You are here
Home > News > Information Security

Even if you’re off social media, your friends could be ruining your privacy

Fallback Image

You could always get rid of your friends?... You don't have to post anything for social networks to learn about you. Your friends are doing all the work already. A new study from researchers at the University of Vermont and the University of Adelaide found that they could predict a person's posts on social media with 95 percent accuracy -- even if they never had an account to begin with. The scientists got all the information they needed from a person's friends, using po...

Mystery still surrounds hack of PHP PEAR website

Fallback Image

Time to check your PHP installation...: [...] However, last week, the PHP PEAR website --located at pear.php.net-- was taken down and its homepage replaced with a short message announcing a security breach. According to the message, the PEAR team said they've found that the official website had been hosting a "tainted go-pear.phar" file --which is the main PHP PEAR executable. "If you have downloaded this go-pear.phar in the past six months, you should get a new copy o

Bomb Threat, Sextortion Spammers Abused Weakness at GoDaddy.com

Oh dear. I use GoDaddy for some of the domains I manage. Brian Krebs says that leaves me open....: Two of the most disruptive and widely-received spam email campaigns over the past few months — including an ongoing sextortion email scam and a bomb threat hoax that shut down dozens of schools, businesses and government buildings late last year — were made possible thanks to an authentication weakness at GoDaddy.com, the world’s largest domain name registrar, KrebsOnSecurity h

Hacked Nest Cam convinces family that US is being attacked by North Korea

Fallback Image

This has some merit. Unfortunately, many people struggle with setting up and using 2FA so it's up to us to educate and make the process simpler...: [...] This isn't the first time Nest's cameras have been infiltrated by outsiders. In December, a hacker took over the camera of a man in Arizona to warn him of security vulnerabilities. In another case last month, a hacker told a couple through the device he'd kidnap their child. Security experts have been warning for years t

Name and shame firms with poor cyber security, government told

I can see potential attackers mining this information for targets...: In the light of the fact that four in 10 businesses experienced a cyber security breach or attack in 2017-18 according to the government’s 2018 data breach survey, the public should be able to see what steps firms are taking to keep users safe online, a report says. The report, from the Cyber Security Research Group and the Policy Institute at King’s College London, argues that naming companies with poo

Clever Smartphone Malware Concealment Technique

This is clever: Malicious apps hosted in the Google Play market are trying a clever trick to avoid detection -- they monitor the motion-sensor input of an infected device before installing a powerful banking trojan to make sure it doesn't load on emulators researchers use to detect attacks. The thinking behind the monitoring is that sensors in real end-user devices will record motion as people use them. By contrast, emulators used by security researchers­ -- and possibly

Achieving cyber resilience in the telco industry – Accenture

A view from Accenture in Asia-Pacific. The message is "must do better" so not much change from usual. The interesting news is that telcos have begun to share intelligence .  : [...] With growing demands to protect consumers, cybersecurity has been a major challenge for the telecommunication industry in the past twelve months. In response to this challenge, four telco groups - Singtel, SoftBank, Etisalat, and Telefónica – have recently partnered to create the Global Telco

Would You Like To Rent Out Your Facebook Account In Exchange For Monetary Gifts or Laptop?

Can anyone think why this might be a bad idea?...: [...] The ‘spammy’ Facebook account holders who have been blocked from advertising on the popular social media site have come up with a new way to run their campaigns by asking legitimate account holders to ‘rent’ out their accounts. With rented accounts, an illegitimate person can create a new page and quickly begin running ads. And even if Facebook gets hold of these accounts and bans them, the ad launderer can move to

Hacked Customer Data From World Leading Cryptocurrency Exchanges For Sale On The Dark Web?

If anyone comes across a picture of me, holding my passport, it's probably from this hack. There's not much I can do about it, just be extra vigilant about fraudulent transactions...: On a darknet market called “Dread,” a vendor going by “ExploitDOT” is attempting to sell user data from the know-your-customer (KYC) data top cryptocurrency exchanges ask for, required by most jurisdictions. According to data shared with CCN, the hacker has an ad that has been online since J

Top