Submit a link
Start a discussion
  • Current Event
    6 years ago
    by rexall
    +1 +1

    Mysterious Hackers Hid Their Swiss Army Spyware for 5 Years

    IT'S NOT EVERY day that security researchers discover a new state-sponsored hacking group. Even rarer is the emergence of one whose spyware has 80 distinct components, capable of strange and unique cyberespionage tricks—and who's kept those tricks under wraps for more than five years.

  • Current Event
    6 years ago
    by roxxy
    +34 +1

    Another scandal: Facebook user data reportedly at risk again

    In what seems like a broken record, Facebook is facing another scandal related to the transparency of its user data. The UpGuard cybersecurity firm reports that it uncovered two cases in which massive buckets of third-party Facebook app data were left exposed on the public internet. In one such case, a Mexico-based media company named Cultura Colectiva amassed 146 gigabytes of data with more than 540 million records. The records are said to include user comments, likes, reactions, account names, Facebook IDs and more.

  • Current Event
    6 years ago
    by rawlings
    +4 +1

    These are the most insecure programming languages

    From top to bottom, technology is riddled with security errors. At the lowest level, we have hardware errors such as Intel's Meltdown and Spectre bugs. Just above those, we have programming language security holes, and boy, do we have a lot of those! WhiteSource, an open-source security company, recently did a study of open source security vulnerabilities in the seven most widely used languages over the past decade.

  • Current Event
    6 years ago
    by junglman
    +10 +1

    Hacking firm NSO battles abuse claims with PR and Google ads

    Since it began selling its powerful smartphone spyware to governments in 2011, the Israeli cyber-intelligence firm NSO Group has cultivated an air of strict secrecy befitting its image as a haven for ex-military hackers. The company has tried to change its name multiple times, and when a Fast Company reporter called an NSO office in 2017, the man who answered said they didn’t speak to journalists, and hung up.

  • Current Event
    6 years ago
    by kong88
    +7 +1

    Saudis gained access to Amazon CEO Bezos' phone: Bezos' security chief

    The security chief for Amazon chief executive Jeff Bezos said on Saturday that the Saudi government had access to Bezos’ phone and gained private information from it. Gavin De Becker, a longtime security consultant, said he had concluded his investigation into the publication in January of leaked text messages between Bezos and Lauren Sanchez, a former television anchor who the National Enquirer tabloid newspaper said Bezos was dating.

  • Current Event
    6 years ago
    by geoleo
    +18 +1

    Protecting Your Internet Accounts Keeps Getting Easier. Here’s How to Do It.

    When Facebook revealed last week that it had stored millions of people’s account passwords in an insecure format, it underlined the importance of a security setting that many of us neglect to use: two-factor authentication. That might sound like a mouthful, but it has become essential for our digital protection. What it stands for is basically two steps to verify that you are who you say you are, so that even if a password falls into the hands of the wrong people, they cannot pretend to be you.

  • Analysis
    6 years ago
    by 66bnats
    +33 +1

    Hacker fakes German minister's fingerprints using photos of her hands

    Jan Krissler used high resolution photos, including one from a government press office, to successfully recreate the fingerprints of Germany’s defence minister

  • Current Event
    6 years ago
    by zobo
    +25 +1

    DDoS attacks may cost the UK economy £1bn per year

    Distributed Denial of Service (DDoS) attacks may now cost the UK economy up to £1bn each year, representing a serious financial burden to businesses. A DDoS attack is when a network is flooded with more traffic than it can handle, meaning that it cannot be used. These attacks are often carried out using botnets, vast networks of internet-connected devices infected with malware.

  • Current Event
    6 years ago
    by grandtheftsoul
    +12 +1

    Tesla car hacked at Pwn2Own contest

    Research duo who hacked Tesla car win the competition's overall standings. They also get to keep the car.

  • Current Event
    6 years ago
    by junglman
    +34 +1

    A Russian 'troll slayer' went undercover at a troll factory and found that hundreds of Russians were working as paid trolls in rotating shifts

    The operation was run by a local restauranteur who was placed under US sanctions for attempting to interfere with US elections. Slaying online trolls can be a lonely business. Just ask Russia's Lyudmila Savchuk, who first exposed the story of Russia's disinformation campaign back in 2014. The journalist and 33-year-old mother of two, Savchuk started noticing websites and social media accounts attacking local opposition activists in her hometown of Saint Petersburg with a frequency she hadn't seen before.

  • Analysis
    6 years ago
    by estherschindler
    +16 +1

    5 cybersecurity mistakes companies keep making

    A data breach is almost inevitable because we continue to make the same security mistakes. Here are five of the bigs ones, according to experts, and why you simply have to fix them.

