2020 Predictions: Interest In Secure Design Practices Is Increasing Leading To Two Predictions
VMblog – There exists a trend towards heightened awareness in secure design practices, particularly, the attack and defense analysis technique, threat modeling. This trend implies two predictions for 2020 and beyond. First, security practitioners will need to understand DevOps software development practices to ensure that security can be designed into software from the start within a DevOps process. DevOps offers developers enormous productivity and operational gains.
How To Secure Your iPhone: 12 Experts Reveal 26 Essential Security Tips
Forbes – Just because you’ve invested in a smartphone that isn’t exposed to quite the same degree of malware and exploit issues as an Android device, that doesn’t mean you can safely ignore good practice when it comes to iPhone security. This is why I’ve asked 12 security experts to share their knowledge as far as keeping your iPhone secure is concerned. Here are their 26 tips to help you do just that.
We shall not pay the ransom, Johannesburg tells hackers
Coingeek – We shall not pay the ransom. This is the message that the city of Johannesburg in South Africa has for hackers who breached their systems. The hackers demanded 4 BTC, worth about $30,000, threatening to leak sensitive information if their demands were not met. They even gave the city a deadline. However, Joburg isn’t about to surrender to the crooks, despite admitting that some of its most crucial systems had been hit.
City of Johannesburg, on Second Hit, Refuses to Pay Ransom
ThreatPost – The city of Johannesburg, South Africa, is refusing to pay a ransom of four Bitcoins to a hacker group who accessed the city’s network and stole sensitive data, threatening to release it if the ransom wasn’t paid. It’s the second time in several months that the city has been hit with a cyberattack demanding ransom. In July, a ransomware attack on Johannesburg’s City Power, which is owned by the city itself, left some residents without electricity for days.
Scientists reveal the 13 dark technology scenarios that keep them up at night
Business Insider – Deepfakes are sophisticated video forgeries in which AI tools can replace people’s faces in a video. For the most part, deepfakes are malicious, often used to fabricate videos like revenge porn. The technology — which is already free and easy to use — is only getting better. Matt Rahman, COO of the computer security company IOActive, said he is especially interested in the dangers of deepfakes. “In a few years, you won’t be able to tell what’s fake,” he said, because such video will be indistinguishable from reality.