β Phone cloner gets 65 months in jail β
π Read
via "Naked Security".
A US court has sentenced a man to over five years for his part in a massive telecommunications fraud involving stolen cellphone accounts and reprogrammed phones.π Read
via "Naked Security".
Naked Security
Phone cloner gets 65 months in jail
A US court has sentenced a man to over five years for his part in a massive telecommunications fraud involving stolen cellphone accounts and reprogrammed phones.
β 14k HIV+ records leaked, Singapore says sorry β
π Read
via "Naked Security".
Singapore's Ministry of Health said the HIV status of 14,200 people, plus confidential data of 2,400 of their contacts, is in the possession of somebody who's not authorized to have it and who's published it online.π Read
via "Naked Security".
Naked Security
14k HIV+ records leaked, Singapore says sorry
Singaporeβs Ministry of Health said the HIV status of 14,200 people, plus confidential data of 2,400 of their contacts, is in the possession of somebody whoβs not authorized to have it β¦
β Update now! Chrome and Firefox patch security flaws β
π Read
via "Naked Security".
Google and Mozilla are tidying up security features and patching vulnerabilities in Chrome and Firefox for Mac, Windows, and Linux.π Read
via "Naked Security".
Naked Security
Update now! Chrome and Firefox patch security flaws
Google and Mozilla are tidying up security features and patching vulnerabilities in Chrome and Firefox for Mac, Windows, and Linux.
β Mac βCookieMinerβ Malware Aims to Gobble Crypto Funds β
π Read
via "Threatpost | The first stop for security news".
A newly discovered malware steals cookies, credentials and more to break into victims' cryptocurrency exchange accounts.π Read
via "Threatpost | The first stop for security news".
Threat Post
Mac βCookieMinerβ Malware Aims to Gobble Crypto Funds
A newly discovered malware steals cookies, credentials and more to break into victims' cryptocurrency exchange accounts.
β Google Pulls Data-Chugging App From iOS Devices β
π Read
via "Threatpost | The first stop for security news".
A day after Facebook was dinged for shady iOS distribution techniques of its data-collecting research app, Google was discovered using the same methods for its own app.π Read
via "Threatpost | The first stop for security news".
Threat Post
Google Pulls Data-Chugging App From iOS Devices
A day after Facebook was dinged for shady iOS distribution techniques of its data-collecting research app, Google was discovered using the same methods for its own app.
π Mac malware steals cryptocurrency exchange cookies, text messages for 2FA authentication π
π Read
via "Security on TechRepublic".
The CookieMiner malware attempts to extract credentials for cryptocurrency wallets and exchanges, as well as stored password and credit card information.π Read
via "Security on TechRepublic".
TechRepublic
Mac malware steals cryptocurrency exchange cookies, text messages for 2FA authentication
The CookieMiner malware attempts to extract credentials for cryptocurrency wallets and exchanges, as well as stored password and credit card information.
π΄ For a Super Security Playbook, Take a Page from Football π΄
π Read
via "Dark Reading: ".
Four key questions to consider as you plan out your next winning security strategy.π Read
via "Dark Reading: ".
Darkreading
For a Super Security Playbook, Take a Page from Football
Four key questions to consider as you plan out your next winning security strategy.
π 6 reasons hackers target businesses: Is your organization in the line of fire? π
π Read
via "Security on TechRepublic".
Cyberattacks are increasing, and your organization may be making itself a high-profile target for attackers, according to a Radware report.π Read
via "Security on TechRepublic".
TechRepublic
6 reasons hackers target businesses: Is your organization in the line of fire?
Cyberattacks are increasing, and your organization may be making itself a high-profile target for attackers, according to a Radware report.
β U.S. Government Goes After North Koreaβs Joanap Botnet β
π Read
via "Threatpost | The first stop for security news".
The Department of Justice is looking to dismantle the Joanap botnet, which has been built and controlled by North Korea-linked hackers since 2009.π Read
via "Threatpost | The first stop for security news".
Threat Post
U.S. Government Goes After North Koreaβs Joanap Botnet
The Department of Justice is looking to dismantle the Joanap botnet, which has been built and controlled by North Korea-linked hackers since 2009.
β Airbus Data Takes Flight: Billions of Credentials Dumped on Dark Web β
π Read
via "Threatpost | The first stop for security news".
A cyberattack lifts employee data at the French aerospace giant as news hits of "Collections 2-5" being passed around the underground.π Read
via "Threatpost | The first stop for security news".
Threat Post
Airbus Data Takes Flight; and Billions of Credentials Dumped on Dark Web
A cyberattack lifts employee data at the French aerospace giant as news hits of "Collections 2-5" being passed around the underground.
