News

vulnerable cryptojacking hacking breach security

First known malicious cryptomining campaign targeting Kodi discovered

Add-ons for Kodi, the media streaming app, have been infected with malware that mines Monero and may continue to do so unless you take action.

Chrome browser logos

Forcing users to log into Google Chrome without consent raises privacy concerns

Google defends the forced login to Chrome when you access a Google-owned site, updating the Chrome privacy policy to reflect the new changes.

Beer

Brewery became victim of targeted ransomware attack via job vacancy ad

Hackers took a job ad on the Arran Brewery website and posted it on international recruitment sites. One of the resumes submitted as a result had a Dharma Bip ransomware payload.

flag of the united states department of state

State Department confirms breach of unclassified email system

The U.S. State Department confirmed it suffered a data breach of its unclassified email system. It says less than 1% of employees were affected.

9 mobile threats spyware malware unsecured wireles

Sophisticated mobile spyware Pegasus found in the US and 44 other countries

Ten Pegasus operators deployed the Pegasus spyware for cross-border surveillance and may be violating U.S. law.

ransomware breach hackers dark web

Ransomware hits UK's Bristol Airport, affects flight information screens

Ransomware is being blamed for non-working flight information screens at Bristol Airport in the UK over the weekend.

ransomware

New GandCrab ransomware variant hammers Florida school district

A GandCrab ransomware attack, combined with a Comcast outage, caused a Florida Keys school district’s computer system to be down for a week.

tesla model s

Hackers clone Tesla Model S key fob in 2 seconds to steal car

Belgium researchers quickly cloned the key fob of a Tesla Model S designed by Pektron. Tesla fixed the vulnerability, but McLaren, Karma and Triumph systems are also likely vulnerable.

british airways Boeing 747

British Airways hack was by same group that compromised Ticketmaster

The British Airways hack involved a highly targeted approach using 22 lines of skimmer code by the group that compromised Ticketmaster.

digital network privacy - eavesdropping

Are mixnets the answer to anonymous communications?

Combined with strong encryption such as the Signal protocol, modern mixnets could achieve the Holy Grail: metadata-resistant secure communications.

macos mojave mac app stor

More popular Mac App Store apps secretly steal user data, send it to remote servers

Researchers caught more popular Mac App Store apps secretly stealing users’ data and sending it to a remote server. Apple is working to remove the apps.

thief stolen hacked hacker jail prison

Bad OpSec led to the downfall of teenage DDoS-for-hire group leader

A UK teenager and leader of a DDoS-for-hire group pleaded guilty to three counts of making fake bomb threats that affected thousands of students and resulted in the grounding of a United Airlines flight.

burning laptop

Over 3,700 exposed 3D printers open to remote attackers

Thousands of exposed 3D printers open to remote attackers could be used for sabotage, espionage, or spying. OctoPrint responded with a guide to safe remote access.

smart city iot iiot buildings skyline matthew henry unsplash

Hacking smart buildings

Smart buildings are giant IoT devices begging to get hacked. A new report offers concrete advice on how to mitigate the risk to building automation and control systems (BACS).

Instagram post by CNN showing the CNN Situation Room studio

Scammers pose as CNN's Wolf Blitzer, target security professionals

Here's an interesting, if not outright comical, story for those of you just coming back to work after a long Labor Day weekend. Scammers are pretending to be a well-known CNN anchor and offering serious cash to anyone looking to be a...

shadowy attacker hooded

7,500 MikroTik routers compromised, traffic forwarded to attackers

Attackers have exploited a flaw in thousands of unpatched MikroTik routers, sending traffic to unknown attacker-controlled IPs.

encryption decryption key code

Five Eyes threatens to force encryption backdoors, says 'privacy is not absolute'

The Five Eyes government intelligence alliance issued an encryption ultimatum to tech companies and device makers.

FinTech abstract / virtual world of dollars, pounds, euros, bitcoins, etc.

Bitfi removes unhackable claim from crypto wallet

Bitfi struck the ridiculous unhackable claim from its crypto wallet, while Bitfi backer John McAfee taunts hacker with offer of $20 million for hack.

asia china flag grunge stars pixabay etereuti

China’s MSS using LinkedIn against the U.S.

The head of the U.S. National Counterintelligence and Security Center says China's MSS is using social networks, specifically LinkedIn, to target, access, and recruit U.S. sources.

CSO slideshow - Insider Security Breaches - Futuristic car technology races along a binary highway

Tesla insider with expired NDA spills the tech beans

A former Tesla engineer with an expired non-disclosure agreement (NDA) shared inside technical information on an obscure forum, which was quickly shared across multiple social media platforms.

Load More