Thursday, October 1, 2020

2 men charged with hacking social media accounts of NFL and NBA players

Enlarge / The Department of Justice seal as seen during a press conference in December 2019. (credit: Samuel Corum | Getty Images) Federal authorities have accused two men of hacking the email and social media accounts of...

SpaceX Starlink brings Internet to emergency responders in wildfire areas

Enlarge / A Starlink user terminal and wildfire-devastated areas seen in images shared by Washington State's Emergency Management Division. (credit: Washington Emergency Management Division) SpaceX Starlink is providing Internet access to Washington State emergency responders in areas ravaged...

Senator asks DHS if foreign-controlled browser extensions threaten the US

Enlarge / Photo illustration by Jakub Porzycki/NurPhoto via Getty Images (credit: Getty Images) A US senator is calling on the Department of Homeland Security’s cybersecurity arm to assess the threat posed by browser extensions made in countries known...

“Joker”—the malware that signs you up for pricey services—floods Android markets

Enlarge (credit: portal gda / Flickr) September has been a busy month for malicious Android apps, with dozens of them from a single malware family alone flooding either Google Play or third-party markets, researchers from security companies said. Known...

How a hacker turned a $250 coffee maker into ransom machine

With the name Smarter, you might expect a network-connected kitchen appliance maker to be, well, smarter than companies selling conventional appliances. But in the case of the Smarter’s Internet-of-things coffee maker, you’d be wrong. As a thought experiment, Martin Hron,...

Alphabet, shareholders settle in lawsuits over sexual harassment at Google

Enlarge / Google's corporate headquarters. (credit: Alex Tai | SOPA Images | LightRocket | Getty Images) Alphabet, Google's parent company, said today it has settled a set of shareholder lawsuits related to the company's handling of sexual harassment...

Microsoft boots apps used by China-sponsored hackers out of Azure

Enlarge / Computer chip with Chinese flag, 3d conceptual illustration. (credit: Steve McDowell / Agefotostock) Fortune 500 companies aren’t the only ones flocking to cloud services like Microsoft Azure. Increasingly, hackers working on behalf of the Chinese government...

One of this year’s most severe Windows bugs is now under active exploit

(credit: Pixabay) One of the highest-impact Windows vulnerabilities patched this year is now under active exploitation by malicious hackers, Microsoft warned overnight, in a development that puts increasing pressure on laggards to update now. CVE-2020-1472, as the vulnerability is...

T-Mobile hits back at AT&T and Verizon after spectrum-hoarding accusations

Enlarge / T-Mobile CEO Mike Sievert speaks during a keynote at CES 2020 in Las Vegas on Wednesday, Jan. 8, 2020. (credit: Getty Images | Bloomberg) T-Mobile US CEO Mike Sievert yesterday fired back at AT&T and Verizon,...

“LokiBot,” the malware that steals your most sensitive data, is on the rise

Enlarge (credit: Christiaan Colen / Flickr) Federal and state officials are seeing a big uptick in infections coming from LokiBot, an open source DIY malware package for Windows that’s openly sold or traded for free in underground forums....

Old TV set interfered with village’s DSL Internet each day for 18 months

Enlarge / An old television set. (credit: Getty Images | Jeffrey Coolidge) A 400-resident village in Wales suffered 18 months of DSL Internet outages each morning until the culprit was identified as electrical interference from an old TV...

Scam apps with 2.4 million downloads found on Apple and Google shelves

Enlarge (credit: Silas Stein/picture alliance via Getty Images) Researchers said that a tip from a child led them to discover aggressive adware and exorbitant prices lurking in iOS and Android smartphone apps with a combined 2.4 million downloads...

Feds issue emergency order for agencies to patch critical Windows flaw

Enlarge (credit: Sebastian Kahnert/picture alliance via Getty Images) The US Department of Homeland Security is giving federal agencies until midnight on Tuesday to patch a critical Windows vulnerability that can make it easy for attackers to become all-powerful...

Traders set to don virtual reality headsets in their home offices

Enlarge (credit: Thomas Barwick / Getty Images) Spare bedrooms and living rooms could soon become part of vibrant trading floors as one of the world’s biggest investment banks considers providing staff with augmented reality headsets. UBS has experimented with...

Companies can track your phone’s movements to target ads

Enlarge (credit: Qilai Shen | Bloomberg | Getty Images) Google and Apple have taken steps this year they say will help users shield themselves from hundreds of companies that compile profiles based on online behavior. Meanwhile, other companies...
Tripwire

Russian Gets 7 Years in Prison for Linkedin, Dropbox & Formspring Hacks

A Russian man received a seven-year prison sentence for having hacked into computers belonging to LinkedIn, Dropbox and Formspring. On September 30, Honorable William H. Alsup, U.S. District Judge for the Northern District of California, sentenced Yevgeniy Alexandrovich Nikulin,...
Bruce Schneier

Detecting Deep Fakes with a Heartbeat

Researchers can detect deep fakes because they don’t convincingly mimic human blood circulation in the face: In particular, video of a person’s face contains subtle shifts in color that result from pulses in blood circulation. You might imagine that these...
SecurityWeek

Anthem to Pay Nearly $40M Settlement Over 2015 Cyberattack

Health insurer Anthem has agreed to another multimillion-dollar settlement over a cyberattack on its technology that exposed the personal information of nearly 79 million people. read more

#BeCyberSmart – why friends don’t let friends get scammed

Friends don't let friends get scammed. Because cybercrime hurts us all.
IBM Security

Why a Security Maturity Model Can Transform How You Use Analytics

With cyberattacks and breaches on the rise, security should be a major concern for all companies. In particular, enabling the development of an analytics maturity model is a useful addition to your traditional security information and event management (SIEM)-based...