It's no secret that cyberattacks have been on the rise lately, but a series of failures today may raise some eyebrows. The United States, Canada, and the United Kingdom have all experienced critical service disruptions today, and the root causes are still under investigation.
The United Kingdom’s postal service...Read more...
This week, the Northern District of California court is considering whether to let a lawsuit filed against Google continue as a class action lawsuit. The suit in question is seeking statutory damages on behalf of millions of Google Chrome users, claiming that Google misled users of Chrome’s Incognito mode into a false...Read more...
Plex, a company that provides media streaming solutions, sent out emails early this morning informing users of a data breach. According to the notice, Plex launched an investigation yesterday after discovering suspicious activity on one of its databases. The investigation revealed that a third-party actor managed to...Read more...
If we’ve learned anything from reporting on phishing attacks, it’s that no company, organization, or institution is immune from becoming the victim of one. Even the US Department of Defense recently fell victim to a $23.5 million phishing scam. If anything, larger organizations simply make for larger and more...Read more...
The only real certainties in life are death, taxes, and scammers trying to swindle you out of your money. In the digital age, that means phishing scams run rampant, as it's a relatively low effort and potentially high reward ruse. Some efforts are more convincing than others, perhaps such as the one that is targeting...Read more...
In the past year, the increase of malware-as-a-service has spurred significant growth of ransomware, phishing, and information theft attacks. Recently, Zscaler ThreatLabz researchers came across “BlackGuard,” a sophisticated information stealer advertised for sale on Russian hacking forums with a lifetime price of...Read more...
Server admins and security-heads take note: there's a new Windows zero-day that's like leaving the key in the lock. It just requires access to any standard user account, and provides administrative privileges with the execution of a single application. There's pretty much no defense against it as it stands, so keep...Read more...
Cloud-based additions to mobile apps have become commonplace, but they are not always the best thing for consumers or developers. According to new research, by either misconfiguration or simple lack of security best practices, some mobile app developers have left the personal data of over 100 million people at...Read more...
When it comes to password management, users really have just a handful of options, and all of them have their caveats. If we choose to just use memorable passwords and recycle them between accounts, one account becoming compromised can lead to a group of them being in a bad state. On the other hand, relying on a cloud...Read more...
Information scraping campaigns are becoming more prevalent, it seems, with LinkedIn recently losing data for 500m million users. Facebook also faced a similar issue with its phone contact search feature, which allowed malicious parties to collect over 500 million users' information. Another company, called Q Link...Read more...
Nearly every device on the market relies on firmware and many devices include multiple components with their own firmware. Manufacturers and developers have begun to focus on protecting system firmware from potential attackers, but peripheral firmware often receives very little attention. Security researchers at...Read more...
Malware is getting sneakier, as Kaspersky researchers just discovered “Titanium”, a trojan backdoor malware. This malware is very difficult to detect and includes various stages.
Titanium is currently being used by the Advanced Persistent Threat (APT) actor “Platinum”. Platinum is considered one of the most...Read more...
You may not realize it, but your heart is unique. Not only that, but what makes it unique to you is something the Pentagon can now detect from over 200 yards away with a frickin' laser beam. It's not attached to a shark (sorry, Dr. Evil), but the prototype laser, called Jetson, is impressive nonetheless.
Why...Read more...
Tesla builds one of the most tech-infused cars on the roads today. Not only are Tesla vehicles packed with features but they also offer over-the-air updates with new features, fixes and optimizations. Tesla was able to get the price of the Model 3 down to the long-anticipated $35,000 late last month, but a team of...Read more...
It is bad practice to use the same password for multiple accounts, because even if only one of them is compromised in a security breach, then all of the accounts are compromised. That is where password managers like LastPass come in handy. Are they truly secure, though? A new report sheds light on the shortcomings of...Read more...
Last year was a big year for hacks of high profile services like Facebook. In late 2018, Facebook announced that a hack had occurred that left the private messages of 81,000 accounts up for sale. Now, photography website 500px has announced that it was hacked last year and that at least some data on all of its users...Read more...
Privacy is a big deal for many people around the world and many of the devices that we use do a poor jobs of protecting our data. Amazon, for instance, has been in hot water for sharing Alexa data and voice recordings with other users by mistake. Major tech firms have been caught up in privacy issues, particularly...Read more...
Panera Bread knows how to make a delicious sandwich, that is something we can confidentially say (The Italian is this editor's go-to item on the menu). Unfortunately, it might not be as good with security. Security researcher Brian Krebs with KrebsOnSecurity says Panera Bread's website leaked millions of customer...Read more...
Election hacking is a real concern these days, and Microsoft recently helped cripple Russian hacking group called "Fancy Bear" after the group pulled off the DNC hack last year. A group of hackers at DEF CON 2017 had a bunch of voting machines to play with and they found some exploits that could allow potential...Read more...
Over the past few years, one of the most prevalent types of malware has been ransomware - an infection that automatically locks down your sensitive data, and then makes you buy it back with your hard-earned cash. In May, one of the hardest-hitting ransomware strikes occurred, via the appropriately named WannaCry. Now...Read more...
Malware writers continue to find ways to make themselves out to be bigger scumbags than they already are. The latest dirty trick by the worst the web has to offer is a new twist on ransomware. Instead of simply encrypting the files on an infected PC and demanding a ransom in order to decrypt them, a variant called...Read more...
Law enforcement officials found a way to unlock a murder victim's Samsung Galaxy S6 by using specially printed copies of fingerprints on file from a previous conviction. It wasn't easy thwarting Samsung's biometric security, but with the help of Anil Jain, a professor of computer science and engineering at Michigan...Read more...