Skip to main content

Home/ ITGSonline/ Group items tagged security ITGS

Rss Feed Group items tagged

dr tech

'Shocking' hack of psychotherapy records in Finland affects thousands | Finland | The G... - 0 views

  •  
    ""The Vastaamo data breach is a shocking act which hits all of us deep down," the country's interior minister, Maria Ohisalo, wrote on her website on Monday. Finland must be a country where "help for mental health issues is available and it can be accessed without fear", she added. Ministers met for crisis talks this weekend, with further emergency discussions tabled for the coming week over the data breach."
dr tech

Twitter hack shows why social media needs cybersecurity regulations - 0 views

  •  
    "According to the report, Twitter's security "problems" were only exacerbated by the push to remote work necessitated by the coronavirus pandemic. Like many other newly remote workers, Twitter's employees experienced tech problems working from home. Hackers were able to capitalize on this, tricking at least one Twitter employee into believing the hacker was a member of Twitter's IT team."
dr tech

Google says Chinese hackers who targeted Biden campaign are faking McAfee software - Th... - 0 views

  •  
    "Google said in a new blog post that hackers linked to the Chinese government have been impersonating antivirus software McAfee to try to infect victims' machines with malware. And, Google says, the hackers appear to be the same group that unsuccessfully targeted the presidential campaign of former Vice President Joe Biden with a phishing attack earlier this year. A similar group of hackers based in Iran had tried to target President Trump's campaign, but also was unsuccessful."
dr tech

T2 security chip on Macs can be hacked to plant malware - 9to5Mac - 0 views

  •  
    "TL;DR: all recent macOS devices are no longer safe to use if left alone, even if you have them powered down. The root of trust on macOS is inherently broken They can bruteforce your FileVault2 volume password They can alter your macOS installation They can load arbitrary kernel extensions"
dr tech

Facebook 'SilentFade' Malware Attack Stole Credentials For Years | Threatpost - 0 views

  •  
    "Dubbed SilentFade (short for "Silently running Facebook Ads with Exploits"), the malware compromised Facebook accounts and used them to promote malicious ads, steal browser cookies and more. The social-media giant said that the Chinese malware campaign started in 2016, but it was first discovered in December 2018, due to a suspicious traffic spike across a number of Facebook endpoints. After an extensive investigation, Facebook shut down the campaign and pursued legal action against the cybercriminals behind the attack in December 2019. "
dr tech

Serious Security: Phishing without links - when phishers bring along their own web page... - 0 views

  •  
    "As explained above, filling in the forms in the fake HTML pages above will send off your password to websites controlled by the criminals. Of course, email passwords are amongst the most valuable credentials for crooks to acquire, simply because many people use their email account for password resets on a multitude of other accounts."
dr tech

The Surgeon Who Wants to Connect You to the Internet with a Brain Implant | MIT Technol... - 0 views

  •  
    "But Leuthardt, for one, expects he will live to see it. "At the pace at which technology changes, it's not inconceivable to think that in a 20-year time frame everything in a cell phone could be put into a grain of rice," he says. "That could be put into your head in a minimally invasive way, and would be able to perform the computations necessary to be a really effective brain-computer interface.""
dr tech

The Fresh Smell of ransomed coffee - Avast Threat Labs - 0 views

  •  
    "Let's say you have an IoT device that is well protected with functions that can be accessed through a well-defined API; even if you can control the device through the API, you probably can't do too much harm. Firmware, the programming inside the device has logical constraints that don't allow you, for example, to close garage doors while someone is in the way of them or overheat a device so that it combusts.  We used to trust that hardware, such as a common kitchen appliance, could be trusted and could not be easily altered without physically dismounting the device. But with today's "smart" appliances, this is no longer the case."
dr tech

U.K. Found 'Critical' Weakness in Huawei Equipment - Bloomberg - 0 views

  •  
    ""Critical, user-facing vulnerabilities" were found in the Chinese supplier's fixed-broadband products caused by poor code quality and an old operating system, the Huawei Cyber Security Evaluation Centre Oversight Board said in a report. "U.K. operators needed to take extraordinary action to mitigate the risk.""
dr tech

