-
+19 +1How to Share Files Securely Online: Dropbox, Firefox Send, and More
You've got no shortage of options sharing documents and more with friends, family, and colleagues. These are your best bets.
-
+19 +1Antivirus company shuts down its data-harvesting arm after getting caught red-handed
Its CEO claims that the data collection was legal.
-
+28 +1Microsoft says North Korea-based hackers were stealing sensitive information
Microsoft said it won a court order that allowed the tech giant to take control of 50 websites that a North Korea-linked hacking group was using to carry out cyberattacks.
-
+31 +1CIA developed tech to restrict anti-aircraft missiles given to allies, researcher says
The CIA developed technology to restrict anti-aircraft missiles once they are given to allies, a Dutch researcher said according to a Reuters report. The researcher, Jos Wetzel, said at a cybersecurity conference in Germany over the weekend that the technology would be used for shoulder-fired missiles called Man-Portable Air-Defense Systems (MANPADS). This could convince U.S. officials to distribute these weapons more often, Reuters reported.
-
+19 +1Ransomware: The number of victims paying up is on the rise, and that's bad news
The number of organisations that are giving into the extortion demands of cyber criminals after falling victim to ransomware attacks has more than doubled this year.
-
+25 +1Apple's bug bounty program now open to all; pays up to $1.5M
As first promised back in August, Apple’s bug bounty program is now open to all. It was previously an invitation-only initiative, which attracted criticism as it incentivized non-invitees to sell vulnerability details to companies and governments who would exploit them to gain unauthorized access to Apple devices…
-
+15 +1Locked iPhones still allow access to email credentials and more
Elcomsoft, a company which sells tools to law enforcement agencies to access locked iPhones, says that it is now able to extract some data from devices running any version of iOS from 12.0 to 13.3. It relies on the checkm8 exploit of a vulnerability present in most A-series chips, which made possible the Checkra1n jailbreak. Crucially, Elcomsoft says that the $1,495 tool works even when the iPhone is in its most secure state, known as BFU…
-
+3 +1Iran 'foils second cyber-attack in a week'
Iran has foiled a second cyber-attack in under a week, the country's telecommunications minister says. Mohammad Javad Azari-Jahromi said the attack had targeted Iranian electronic government systems. The minister did not give details. A similar claim was made about Wednesday "massive" attack.
-
+28 +1Evernote Gave Dark Web Dealer’s Notes to the DEA
As part of a dark web investigation, Evernote handed over a suspect's notes stored on the company's servers.
-
+28 +1Hackers Find Ways Around a Years-Old Microsoft Outlook Fix
Microsoft patched a vulnerability in Microsoft Outlook in 2017. It hasn't slowed hackers down.
-
+30 +1146 New Vulnerabilities All Come Preinstalled on Android Phones
When you buy an Android smartphone, it’s rarely pure Android. Manufacturers squeeze in their own apps or give it a fresh coat of interface. Carriers do it too. The resulting stew of preinstalled software and vanilla Android sometimes turns out to be rancid, putting flaws and vulnerabilities on the phone before you even take it out of the box. For proof of how bad it is, look no further than the 146 vulnerabilities—across 29 Android smartphone makers—that have just been simultaneously revealed.
-
+16 +1Stalking software is 'on the rise'
Amy says it all started when her husband seemed to know intimate details about her friends. "He would drop snippets into conversations, such as knowing about Sarah's baby. Really private things that he shouldn't have known about. If I asked how he knew these things, he'd say I'd told him and accuse me of losing it," she says. Amy - not her real name - also began to wonder how he seemed to know where she was all the time.
-
+16 +1NordVPN confirms it was hacked
NordVPN, a virtual private network provider that promises to “protect your privacy online,” has confirmed it was hacked. The admission comes following rumors that the company had been breached. It first emerged that NordVPN had an expired internal private key exposed, potentially allowing anyone to spin out their own servers imitating NordVPN.
-
+21 +1Malware That Spits Cash Out of ATMs Has Spread Across the World
At 10am on a late November morning in Freiburg, Germany, a bank employee noticed something was wrong with a bank ATM. It had been hacked with a piece of malware called "Cutlet Maker" that is designed to make ATMs eject all of the money inside them, according to a law enforcement official familiar with the case.
-
+25 +1Hackers Hit Click2Gov Bill-Paying Portals in 8 Cities
In 2017 and 2018, hackers compromised systems running the Click2Gov self-service bill-payment portal in dozens of cities across the United States, a feat that compromised 300,000 payment cards and generated nearly $2 million of revenue. Now, Click2Gov systems have been hit by a second wave of attacks, dumping tens of thousands of records onto the dark web, researchers said on Thursday.
-
+15 +1The Air Force Will Let Hackers Try to Hijack an Orbiting Satellite
When the Air Force showed up at the Defcon hacker conference in Las Vegas last month, it didn’t come empty-handed. It brought along an F-15 fighter-jet data system—one that security researchers thoroughly dismantled, finding serious vulnerabilities along the way. The USAF was so pleased with the result that it has decided to up the ante. Next year, it’s bringing a satellite.
-
+19 +1Hackers Hit Twitter C.E.O. Jack Dorsey in a ‘SIM Swap.’ You’re at Risk, Too.
When hackers took over the Twitter account of Twitter’s chief executive, Jack Dorsey, last week, they used an increasingly common and hard-to-stop technique that can give them complete access to a wide array of the most sensitive digital accounts, including social media, email and financial accounts.
-
+16 +1Apple takes flak for disputing iOS security bombshell dropped by Google
Apple is taking flak for disputing some minor details of last week’s bombshell report that, for at least two years, customers' iOS devices were vulnerable to a sting of zeroday exploits, at least some of which were actively exploited to install malware that stole location data, passwords, encryption keys, and a wealth of other highly sensitive data.
-
+18 +1Google Outlines iPhone Vulnerabilities That Let Malicious Websites Steal User Data for Years, Now Fixed
Google's Project Zero published a blog post this week about a previous security threat wherein malicious websites quietly hacked into the victim's iPhone. This small collection of hacked websites were used in what was described as "indiscriminate" attacks against unsuspecting visitors for years, but the threat has been addressed by Apple.
-
+27 +1China's hackers are ransacking databases for your health data
In May 2017, the WannaCry ransomware spread around the globe. As the worm locked Windows PCs, the UK's National Health Service quickly ground to a halt. 19,000 appointments were cancelled, doctor's couldn't access patient files and email accounts were taken offline.
Submit a link
Start a discussion




















