In Other News: LastPass Vault Hacking, Russia Targets Ukraine Energy Facility, NXP Breach
Noteworthy stories that might have slipped under the radar: LastPass vault hacking, Russia targets energy facility in Ukraine, NXP data breach. The post In Other News: LastPass Vault Hacking, Russia Targets Ukraine Energy Facility, NXP Breach appeared first on SecurityWeek. more…New Malicious Clicker found in apps installed by 20M+ users
Authored by SangRyol Ryu Cybercriminals are always after illegal advertising revenue. As we have previously reported, we have seen many mobile malwares masquerading as a useful tool or utility, and automatically crawling ads in the background. Recently the McAfee Mobile Research Team has identified new Clicker malware that sneaked into Google Play. In total 16 […] more…How to Stay One Step Ahead of Hackers
Whether using the internet for play or work, you want to spend your time online enjoying the peace of mind that comes with having a secure network. You don’t want to contend with someone taking your personal data — whether it’s credit card information, passwords, or bank account details — via malware or a data […] more…Potentially Malicious Apps Your Kids May Use
It’s a question I get several times a year from anxious parents, either via a direct message, an email or even in line at the grocery store. It goes something like this: “What’s the one thing you wish you’d done better when monitoring your kids’ technology?” Both of my kids are now young adults, and together, we survived a handful of digital mishaps. So, I tend to have a few answers ready. I’ll go into one of […] more…Is WhatsApp Safe for Kids? Here’s What Parents Need to Know
We may be talking about the TikTok app in our public circles, but there’s another app — just as widely used — that kids are hoping parents’ won’t ask too many questions about. That’s because they can use the messaging app WhatsApp to talk privately with friends, exchange content and videos, and (hopefully) fly under […] more…Apple, Google Say Users Protected Against CIA Exploits
Apple and Google are confident that a majority of the vulnerabilities disclosed by WikiLeaks as part of the “Vault 7” release, which focuses on the hacking tools allegedly used by the U.S. Central Intelligence Agency (CIA), do not affect the latest versions of their products. read more more…CHIPSEC Support against Vault 7 disclosure scanning
Following recent WikiLeaks Vault 7 disclosures, including details regarding the firmware vulnerabilities, there has been significant concern regarding the integrity of devices and operating systems used within society. In addition, there was reference to a vulnerability related to the Intel Security stinger. First, we can confirm that the stinger tool issue is no longer present […] more…"Vault 7" Leak Shows CIA Learned From NSA Mistakes
WikiLeaks’ “Vault 7” release appears to confirm that the U.S. National Security Agency (NSA) was behind the threat actor tracked as the “Equation Group.” Documents also show that the Central Intelligence Agency (CIA) learned from the NSA’s mistakes after its activities were exposed by security researchers. read more more…WikiLeaks Releases Details on CIA Hacking Tools
WikiLeaks revealed on Tuesday that it has obtained thousands of files allegedly originating from a high-security network of the U.S. Central Intelligence Agency (CIA). The leak, dubbed “Vault 7,” apparently exposes the CIA’s vast hacking capabilities. read more more…CRYPVAULT: New Crypto-ransomware Encrypts and “Quarantines” Files
We uncovered a new crypto-ransomware variant with new routines that include making encrypted files appear as if they were quarantined files. These “quarantined” files are appended by a *.VAULT file extension, an antivirus software service that keeps any deleted files for a certain period of time. Antivirus software typically quarantines files that may potentially cause further damage to […] more…Hackers are Cashing in on Instagram Likes
They say popularity has its price. This saying holds a new weight when it comes to the growing influence of social media. In fact, your “Likes” may be worth more to hackers than your credit card number. As counterintuitive as it may seem, your social clout has become the new target of hackers. And they’re […] more…Not so Hack-tastic: Cyber Scams Cost Banks, and You, Millions
This year may just be deemed the era of the cyber security breach, with scores of online attacks running up millions of dollars in damages to a number of financial institutions. The tactics used range from revenge-focused “hacktivism” to illicit credit card scandals—a variety of scams that emphasize just how important it is to use […] more…Are Your Kids Using Vault Apps to Hide Photos, Chats, or Videos?
A number of apps for both the Android and iPhone exist that are great for storing your personal “gems,” those pieces of digital data you want to keep under lock and key on your smart phone. The apps store data such as logins and passwords, private photos, and keep them safe from hands of hackers, […] more…Apple, Facebook hackers hit car and candy companies too
More details have been revealed about the massive cyberattack that hit several tech companies last month. Not only were Apple, Facebook, Microsoft, and Twitter hit — but other industries’ computer systems were also hacked, including prominent car manufacturers, U.S. government agencies, and a candy company. According to The Security Ledger, people familiar with the matter […] more…Timeline: Hacks Related to Apple
The hacks related to Apple involve a lot of complexities. Let’s review the time line: February 1st: Twitter’s Director of Information Security, Bob Lord, posted “Keeping our users secure” on Twitter’s blog. On a Friday. The weekend of the NFL’s Super Bowl. Lord explained that Twitter had been hacked, and that 250,000 accounts have had […] more…BitTorrent Trackers Disrupted by DDOS Attacks Launched by Unhappy Hacker
A number of seven popular private BitTorrent trackers have been disrupted by distributed denial-of-service attacks launched against them. A hacker called Zeiko Anonymous has taken credit for the attacks. The targets are IPTorrents, PassThePopcorn.me, Broadcasthe.net, HDBits, What.cd, The Vault and SceneAccess, TorrentFreak informs. On November 9, the attacker became displeased with the fact that What.cd […] more…More information
- Why Apple’s M1 iMac is an excellent enterprise desktop
- Exclusive: Ongoing malware attack targeting Apache hijacks 20,000 sites
- Disaster Recovery Test Scheduled for December 7
- Comment on CVE-2015-2545: overview of current threats by Edgar Tabujara
- Service interruption, ScholarSphere, 9/10/2014
- Flaw in PwC Security Tool Exposes SAP Systems to Attacks
- Wireless controller software upgrade
- Concern Over China Influence Shadows Chip Sector Deal
- "I will not knit my own cryptography!" 60 Second Security
- S3 Ep15: Titan keys, Mimecast certs and Solarwinds [Podcast]