Hackers have found a sweet spot in encrypting and attacking municipal computer systems. Lake City is the latest to suffer from these attacks, and after two weeks of inaccessible services, have agreed to pay the $460,000 ransom to hackers.
- By Kaitlyn DeHaven
- Jun 27, 2019
A new cryptocurrency-mining botnet could severely affect unprotected Android users. Experts say while the unprotected devices are mostly phones in Asia, these issues are becoming a big problem for technology security.
- By Kaitlyn DeHaven
- Jun 26, 2019
Germany has decided to level the playing field and offer all foreign companies fair and equal chances to build the national 5G infrastructure. Huawei has responded, claiming that despite the warnings of the United States, they will be able to comply and meet these standards.
- By Kaitlyn DeHaven
- Jun 26, 2019
WeTransfer files were transferred to unintended users on June 16 and 17. The scope of the incident is not clear, but the company promptly logged out affected accounts and disabled the transfer links.
- By Kaitlyn DeHaven
- Jun 26, 2019
While cloud services are becoming increasingly popular for business use, cyberattacks on cloud services are also growing. This has prompted a rise in cloud security software.
- By Kaitlyn DeHaven
- Jun 25, 2019
Users’ data might be more at risk than they realize. A new study shows that three quarters of mobile application have insecure data storage issues, putting passwords, financial information, personal data, and correspondence at risk.
- By Kaitlyn DeHaven
- Jun 24, 2019
After three weeks of city data being encrypted in Riviera Beach, Florida, city officials have unanimously voted to pay the hefty ransom to regain access.
- By Kaitlyn DeHaven
- Jun 21, 2019
Through the BlueKeep vulnerability, it is possible to achieve remote code execution on vulnerable devices. Since the virus can spread, if it’s not contained, it could trigger a much bigger problem.
- By Kaitlyn DeHaven
- Jun 20, 2019
In March, the department announced that 350,000 clients had been affected by a data breach in January 2019. On Tuesday, they updated the number and announced that 645,000 clients had been affected.
- By Kaitlyn DeHaven
- Jun 20, 2019
A year after a privacy researcher showed the world that Venmo transactions could be easily accessed, a computer science student scraped seven million Venmo transactions to increase awareness of the issue.
- By Kaitlyn DeHaven
- Jun 19, 2019
In May, EatStreet experienced a data breach that compromised certain customers', restaurants', and deliverers' information. The service just recently disclosed the security breach.
- By Kaitlyn DeHaven
- Jun 19, 2019
It was previously believed that North Korean hackers were behind the January 2018 Coincheck hack, but recent developments in the investigation suggest that Russian actors may have been responsible.
- By Kaitlyn DeHaven
- Jun 18, 2019
Yubico discovered a hardware flaw in YubiKey FIPS Series devices in mid-March and since then, has updated the firmware version to one that does not contain the bug, as well as replaced the majority of affected devices.
- By Kaitlyn DeHaven
- Jun 17, 2019
Researchers at CyberMDX uncovered two vulnerabilities in older versions of an infusion pump that could allow hackers to gain control over the onboard computer.
- By Kaitlyn DeHaven
- Jun 17, 2019
Managing the traditional limitations of time and resources means that running a small business on a budget is a challenge, but these difficulties become more pronounced when resources are stretched even further by the increased security demands of new technology.
- By Terry Hearn
- Jun 14, 2019
Tavis Ormandy, one of Google’s “Project Zero” team’s security researchers discovered a vulnerability that could effectively perform a denial-of-service attack on Windows servers. There is a 90-day disclosure deadline associated with Project Zero, and since it was day 91, Ormandy released the information.
- By Kaitlyn DeHaven
- Jun 14, 2019
Bromium®, Inc. has announced the findings of ‘Behind the Dark Net Black Mirror,’ a study that showed the growing risk posed by the dark net to the enterprise.
- By Kaitlyn DeHaven
- Jun 13, 2019
Kapersky security researchers have identified a new phishing attack that takes place in Google Calendar. Threat actors send a Google Calendar invitation to a user that contains a malicious link hosting a phishing URL.
- By Kaitlyn DeHaven
- Jun 13, 2019
It’s often thought that because the servers are behind lock and key and/or in a data center, and because the data is in continuous use, encrypting the server drives isn’t needed since the data is never at-rest.
- By Garry McCracken
- Jun 12, 2019
A subcontractor of U.S. Customs & Border Protection transferred images of travelers and license plates to its network without CBP’s authorization or knowledge. He was subsequently hacked, and the information was compromised.
- By Kaitlyn DeHaven
- Jun 12, 2019