Get the Tech News Flash Newsletter from TechNewsWorld » View Sample | Subscribe
Welcome Guest | Sign In
TechNewsWorld.com
Salesforce Industries Summit
The Thorny Problem of 5G Security
November 15, 2019
A few years ago, putting the words "mobile telecoms security" in the title of an article would be a license to write whatever you wanted below, because no one was likely to read any of the words after the title. Sprinkling the magic ingredient 5G has changed this, and "5G security" is a hot topic now. What has changed? There is a geopolitical aspect to 5G security, but it is not the full story.
Researchers Use Lasers to Hack Smart Speakers
November 6, 2019
University researchers have discovered a way to issue unauthorized commands to digital assistants like Alexa, Google Assistant, Facebook Portal and Siri via laser beams. The microphones in devices like smart speakers, mobile phones and tablets convert sound into electrical signals, but what the researchers found was that the mics react to light aimed directly at them, too.
Smart Speaker Apps Caught Snooping Around Homes
October 22, 2019
Flaws in Amazon and Google smart speakers can expose users to eavesdropping and voice phishing. Researchers at Security Research Labs discovered that developers could create malicious apps for the Amazon and Google platforms to turn the smart speakers into smart spies. Using the standard development interfaces for the platforms, the researchers found a way to request and collect personal data.
Security First: The Double-Edged Sword of Collaboration
October 14, 2019
Online tech support scams have been on the rise for the past decade, as hackers found new ways to trick consumers into providing remote access to their computers in order to steal information. This tried-and-true scam currently relies on sophisticated social engineering, fueled by detailed user information that creates enough credibility to dupe even the most savvy and skeptical users.
Get Serious About Cybersecurity: Take Ownership of Your Personal Data
October 4, 2019
October is National Cyber Security Awareness Month, and one of the prongs in the three-part theme is for all computer users to "Own IT." This means staying safe on social media, updating privacy settings, and keeping tabs on apps. Simply put, users need to take better ownership of their data and their online presence as part of daily safe cyber practices.
eGobbler Malvertising Attack Infects More Than a Billion Ads
October 2, 2019
Two eGobbler malvertising exploits impacted 1.16 billion programmatic ads between Aug. 1 and Sept. 23, according to Confiant, which has been tracking the threat. The first targeted versions of Chrome prior to Chrome 75 on iOS. The flaw was fixed in the Chrome 75 rollout June 4. he second exploit impacted WebKit-based browsers. Confiant reported it to the Chrome and Apple security teams Aug. 7.
Spotlight on Cybersecurity Awareness: Own IT, Secure IT, Protect IT
September 27, 2019
Cybersecurity should be a concern for all businesses -- large and small. Cybersecurity also should be a concern for consumers, government agencies, and basically anyone who relies on the Internet in our increasingly connected world. Among efforts to focus attention on the threatscape is designating October as National Cyber Security Awareness Month.
Multi-Cloud Strategy May Pose Higher Security Risk: Study
September 6, 2019
Users of a multi-cloud storage strategy may be twice as likely to face a security breach as those that use hybrid or single clouds, suggests a report from UK-based security specialist Nominet. Fifty-two percent of survey respondents who adopted a multi-cloud approach suffered a data breach over the past 12 months, compared to 24 percent of hybrid cloud users, and 24 percent of single-cloud users.
Report: Chinese Hackers Eye US Cancer Research
August 27, 2019
Hackers affiliated with the Chinese government have been making a concerted effort to steal medical research, particularly cancer research, from U.S. institutions. The step-up in medical research theft by Chinese APT hacker groups appears to be linked to China's growing concern over cancer mortality rates and increasing healthcare costs. Cancer in the leading cause of death in China.
Microsoft Exposes Russian Cyberattacks on Phones, Printers, Video Decoders
August 7, 2019
The Russian hacking group known for stealing sensitive emails from the Democratic National Committee during the 2016 presidential election season has been cracking into printers, phones and video decoders to gain access to corporate networks, the Microsoft Security Response Center Team reported. The group is known by a number of names including "Strontium," "Fancy Bear" and "APT 28."
