known to…

Setting up for success when buying cyber insurance

By

When is a war really a not a war, at least as far as an insurance company is concerned? That is the question the cybersecurity and insurance industries are likely to find out at the conclusion of a court case between Zurich International and the U.S. food company Mondelez International, one of the many firms…

trojanhorse_1032765

IcedID banking trojan now used against online retailers

By

The malicious actors behind the IcedID banking trojan have branched out and are now using the malware to steal payment card credentials from online retailers and may have even become malware-as-a-service dealers. The e-tailer attacks began in November 2018 and instead of grabbing customer banking information, IcedID is used to grab credentials and payment card…

Safer Internet Day 2019 offers array of educational programs

By

Safer Internet Day 2019 kicks off today with a worldwide schedule of events to help make the internet a safer environment, and this is certainly needed as a recent poll indicates many people still make poor choices when it comes to protecting themselves online. Behind the slogan “Together for a better internet”, the day’s organizer…

Measuring cyber risk

By Ryan Stolte, co-founder and CTO, Bay Dynamics How do you measure risk? This is the reigning million-dollar question in infosec. We don’t have a clearcut answer to this question and that can make deciding what actions to take to improve the security of the organization a real challenge for many teams. We are, as…

Next post in Opinion