Tuesday, May 21, 2019

Political Parties Still Have Cybersecurity Hygiene Problems

Three years after the DNC hack, a new report finds that political parties around the world have ongoing security flaws that leave them vulnerable to attack.

We Are Tenants on Our Own Devices

It's time to assert our sovereignty over our own stuff.

Bluetooth’s Complexity Has Become a Security Risk

Bluetooth and Bluetooth Low Energy are incredibly convenient—but increasingly at the center of a lot of security lapses.

Google Tracks What You Buy Online With Gmail

Adobe fixes, an executive order, and more of the week's top security news.

The False Promise of “Lawful Access” to Private Data

Opinion: As online extremism migrates to real-world violence, some suggest letting law enforcement intercept encrypted messages. But that’s a dangerous proposition.

Goznym Takedown Shows the Anatomy of a Modern Cybercriminal Supply Chain

Charges against 10 men across Eastern Europe associated with the Goznym malware crew reveal global law enforcement's reach—and its limits.

The FCC’s Robocall Plan Sounds Awfully Familiar

FCC chairman Ajit Pai has proposed a set of rules to combat robocalls. Don't get your hopes up quite yet.

Google Recalls Titan Security Key Over a Bluetooth Flaw

Google will replace any Titan BLE branded security key, after disclosing that a nearby attacker could use it to compromise your accounts.

Microsoft’s First Windows XP Patch in Years Is a Very Bad Sign

A very bad vulnerability in Windows XP could have serious ramifications, even with a patch.

WhatsApp Was Hacked, Your Computer Was Exposed, and More News

Catch up on the most important news today in 2 minutes or less.

Intel Flaw Lets Hackers Siphon Secrets from Millions of PCs

Two different groups of researchers have identified another worrying hack that takes advantage of speculative execution.

How Hackers Broke WhatsApp With Just a Phone Call

All it took to compromise a smartphone was a single phone call over WhatsApp. The user didn't even have to pick up the phone.

Millions of Hacked Routers, Apple’s Court Troubles, and More News

Catch up on the most important news today in 2 minutes or less.

How Tech Helped the NSC Change the US Way of War

The National Security Council has gained enormous influence over the last few decades—thanks in no small part to better tech.

A Cisco Router Bug Has Massive Global Implications

Researchers have discovered a way to break one of Cisco's most critical security features, which puts countless networks at potential risk.

Robert Mueller Won’t Testify Next Week After All

Facial recognition run amok, antivirus hacks, and more of the week's top security news.

DOJ Says Chinese Hackers Attacked Anthem, but Not Why

For years, China was rumored to be behind the massive data breach, but now the Justice Department is noticeably silent on the hackers' motives and affiliation.

Inside China’s Surveillance Crackdown on Uyghurs

In Xinjiang, northwest China, the government is cracking down on the minority Muslim Uyghur population, keeping them under constant surveillance and throwing more than a million people into concentration camps. But in Istanbul, 3,000 miles away, a community of...

Feds Dismantled the Dark Web Drug Trade—but It’s Already Rebuilding

After recent high-profile dark web drug market takedowns, new vendors are already filling the void.

Hackers Stole $40 Million From Binance Cryptocurrency Exchange

One of the biggest cryptocurrency exchanges got hit, as thieves nabbed $40 million of bitcoin—along with user two-factor codes and API tokens.

HawkEye Attack Wave Sends Stolen Data to Another Keylogger Provider

A recent attack wave involving HawkEye malware sends data stolen from its victims to another keylogger provider’s website. On 21 May, My Online Security came across a new sample of HawkEye. The actual delivery mechanism itself wasn’t unique compared...

Washington Issues Temporary License to Huawei

Washington Issues Temporary License to Huawei The US government has issued a temporary license to Huawei and its affiliates, allowing American companies to supply the telecoms and handset giant until August. Despite reports emerging over the weekend of various chipmakers...

GDPR: The Best Strategy For International Businesses

The EU’s General Data Protection Regulation (GDPR) was created with the aim of homogenising data privacy laws across the EU. GDPR also applies to organisations outside the EU, if they monitor EU data subjects, or offer goods and services...
IBM Security

How Cyber-Secure Are Business Travelers? New Report Says Not Very

I travel frequently for business — to industry conferences such as RSA Conference and Black Hat and meeting with clients. Whenever I travel, I bring my work laptop, my personal cellphone enabled with work email and calendar, and, of...

Haas F1 team leans on service providers as security force multipliers

If today’s cars are smartphones on wheels, then race cars are supercomputers with engines attached. As the fastest racing sport in the world, Formula One cars come laden with over 100 sensors measuring every aspect of a car’s internal...