Capital One Discloses Massive Data Breach, Hacker Arrested
July 31, 2019
Capital One Financial Corporation has announced a data breach affecting some 100 million people in the U.S. and another 6 million in Canada. The FBI arrested the alleged perpetrator of the breach in Seattle. Capital One on July 19 discovered someone had accessed its data stored online and obtained personal information of credit card customers and people who had applied for credit card products.
Chinese Hackers Linked to Global Attacks on Telcos
June 26, 2019
Chinese hackers likely are responsible for a series of cyberattacks against telecommunications companies around the world, security researchers have reported. The campaign, dubbed "Operation Soft Cell," has been active since 2012, according to Cybereason. There is some evidence suggesting even earlier activity against the telecommunications providers, all of whom were outside North America.
Firefox Users Warned to Patch Critical Flaw
June 20, 2019
Firefox users should update their browsers immediately to fix a critical zero-day vulnerability. Anyone using Firefox on a Windows, macOS or Linux desktop is at risk. Mozilla issued a patch Tuesday, but the vulnerability was discovered by Samuel Groß of Google Project Zero on April 15. Mozilla's fix came after Coinbase reported exploitation of the vulnerability for targeted spearphishing attacks.
Instagram Targets Account Hijacking
June 18, 2019
Account hijacking has become a nettlesome problem at Instagram so it has decided to do something about it. The social media company has begun testing a simpler method for users to reclaim their compromised accounts. It allows users locked out of their hacked accounts to ask for a six-digit code to be sent to the email address or phone number originally used to open the account.
Hackers Use Microsoft Help Desk to Pull Off Massive Email Breach
April 16, 2019
Hackers piggybacked onto a Microsoft customer support portal between Jan. 1 and March 28 to gain access to the emails of noncorporate account holders on webmail services Microsoft manages, including MSN.com, Hotmail.com and Outlook.com. Microsoft has confirmed that a "limited" number of customers who use its Web service had their accounts compromised.
End of the Line for Windows 7: Open Road for Hackers
March 7, 2019
Microsoft has been urging customers to upgrade from its Windows 7 operating system, while attempting to ease the transition with several options for extended support. It will stop providing routine fixes and security patches effective January 2020. Regular support for Windows Server 2008 also will end at that time. Windows 7 enterprise customers can subscribe to Extended Security Updates.
E-Ticketing Flaw Exposes Airline Passenger Data to Hackers
February 7, 2019
The e-ticketing systems of eight airlines, including Southwest Airlines and Dutch carrier KLM, have a vulnerability that can expose passengers' personal data, mobile security vendor Wandera has reported. They use unencrypted links that hackers can intercept easily. The hackers then can view and, in some cases, even change the victim's flight booking details, or print their boarding passes.
Crypto Support in Samsung Galaxy S10 Could Fall Flat
January 30, 2019
The Samsung Galaxy S10, scheduled for launch on Feb. 20, likely will incorporate a cryptocurrency wallet. "Samsung has a long history of throwing everything it can think of, technology-wise, into its flagship Galaxy S series smartphones," remarked Ken Hyers, research director at Strategy Analytics. Most users aren't fully aware of their Galaxy S phone capabilities, he noted.
Quora Looks for Answers in Wake of Massive Data Breach
December 5, 2018
The personal data of some 100 million people who have used Quora, a popular question and answer website, has been compromised, the company disclosed. "We recently discovered that some user data was compromised as a result of unauthorized access to one of our systems by a malicious third party," wrote Quora CEO Adam D'Angelo in an online post. "We are working rapidly to investigate the situation."
Cryptohackers Breach StatCounter to Steal Bitcoins
November 8, 2018
Hackers planted malware on StatCounter to steal bitcoin revenue from Gate.io account holders, according to Eset researcher Matthieu Faou, who discovered the breach. The malicious code was added to StatCounter's site-tracking script last weekend, he reported. The malicious code hijacks any bitcoin transactions made through the Web interface of the Gate.io cryptocurrency exchange.
