-
+21 +1U.S. cybersecurity agency warns of 'grave' threat from hack
The federal government’s top cybersecurity agency issued its most urgent warning yet about a sophisticated and extensive computer breach, saying Thursday that it posed a “grave risk” to networks maintained by governments, utilities and the private sector and could be difficult to purge.
-
+20 +1Watch This Google Hacker Pwn 26 iPhones With a 'WiFi Broadcast Packet of Death'
A Google security researcher found bugs that allowed him to take over nearby iPhones with a Raspberry Pi and just $100 in WiFi gear.
-
+26 +1Google Messages end-to-end encryption launching in beta, coming soon to all
Today, Google announced an update on the rollout of rich communication services (RCS) for its official Messages app. RCS support — which Google markets as Chat — is now available around the world for everyone who uses the app. That means you can access RCS features regardless of your phone or carrier. The only stipulation is that the person(s) with whom you are communicating also must have Chat active within Messages.
-
+26 +1Rising threat of data breaches among enterprises drives growth in network security revenue
Key factors leading to the growth of network security market revenue in the Asia Pacific region includes instances of ransomware attacks, targeted attacks and phishing.
-
+8 +1Application Trust is Hard, but Apple does it Well
On November 12, 2020 Apple released macOS Big Sur. In the hours after the release went live, somewhere in Apple's infrastructure an Online Certificate Status Protocol (OCSP) responder cried out in pain, dropping to its knees, begging for mercy as load increased beyond what it could handle.
-
+24 +1Hackers can use just-fixed Intel bugs to install malicious firmware on PCs
As the amount of sensitive data stored on computers has exploded over the past decade, hardware and software makers have invested increasing amounts of resources into securing devices against physical attacks in the event that they’re lost, stolen, or confiscated. Earlier this week, Intel fixed a series of bugs that made it possible for attackers to install malicious firmware on millions of computers that use its CPUs.
-
+16 +1Google’s Project Zero discloses Windows 0day that’s been under active exploit
Security flaw lets attackers escape sandboxes designed to contain malicious code.
-
+23 +1Zoom’s end-to-end encryption has arrived
Zoom’s end-to-end encryption (E2EE) has arrived, letting both free and paid users secure their meetings so that only participants, not Zoom or anyone else, can access their content. Zoom says E2EE is supported across its Mac, PC, iOS, and Android apps, as well as Zoom Rooms, but not its web client or third-party clients that use the Zoom SDK.
-
+4 +1Microsoft takes down massive hacking operation that could have affected the election
Microsoft has disrupted a massive hacking operation that it said could have indirectly affected election infrastructure if allowed to continue. The company said Monday it took down the servers behind Trickbot, an enormous malware network that criminals were using to launch other cyberattacks, including a strain of highly potent ransomware.
-
+21 +1Apple’s T2 security chip has an unfixable flaw
A recently released tool is letting anyone exploit an unusual Mac vulnerability to bypass Apple's trusted T2 security chip and gain deep system access. The flaw is one researchers have also been using for more than a year to jailbreak older models of iPhones. But the fact that the T2 chip is vulnerable in the same way creates a new host of potential threats. Worst of all, while Apple may be able to slow down potential hackers, the flaw is ultimately unfixable in every Mac that has a T2 inside.
-
+22 +1A Patient Dies After a Ransomware Attack Hits a Hospital
The outage resulted in a significant delay in treatment. German authorities are investigating the perpetrators on suspicion of negligent manslaughter.
-
+4 +1Biden Campaign Firm Hit by Suspected Kremlin Hacking Attack
Intelligence officials have long been warning that Russian agents will inevitably try to interfere in the 2020 campaign—now some appear to have been caught targeting a key Biden campaign firm. Reuters reported Thursday morning that suspected Russian state-backed hackers have attempted to breach the systems at Washington-based SKDKnickerbocker, a strategy and communications firm working hand-in-glove with Joe Biden’s campaign. The attacks, which took place over the past two months, were unsuccessful.
-
+26 +1Most cyber-security reports only focus on the cool threats
Academics: Only 82 of the 629 commercial cyber-security reports (13%) published in the last decade discuss a threat to civil society, with the rest focusing on cybercrime, nation-state hackers, economic espionage.
-
+21 +1A Florida Teen Allegedly Shut Down School With a DDoS Attack
With the presidential election fast approaching, recent moves by the Trump administration appear designed to undermine the security and integrity of the vote. And that's not even counting the long-standing Postal Service shenanigans. Facebook rolled out a series of measures this week designed to minimize how much it contributes to the problem, including message-forwarding limits that have already helped WhatsApp fight misinformation.
-
+4 +1How Russian Spy Submarines Can Interfere With Undersea Internet Cables
America and the West’s dependency on undersea internet cables could be a strategic vulnerability. It is the consequence of both geography and the rise of the international digital economy. Russia, by comparison, doesn’t rely on the cables as much, and it has a substantial fleet of spy submarines designed to operate on them.
-
+21 +1Flaws Could Have Exposed Cryptocurrency Exchanges to Hackers
Researchers found troubling bugs in open-source libraries used by financial institutions.
-
+24 +1Twitter Hackers Used 'Phone Spear Phishing Attack' to Pull Off Bitcoin Scam
According to the company, a small number of employees were targeted in a "phone spear phishing attack," suggesting that hackers called some of its staff and duped them into thinking they were speaking with fellow Twitter employees, leading them to reveal the credentials the hackers needed to access internal account support tools.
-
+17 +1Williams Racing Needs World-Class Performance On The Track And Security
When everything is measured in microseconds, nothing can be allowed to slow the action down, not even the security required to protect the data systems of the legendary William Racing team. "Every week or two the entire racing team locates to another track, and takes their mobile data center with them." And they have to keep it secure. Here's how they do it.
-
+14 +1Twitter says hackers downloaded data from up to 8 accounts
The data could have included direct messages and other information. Twitter said these accounts were not verified.
-
+19 +1How to Stay Safe from Cyber Attacks?
It is common knowledge that we are constantly at risk from cybercriminals trying to get access to our private data.
Submit a link
Start a discussion




















