Cyber Bites

In order to understand what people are doing to protect themselves from the risk of compromised smart home devices, such as internet-connected TVs, smart thermostats, home assistants and more, ESET polled 4,000 consumers. Key findings include: Over a third of all respondents indicated they are concerned about unauthorized access of their home networks via connected home devices (smart TVs, smart thermostats etc.). 35% of Americans and 37% of Canadians indicated so in our survey. When purchasing a smart home device, most...

Read more

Security vulnerabilities in systems used by several South African banks exposed the personal data of people who applied for home loans. Information about the flaw came from a source who spoke to MyBroadband on condition that they remain anonymous. The existence of the flaws were confirmed by E4 Strategic, the company which develops and maintains the systems. The company also stated that the vulnerabilities were discovered and fixed, and that there is no evidence of...

Read more

The rollout of fifth-generation mobile networks — which offer the potential for downloads speeds of up to 10 times faster than today’s — will change how we communicate, work and stream video. However, the faster speeds are also likely to present an opportunity for hackers to target more devices and launch bigger cyber attacks, experts say. The problem is unlikely to be the security of 5G technology itself. Despite researchers uncovering apparent flaws in 5G’s...

Read more

NATO and Japan held cyber defence staff talks this week to assess current cyber threats and policy developments. “Cyber threats are becoming more complex, destructive, and coercive. Their enduring and evolving nature demands that we continue to adapt and respond appropriately. To adapt to this quickly changing environment, NATO must leverage our unique network of Allies, partner countries and organizations,” said Christian Liflander, Head of the Cyber Defence Section at NATO Headquarters. Source: UK Defence Journal

Read more

The standards for Internet email have never evolved to include robust sender identity validation. As cyber-attack become more sophisticated, this places enterprises at an increased risk, according to a new report from Valimail. The new report is titled "Email Fraud Landscape: BEC explodes as attackers exploit email’s identity crisis", and the Valimail analysis surveys the current vulnerabilities impacting on businesses. BEC represents "business email compromise." A key risk identified in the report comes from impersonation. The collated...

Read more

Ransomware attackers have been abusing a vulnerability in the Windows version of Apple iTunes to avoid detection from antivirus software, according to security researchers. The problem deals with the Apple-created Bonjour updater that comes with iTunes for Windows, which is used to deliver software updates to the app. Security firm Morphisec has discovered it also suffers from an "unquoted path vulnerability," which can cause the Bonjour updater to indiscriminately run a file, whether it be safe or...

Read more

Scammers are targeting Australians desperate to get their hands on Apple’s latest premium smartphones, using the promise of an iPhone 11 Pro to lure in unsuspecting victims. The Australian Communications and Media Authority (ACMA) has warned people to be on the lookout for the scam, which uses fake emails to “phish” for information that could be used to steal your identity. Source: NEWS

Read more

Nearly a decade after Hillary Clinton began using personal devices and a private email server while Secretary of State – a practice that sparked a heated debate and congressional investigations during the 2016 presidential election cycle – an early impeachment probe into President Trump revealed that diplomats in the administration used WhatsApp and their personal mobile phones to conduct State Department business as it related to Ukraine. Source: SC Magazine

Read more

A new modular and malware designed to target diplomatic and government entities was spotted by ESET researchers while being utilized in attacks aimed at Russian-speaking individuals for at least 7 years. The espionage malware strain dubbed Attor by the researchers comes with some unusual capabilities including the use of encrypted modules, Tor-based communications, and a plugin designed for GSM fingerprinting using the AT protocol. Source: Bleeping Computer

Read more

Popular prostitution and escort forums in the Netherlands and Italy have suffered data breaches that exposed the usernames, email addresses, and hashed passwords for their registered members. With prostitution and escort services being legal in the Netherlands and Italy, forums have been created that allows users to review services or interact directly with sex workers. Source: Bleeping Computer

Read more
Page 3 of 67 1 2 3 4 67
Social media & sharing icons powered by UltimatelySocial