This head-spinning year is finally drawing to a close. Sure, 2020 will be remembered for all sorts of unforeseen events and difficulties, but it’s presented some cool opportunities as well! As for us, we have been busy expanding our operations — not only in the traditional computer cybersecurity segment, but show more ...
also in related areas such as antidrone and e-commerce systems. If you think the latter is not for us, I beg to differ. For several years now, we have been looking at ways to protect the data of our users and clients not only on their computers and inside our systems, but also in terms of where our technology partners use that data. I’m talking primarily about online platforms for purchasing subscriptions to our products. Of course, each and every partner complies with all payment security standards, privacy laws such as the GDPR, and so forth. But simply following the regulations is not enough for us, as our Global Transparency Initiative demonstrates. We want to set new, higher standards. We want to increase the transparency of the IT business as a whole, and our responsibility for what is entrusted to us. That’s why we invested in Nexway, one of our key partners in the e-commerce market, with a view to building the safest, most ethical, and most open online trading ecosystem possible, optimized in particular for players in the field of cybersecurity. For those hearing the name for the first time, Nexway is a 25-year-old French company that helps businesses in 140 countries sell their products online. Kaspersky has worked with Nexway for many years, and we find the platform’s strength lies in its adaptability to the legal and fiscal realities of each country of operation. We aim to supplement that flexibility with dynamic services and technologies that enable Nexway’s partners to adapt their businesses rapidly to any changes, even such drastic and quick ones as those this year has brought. For existing partners, and especially for security product vendors, a note about our restaurant-style, “open kitchen” concept: You feel safer eating food you’ve seen being properly prepared, right? The same goes for the processing of data and payments. Through certified processes and regular audits, Nexway will be able to demonstrate that it stores and handles all client and subscriber data securely and in full compliance with the law and with partners’ internal policies, no matter how stringent, and that no one (including Nexway itself) uses that data. Put simply, your subscribers are yours only, unless otherwise agreed with the said subscribers. The product of this relationship of trust will be a marketplace optimized for selling privacy and security products — one that buyers and subscribers alike can trust. I want to emphasize that our role is to assist Nexway in bringing that vision to life, not to bring about major organizational changes. Nexway will remain a separate company with its own management, processes, and reporting, in accordance with all European laws and regulations. We will limit our input to technological expertise and strategic direction. We certainly hope Nexway’s partners will continue to collaborate with the company, and that the enhanced level of transparency and openness will attract new ones. Finally, for the record, we have no plans whatsoever to end our partnerships with other e-commerce platforms. The road ahead is full of opportunities and challenges, but as the Global Transparency Initiative shows, meeting them is very worthwhile! The trust of partners and clients is the most valuable currency there is, which is why we are confident of success.
Today marks the 11th anniversary of KrebsOnSecurity! Thank you, Dear Readers, for your continued encouragement and support! With the ongoing disruption to life and livelihood wrought by the Covid-19 pandemic, 2020 has been a fairly horrid year by most accounts. And it’s perhaps fitting that this was also a leap show more ...
year, piling on an extra day to a solar rotation that most of us probably can’t wait to see in the rearview mirror. But it was hardly a dull one for computer security news junkies. In almost every category — from epic breaches and ransomware to cybercrime justice and increasingly aggressive phishing and social engineering scams — 2020 was a year that truly went to eleven. Almost 150 stories here this past year generated nearly 9,000 responses from readers (although about 6 percent of those were on just one story). Thank you all for your thoughtful engagement, wisdom, news tips and support. I’d like to reprise a note from last year’s anniversary post concerning ads. A good chunk of the loyal readers here are understandably security- and privacy-conscious, and many block advertisements by default — including the ads displayed here. KrebsOnSecurity does not run third-party ads and has no plans to change that; all of the creatives you see on this site are hosted in-house, are purely image-based, and are vetted first by Yours Truly. Love them or hate ’em, these ads help keep the content at KrebsOnSecurity free to any and all readers. If you’re currently blocking ads here, please consider making an exception for this site. In case you missed them, some of the most popular feature/enterprise stories on the site this year (in no particular order) included: The Joys of Owning an ‘OG’ Email Account Confessions of an ID Theft Kingpin (Part II) Why and Where You Should Plant Your Flag Thinking of a Career in Cybersecurity? Read This Turn on MFA Before Crooks Do it for You Romanian Skimmer Gang in Mexico Outed by KrebsOnSecurity Stole $1.2 Billion Who’s Behind the ‘Web Listings’ Mail Scam? When in Doubt: Hang Up, Look Up, & Call Back Riding the State Unemployment Fraud Wave Would You Have Fallen for this Phone Scam?
The United States Treasury’s Financial Crime Enforcement Network (FinCEN) asked the financial sector to watch for and report evidence of COVID-19 vaccine fraud, ransomware and other scams.
Microsoft fixed a zero-day vulnerability in June, but the company did a poor job. Security researchers from Google’s Project Zero showed that attackers could still use the zero-day, despite the patch.
Yesterday, Wasabi users suddenly found that they could no longer access their storage buckets hosted on the wasabisys.com domain as one of its endpoints was used to host malware.
Microsoft says that the end goal of the SolarWinds supply chain compromise was to pivot to the victims' cloud assets after deploying the Sunburst/Solorigate backdoor on their local networks.
The Voyager crypto brokerage platform halted trading yesterday after suffering an attack targeting their DNS configuration. It was later disclosed that an attack was conducted against the platform.
Hackers installed keylogger and copied NZBGeek database exposing personal details of all users. While operating smoothly, as the site normally does, suddenly the site became unreachable.
"Recently, offenders have been using victims' smart devices, including video and audio capable home surveillance devices, to carry out swatting attacks," the FBI said in a PSA published today.
Though some researchers say that the scale and severity of ransomware attacks crossed a bright line in 2020, others describe this year as simply the next step in a gradual and predictable devolution.
The college has become aware of a data security incident that may have involved the personal information of certain community members. It is offering complimentary credit monitoring services to them.
More than 4 in 10 firms in North America use out-of-date technology and lose nearly 50% more money in a data breach than companies running updated software and hardware, a new Kaspersky report said.
In almost 44% of cases, developers of computer programs fix discovered vulnerabilities in products from the point of view of information security only after three months due to slow software updates.
Limited visibility into complex cloud infrastructure makes it harder for CISOs to monitor and report on risk profiles; and compliance efforts can’t keep up with the cloud’s fast development cycle.
The attack took place on the General Medical Laboratory (AML) in the Antwerp district of Hoboken. Hackers installed ransomware on the lab’s website, bringing it to a standstill.
GenRx Pharmacy, a Scottsdale, Arizona-based healthcare organization, has warned hundreds of thousands of patients over a potential data breach following a ransomware attack earlier this year.