The #Safety of U.S. #Data Could #Rest in #Georgia

At one point or another, much of the U.S.’s data passes through Georgia. The state is a financial technology capital, with 70 percent of all payment transactions handled in Atlanta. And Georgia is a major internet access point for not only the Southeast but also the Caribbean and part of…


read more

SEC #Issues New #Guidelines for #Disclosing #Cybersecurity #Risks

The U.S. Securities and Exchange Commission issued new guidance calling on public companies to be more forthcoming when disclosing cyber security risks within their organization, even before a breach or cyber-attack occurs. The commission’s five members voted unanimously to approve the guidance, however, both democratic commissioners feel there needs to…


read more

Intel didn’t #tell US #cyber security officials about the #Meltdown and #Spectre flaws until after it #leaked in news #reports

Intel did not inform U.S. cyber security officials of the so-called Meltdown and Spectre chip security flaws until they leaked to the public, six months after Alphabet Inc notified the chipmaker of the problems, according to letters sent by tech companies to lawmakers on Thursday. Current and former U.S. government…


read more

2,000 #computers were #shut down due to #SamSam virus #attack to #Colorado Department of #Transportation

On Wednesday morning the workday in Colorado Department of Transportation (CDOT) was disturbed. The institution went back to good old days when computers were not existing due to SamSam ransomware virus attack. On February 22, the file-encrypting virus hit CDOT’s computers, encrypted files and demanded to pay the ransom in…


read more

Tinder #vulnerability allows #hackers to take over #accounts with just one #phone number

After it was reported last month that online dating app Tinder had a security flaw, which allows strangers to see users’ photos and matches, security firm, Appsecure has now uncovered a new flaw which is potentially more damaging. Infiltrators who exploit the vulnerability will be able to get access to…


read more

Are #hackers using your #PC to mine #Bitcoin?

Cryptocurrencies like Bitcoin and Monero are so popular because they’re secure and potentially worth thousands of dollars. But investors and consumers aren’t the only ones interested in them. Hackers are using malicious tactics to steal cryptocurrency, and they’re doing it with something called cryptojacking. Hijacked hardware Cryptojacking secretly uses your…


read more

Harper’s #Magazine Warns #Subscribers That #Passwords May Have Been #Stolen

Harper’s Magazine, the monthly longform journalism and essay publication, has warned subscribers that their passwords may have been stolen by hackers. On Thursday several subscribers tweeted screenshots of an email that Harper’s sent. “It has come to our attention that your username and password for Harpers.org may have been compromised,”…


read more

IOT #DEVICES: IS THE #CONVENIENCE #WORTH THE #HACKING #RISK? MOST #CONSUMERS #SAY ‘YES’

There’s no question that the Internet of Things greatly improves the convenience of our lives, but at what cost? Smart home products already constitute a multibillion-dollar industry that is only going to continue growing. However, we can’t ignore the numerous attacks have already taken place with IoT devices. For example,…


read more

Bitcoin #exchange founder #arrested for #allegedly lying to #financial #watchdogs

The founder of a defunct cryptocurrency exchange has been arrested for allegedly lying to financial watchdogs to cover up a heist of 6,000 bitcoin. Federal prosecutors in New York charged Jon Montroll, the 37-year-old founder of BitFunder, on Wednesday with obstruction of justice and two counts of perjury. Separately, the…


read more

Pablo #Escobar is old #school; modern #global #criminal is a #hacker

The amount criminals earn off ID theft, hacking and other forms of cybercrime worldwide is approaching the levels of global drug trafficking, and rising rapidly, experts say. Hackers display “shocking inventiveness” in leveraging technology for extortion as they cause losses of up to $600 billion a year from cybercrime, said…


read more

Hackers using #fake #Swift emails to #deploy Adwind #RAT, steal #bank #credentials in new phishing scam

Hackers are using malicious emails disguised as important Swift messages to spread the cross-platform remote access trojan (RAT) Adwind. According to Comodo Group’s Threat Research Lab, the spam messages claim to contain important information regarding a “wire bank transfer to your designated bank account” from the Swift network, the global…


read more

What is #Tempting Cedar? #Hackers using #fake #Facebook profiles to #spread #Android #spyware

A new campaign involving suspected Lebanese hackers has been uncovered, which involves cybercriminals creating fake Facebook profiles and using social engineering to lure potential victims into downloading an Android spyware. According to security researchers at Avast, who uncovered the new attacks, the hackers spread the spyware, dubbed Tempting Cedar, via…


read more

How #Hackers Abuse #Microsoft #Word for #Crypto #mining?

Crypto currency mining with JavaScript loaded through a browser has become a major concern for users who are not tech savvy. Newer methods are being employed regularly by hackers to gain control over a user’s machine. While injecting crypto currency mining programs through YouTube videos and advertisements are quite common,…


read more

AI #poses risks of #misuse by #hackers, rogue #states

Rapid advances in artificial intelligence are raising risks that malicious users will soon exploit the technology to mount automated hacking attacks, cause driverless car crashes, or turn commercial drones into targeted weapons, a new report warns. The study, published on Wednesday by 25 technical and public policy researchers from Cambridge,…


read more

Hacker #Strikes ‘Stalkerware’ #Companies, Stealing #Alleged Texts and #GPS #Locations of Customers

Nearly a year after Motherboard reported the data breaches of two spyware companies, another hacker has independently targeted two more. A hacker has broken into two consumer spyware companies—firms which sell malware to everyday people, sometimes with the explicit intent of illegally spying on spouses or lovers—and provided a large…


read more

Tesla #Has Its #Cloud System #Hacked by #Cryptocurrency Mining #Malware

In simple terms, hackers got their hands on credentials that were poorly protected within Kubernetes, a Google designed open-source system that optimizes cloud-based applications and resources. RedLock researchers report: “The hackers had infiltrated Tesla’s Kubernetes console which was not password protected. Within one Kubernetes pod, access credentials were exposed to…


read more