  • Current Event
    6 years ago
    by geoleo
    +18 +1

    Web in 'downward plunge', says its creator

    Global action is required to tackle the web's "downward plunge to a dysfunctional future", its inventor Sir Tim Berners-Lee has told the BBC. He made the comments in an exclusive interview to mark 30 years since he submitted his proposal for the web. Sir Tim said people had realised how their data could be "manipulated" after the Cambridge Analytica scandal.

  • Current Event
    6 years ago
    by cone
    +4 +1

    Huawei says it would never hand data to China's government. Experts say it wouldn't have a choice

    Huawei would have no choice but to hand over network data to the Chinese government if Beijing asked for it, because of espionage and national security laws in the country, experts told CNBC. Major governments including the United States, Japan and Australia have blocked the Chinese telecommunications equipment maker from providing hardware for next-generation mobile networks known as 5G. The U.S. has said Huawei equipment could provide backdoors for the Chinese government into American networks — a claim the company has repeatedly denied.

  • Current Event
    6 years ago
    by ppp
    +12 +1

    Machine Learning Can Use Tweets to Spot Critical Security Flaws

    At the endless booths of this week's RSA security trade show in San Francisco, an overflowing industry of vendors will offer any visitor an ad nauseam array of "threat intelligence" and "vulnerability management" systems. But it turns out that there's already a decent, free feed of vulnerability information that can tell systems administrators what bugs they really need to patch, updated 24/7: Twitter. And one group of researchers has not only measured the value of Twitter's stream of bug data but is also building a piece of free software that automatically tracks it to pull out hackable software flaws and rate their severity.

  • Current Event
    6 years ago
    by Pfennig88
    +4 +1

    Triton is the world’s most murderous malware, and it’s spreading

    As an experienced cyber first responder, Julian Gutmanis had been called plenty of times before to help companies deal with the fallout from cyberattacks. But when the Australian security consultant was summoned to a petrochemical plant in Saudi Arabia in the summer of 2017, what he found made his blood run cold.

  • Current Event
    6 years ago
    by TNY
    +29 +1

    Where Has All the Ransomware Gone?

    In the world of digital thievery, a business model pivot is apparently underway. Over the past year cybercriminals have shifted their focus from ransomware attacks to so-called cryptojacking. That’s the marquee finding out of a new threat report published by IBM this week: Instances of the former money-making scheme were down 45% in 2018, while occurrences of the latter surged 450% in the same timespan, per IBM’s data.

  • Current Event
    6 years ago
    by socialiguana
    +14 +1

    As Trump and Kim Met, North Korean Hackers Hit Over 100 Targets in U.S. and Ally Nations

    North Korean hackers who have targeted American and European businesses for 18 months kept up their attacks last week even as President Trump was meeting with North Korea’s leader in Hanoi. The attacks, which include efforts to hack into banks, utilities and oil and gas companies, began in 2017, according to researchers at the cybersecurity company McAfee, a time when tensions between North Korea and the United States were flaring.

  • Current Event
    6 years ago
    by hiihii
    +14 +1

    US reportedly took Russian trolls offline on Election Day in 2018

    The US agency responsible for military cyber operations cut off internet connectivity at the Internet Research Agency in Russia on the day of the 2018 midterm elections, according to a report in The Washington Post on Tuesday. The US Cyber Command "basically took the IRA offline," according to an unnamed source that spoke with the Post.

  • Current Event
    6 years ago
    by ticktack
    +24 +1

    Huawei: “The US security accusation of our 5G has no evidence. Nothing.”

    Huawei’s rotating chairman Guo Ping kicked off a keynote speech this morning at the world’s biggest mobile industry tradeshow with a wry joke. “There has never been more interest in Huawei,” he told delegates at Mobile World Congress. “We must be doing something right!” The Chinese company is seeking to dispel suspicion around the security of its 5G network equipment which has been accelerated by U.S. president Trump who has been urging U.S. allies not to buy kit or services from Huawei. (And some, including Australia, have banned carriers from using Huawei kit.)

  • Current Event
    6 years ago
    by jasont
    +9 +1

    Major security issues found in popular password managers

    A new report suggests that password managers aren’t quite as secure as you might first think, and they contain some worrying flaws on the security front, including – in some cases – storing the master password for the app in the PC’s memory in a plaintext form. First off, though, before everybody starts hitting the panic button and considering uninstalling their password manager program, let’s clarify that the security researchers behind this report still advocate the use of these applications.