Top 10 Stories

Researchers at IU have discovered a simple way to foil criminals intent on breaking into university data. To investigate the impact of policy on password reuse, the study analyzed password policies from 22 different U.S. universities, including their home institution, IU. Next, they extracted sets of emails and passwords from two large data sets that were published online and contained over 1.3 billion email addresses and password combinations. Based on email addresses belonging to a university’s domain,...

Read more

Scammers are creating fake Android cryptocurrency mining apps and promoting them on the Google Store. The kicker is that these apps claim to mine cryptocurrency that can't be mined in the first place. Fortinet discovered these apps on the Google Play Store when they saw that the apps were being promoted as miners for Ripple (XRP), Cardano (ADA), and Tether. As these are cryptocurrencies that are not possible to mine, the apps only pretend to mine and...

Read more

A malicious app called "Album by Google Photos" was found in the Microsoft Store today that pretends to be from Google. This app pretends to be part of Google Photos, but is actually an ad clicker that repeatedly opens hidden advertisements in Windows 10. This free Album by Google Photos app claims to be created by Google LLC and has a description of "Finally, a photos app that's as smart as you.".  You can see an image...

Read more

Just like clockwork, another weekend is over and Monday is here again. To lighten the load, El Reg is offering you the latest instalment of Who, Me?, our weekly sysadmin confessional column. This time we meet "Romeo", who was working at a large music company in London at the time in question. It was his first job for a big multinational and the firm had just been hit by the I Love You virus that crippled systems all over...

Read more

The threat landscape is radically different in a connected, digital world. Critical infrastructures, from smart metres to payment systems, are no longer constrained by geography. Personal digital assets, such as identity and online behaviour data, are increasingly globalised. Threats to these aren’t nearly as easy to monitor or defend against – and governments’ ability to deal with them is being eroded. Loan companies will add levels of encryption to safeguard their data and customer information....

Read more

Britain is putting pressure on the EU to name the targets of new chemical weapons sanctions due to be agreed as part of the bloc’s escalating response to alleged malicious Russian activity in Europe. Jeremy Hunt, Britain’s foreign secretary, will also call for talks on cyber-related EU countermeasures to be stepped up when the bloc’s foreign ministers gather in Luxembourg on Monday. View full story ORIGINAL SOURCE: Financial Times

Read more

Are Companies turning to Recruiters to help them with the Talent Shortage in Cyber Security? There has been huge growth in the search for recruitment agencies specialising in Cyber security. A study conducted by technology recruitment company, Finlay James has identified a 93% increase year on year in people searching for cyber security recruitment and related terms in Google. The news comes after the ISC anticipated a worldwide shortage of 1.8 million cyber security professionals by 2022 but...

Read more

Malaysia needs to be on par with global legislation on data protection such as GDPR, said Minister Gobind Singh Deo at a recent conference.Malaysia plans to update its data protection laws next year, possibly modelling it after the EU’s GDPR (General Data Protection Regulation) as the country seeks to prevent data breaches, according to local media. View full story ORIGINAL SOURCE: The Star

Read more

The alarming rate of crypto-jacking attacks ravaging the internet has been a cause of worry as the trend keeps gaining momentum. Two months ago, over 170,000 computers were surreptitiously used in manufacturing malware scripts in Brazil, with another report indicating a similar trend in Moldova where 25,000 MikroTik routers were used in running CoinHive scripts. Trustwave researcher, Troy Mursch has attempted to draw a parallel between these two attacks but it is unknown whether they were actually connected. The latest attack was witnessed...

Read more

“Gaming companies put a lot of effort into planning for an attack and implementing anti-DDoS strategies”. Ubisoft, the £1.5 billion (by 2017-2018 sales) French gaming giant, saw the launch of one of its much-hyped premier titles disrupted by distributed denial of service (DDoS) attacks over the weekend, the company admitted. View full story ORIGINAL SOURCE: CBR

Read more
Page 3 of 630 1 2 3 4 630