Android Users Need to Manually Remove These 16 Infected Apps - 0 views

  •  
    "The Joker malware circumvents the Google Play app vetting process through a combination of code tweaks, execution method variation, and changes to how it downloads the payload allowing it to function, steal information, and trigger the WAP service sign-ups. Google has removed the 16 infected apps from the Play Store and disabled them on devices where they are installed, thought to be in the region of 120,000 devices. "
dr tech

Centralized vs Decentralized Storage: Blockchain Changing Storage - 0 views

  •  
    "Decentralized storage platforms break apart the users' files and distribute them across multiple nodes on their network. Since the data is scattered across multiple nodes, there is no single point of failure."
dr tech

Islamic State: Giant library of group's online propaganda discovered - BBC News - 0 views

  •  
    ""The attraction for jihadists of these platforms is that the developers of these decentralised platforms have no way of acting against content that is stored on user-operated servers or content that's shared across a dispersed network of users, " BBC Monitoring senior jihadi specialist Mina Al-Lami said. "It's really all about privacy, freedom and encryption."
dr tech

Microsoft warns digital currency owners to be aware of new malware - 0 views

  •  
    "The new malware, called Anubis, seems to use code forked from Loki. It steals crypto wallet credentials, credit card details and other valuable information from these Windows users. According to MSI, it first discovered the malware in June in the cybercriminal underground. It has the same name with another potent banking Trojan that has been targeting Android smartphones for months."
dr tech

WhatsApp spyware attack: senior clergymen in Togo among activists targeted | Technology... - 0 views

  •  
    "WhatsApp announced last year that 1,400 of its users were attacked with the malware, which is made by Israel's NSO Group, over a two-week period last April."
dr tech

Twitter hack: accounts of prominent figures, including Biden, Musk, Obama, Gates and Ka... - 0 views

  •  
    "Twitter suffered a major security breach on Wednesday that saw hackers take control of the accounts of major public figures and corporations, including Joe Biden, Barack Obama, Elon Musk, Bill Gates, Jeff Bezos and Apple. The company confirmed the breach Wednesday evening, more than six hours after the hack began, and attributed it to a "coordinated social engineering attack" on its own employees that enabled the hackers to access "internal systems and tools"."
dr tech

Tell Zoom to protect all users from police surveillance, hackers, and cyber-criminals -... - 0 views

  •  
    "Zoom is not encrypting calls for free accounts with end to end encryption so they can provide law enforcement and the Federal Bureau of Investigation with content from those calls. As protesters demonstrate in the wake of the murder of George Floyd, law enforcement has deployed a wide range of surveillance tools to monitor and track protesters-including facial recognition software and contact tracing technology. They are working to get information from every source possible to disrupt and even arrest people involved with the protests."
dr tech

North Dakota's COVID-19 contact tracing app leaks location data to Foursquare and a Goo... - 0 views

  •  
    "The app, called Care19, and produced by a company called ProudCrowd that also makes a location-based social networking app for North Dakota State sports fans, generates a random ID number for each person who uses it. Then, it can "anonymously cache the individual's locations throughout the day," storing information about where people spent at least 10 minutes at a time, according to the state website. If users test positive for the coronavirus, they can provide that information to the North Dakota Department of Health for contact-tracing purposes so that other people who spent time near virus patients can potentially be notified."
dr tech

We Mapped How the Coronavirus Is Driving New Surveillance Programs Around the World - 0 views

  •  
    "an attempt to stem the tide of the coronavirus pandemic, at least 30 governments around the world have instituted temporary or indefinite efforts to single out infected individuals or maintain quarantines. Many of these efforts, in turn, undermine personal privacy."
dr tech

Distance learning during the coronavirus pandemic is changing cheating - Vox - 0 views

  •  
    "Raza wasn't the only one in her class who felt concerned about new levels of surveillance. Another student in the class, who did not want to be named, said that in addition to privacy worries, they were concerned that they didn't even have enough RAM to run the Proctorio software. Worse, the tool's facial detection algorithm seemed to struggle to recognize them, so they needed to sit in the full light of the window to better expose the contours of their face, in their view an indication that the system might be biased. "
1 - 20 of 532 Next › Last »
Showing 20 items per page