How to Protect Your Online Privacy: A Practical Guide
November 7, 2018
Do you take your online privacy seriously? Most people don't. They have an ideal scenario of just how private their online activities should be, but they rarely do anything to actually achieve it. The problem is that bad actors know and rely on this fact, and that's why there's been a steady rise in identity theft cases from 2013 to 2017, often resulting in loss of reputation or financial woes.
Mobile Phone Security: All You Need to Know
November 6, 2018
We rely on our phones to process and store reams of personal digital data. Our digital activities -- from checking bank balances to paying for a product with a tap of the screen, to sending friends and family messages over social media, to accessing work emails remotely -- have turned our phones into a goldmine of personal information. How secure is your mobile device?
Former White House CIO Theresa Payton: 'There Are Grave Concerns About Election Interference'
October 26, 2018
Theresa Payton, CEO of Fortalice Solutions, is one of the most influential experts on cybersecurity and IT strategy in the United States. She is an authority on Internet security, data breaches and fraud mitigation. She served as the first female chief information officer at the White House, overseeing IT operations for President George W. Bush and his staff.
The Crypto-Criminal Bar Brawl
September 25, 2018
As if e-commerce companies didn't have enough problems with transacting securely and defending against things like fraud, another avalanche of security problems -- like cryptojacking, the act of illegally mining cryptocurrency on your end servers -- has begun. We've also seen a rise in digital credit card skimming attacks against popular e-commerce software such as Magento.
Why You Should Manage Your IoT Devices Like Employees
September 15, 2018
There is a well-known joke among security professionals: Q: "What does IoT stand for?" A: "Internet of Threats." Sadly, this joke is our reality. An estimated 20.4 billion Internet of Things devices will be deployed by 2020, according to Gartner, in what some have dubbed "the fourth industrial revolution." These connected devices are being manufactured to streamline everything we do.
Android Apps Riskier Than Ever: Report
September 12, 2018
Widespread use of unpatched open source code in the most popular Android apps distributed by Google Play has caused significant security vulnerabilities, suggests an American Consumer Institute report. Thirty-two percent -- or 105 apps out of 330 of the most popular apps in 16 categories sampled -- averaged 19 vulnerabilities per app, according to the report. Researchers found critical vulnerabilities in many common applications.
Microsoft Foils Russian Attack on GOP Think Tanks
August 22, 2018
Microsoft has torpedoed websites designed to steal credentials from visitors to two Republican Party think tanks. The malicious websites were among six the company took down last week. A group of hackers affiliated with the Russian military created the sites, according to Microsoft. It apparently was the same group that stole a cache of email from the DNC during the 2016 presidential campaign.
Def Con Voting Machine Hacks Ruffle Feathers
August 14, 2018
Hackers cracked into a wide array of voting equipment Def Con's Voting Village, an event held Friday at Caesar's Palace in Las Vegas, Nevada. Last year, conference goers hacked five machines and an e-poll book of registered voters. This year, in addition to voting machines, tabulators and smart card readers were available for hacking. Websites weren't off limits, either.
Homeland Security Unveils Center to Combat Cyberthreats
August 1, 2018
DHS has announced the National Risk Management Center, part of a new effort to combat cyberthreats to the U.S. The new agency's mission will be to defend the critical infrastructure through greater cooperation between the public and private sectors. The center will bring together government experts and industry partners to work out ways that the government can support the partners.
Russian Hackers Have Invaded Hundreds of US Utilities: Report
July 25, 2018
Hundreds of U.S. utilities were penetrated by Russian hackers who could have disrupted the nation's power grid. The attacks were launched last year by threat actors sponsored by the Russian government, according to a report. The hackers used Black Hat tools such as phishing and waterhole traps to obtain credentials from legitimate users and leverage them to gain access to the utilities.
See More Articles in Hacking Section >>
Forrester names NICE inContact CXone a leader in cloud contact center software
When considering a new smartwatch, which feature set is most important to you?
Alerts and Notifications
Calls and Messaging
Clock and Time Tracking
Contactless Payments and Banking
Design and Personalization
GPS and Maps
Health and Fitness
Music and Video
Salesforce Industries Summit
Forrester names NICE inContact CXone a leader in cloud contact center software
Women in Tech