β 2019 Already Marred By Slew of Data Breach Incidents β
π Read
via "Threatpost | The first stop for security news".
So far, 2019 shows no signs of a decline in data incidents.π Read
via "Threatpost | The first stop for security news".
Threat Post
2019 Already Marred By Slew of Data Breach Incidents
So far, 2019 shows no signs of a decline in data incidents.
π΄ Airbus Employee Info Exposed in Data Breach π΄
π Read
via "Dark Reading: ".
Few details as yet on a cyberattack that hit Airbus' commercial aircraft business.π Read
via "Dark Reading: ".
Darkreading
Airbus Employee Info Exposed in Data Breach
Few details as yet on a cyberattack that hit Airbus' commercial aircraft business.
π΄ Dell, CrowdStrike, Secureworks Join Forces to Secure Endpoints π΄
π Read
via "Dark Reading: ".
Dell SafeGuard and Response is geared toward businesses, governments, and schools that may lack resources they need to detect and remediate sophisticated threats.π Read
via "Dark Reading: ".
Darkreading
Dell, CrowdStrike, Secureworks Join Forces to Secure Endpoints
Dell SafeGuard and Response is geared toward businesses, governments, and schools that may lack resources they need to detect and remediate sophisticated threats.
π΄ 8 Cybersecurity Myths Debunked π΄
π Read
via "Dark Reading: ".
The last thing any business needs is a swarm of myths and misunderstandings seeding common and frequent errors organizations of all sizes make in safeguarding data and infrastructure.π Read
via "Dark Reading: ".
Darkreading
8 Cybersecurity Myths Debunked
The last thing any business needs is a swarm of myths and misunderstandings seeding common and frequent errors organizations of all sizes make in safeguarding data and infrastructure.
β Prepare to Defend Your Network Against Swarm-as-a-Service β
π Read
via "Threatpost | The first stop for security news".
Swarm technology may be a game changer for the bad guys if organizations donβt change their tactics.π Read
via "Threatpost | The first stop for security news".
Threat Post
Prepare to Defend Your Network Against Swarm-as-a-Service
Swarm technology may be a game changer for the bad guys if organizations donβt change their tactics.
π How to stay safe from Super Bowl-related cybersecurity risks π
π Read
via "Security on TechRepublic".
βFrom counterfeit tickets to live streaming deals--Super Bowl 53 can generate a slew of cybersecurity risks. Learn how to protect yourself.π Read
via "Security on TechRepublic".
TechRepublic
How to stay safe from Super Bowl-related cybersecurity risks
βFrom counterfeit tickets to live streaming deals, Super Bowl 53 can generate a slew of cybersecurity risks. Learn how to protect yourself.
β TheMoon Rises Again, With a Botnet-as-a-Service Threat β
π Read
via "Threatpost | The first stop for security news".
A new module allows it to be rented to other malicious actors -- and it's likely other new capabilities are coming down the pike.π Read
via "Threatpost | The first stop for security news".
Threat Post
TheMoon Rises Again, With a Botnet-as-a-Service Threat
A new module allows it to be rented to other malicious actors β and it's likely other new capabilities are coming down the pike.
β Facebook Boots Hundreds of Iran-Linked Accounts For Spreading Misinformation β
π Read
via "Threatpost | The first stop for security news".
Facebook is continuing to crack down on misinformation, political meddling, and "coordinated inauthentic behavior" on its platform.π Read
via "Threatpost | The first stop for security news".
Threat Post
Facebook Boots Hundreds of Iran-Linked Accounts For Spreading Misinformation
Facebook is continuing to crack down on misinformation, political meddling, and "coordinated inauthentic behavior" on its platform.
π΄ Cisco Router Vulnerability Gives Window into Researchers' World π΄
π Read
via "Dark Reading: ".
The research around a recent vulnerability shows how researchers follow leads and find unexpected results.π Read
via "Dark Reading: ".
Darkreading
Cisco Router Vulnerability Gives Window into Researchers' World
The research around a recent vulnerability shows how researchers follow leads and find unexpected results.
β Google says sorry for pulling a Facebook with monitoring program β
π Read
via "Naked Security".
It was using the same Apple enterprise back door as Facebook to get its market research done, but it owned up and backed off.π Read
via "Naked Security".
Naked Security
Google says sorry for pulling a Facebook with monitoring program
It was using the same Apple enterprise back door as Facebook to get its market research done, but it owned up and backed off.
β Microsoft Azure data deleted because of DNS outage β
π Read
via "Naked Security".
Users of Microsoftβs Azure system lost database records as part of a mass outage on Tuesday. A combination of DNS problems and automated scripts were to blame, said reports.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News