Posts filtered by tags: Security[x]


Hackers Snuck Backdoors Into ASUS Software Updates, Infecting Thousands

On Monday, we saw once again how criminals can exploit trust and use it as a weakness.Read more...
Tags: Malware, Security, Asus, Supply Chain Attack

Hackers Digitally Invade Tesla Model 3, Winning One

Computer experts successfully broke a Tesla Model 3 at the “Pwn2Own” hacking event held recently in Vancouver. However, Tesla Motors isn’t biting its nails over someone finding vulnerabilities in its system, as it was privy to the plan. The automaker has operated a “bug bounty program” for the past 4 years, rewarding anyone who can […] The post Hackers Digitally Invade Tesla Model 3, Winning One appeared first on The Truth About Cars.
Tags: News Blog, Digital Security, Hackers, Hacking, Model 3, Security, Tesla, Tesla Model 3, Tesla Motors

Apple Card will make credit card fraud a lot more difficult

Apple’s new credit card has a curious security feature that will make it much more difficult to carry out credit card fraud. The aptly named Apple Card is a new credit card, built into your iPhone Wallet app, which the company says will help customers live a “healthier” financial lifestyle. The card is designed to replace your traditional credit card and give you perks, such as daily cash. Chief among the benefits is a range of security and privacy features, which Apple says — unlike traditional...
Tags: Apps, Payments, Privacy, Security, Apple Media Event 2019, ATM, Bank, Credit Cards, Economy, Finance, iPhone, Mastercard, Money, Payment Card, United States

Hackers dropped a secret backdoor in Asus’ update software

Hackers targeted and compromised “hundreds of thousands” of Asus computer owners by pushing a backdoored update software tool from the company’s own servers. The bombshell claims, first reported by Motherboard, said the hackers digitally signed the Asus Live Update tool with one of the company’s own code-signing certificates before pushing it to Asus’ download servers, which hosted the backdoored tool for months last year. The malicious updates were pushed to Asus computers, which has the softwa...
Tags: Apps, Hardware, Security

A family tracking app was leaking real-time location data

A popular family tracking app was leaking the real-time locations of more than 238,000 users for weeks after the developer left a server exposed without a password. The app, Family Locator, built by Australia-based software house React Apps, allows families to track each other in real-time, such as spouses or parents wanting to know where their children are. It also lets users set up geofenced alerts to send a notification when a family member enters or leaves a certain location, such as school ...
Tags: Apps, Security, Australia, Computing, Database, Email, Internet, Photo Sharing, Social Media

A major Instagram security bug leaked users passwords as plain text

According to a report on The Information Instagram has experienced a pretty major security bug which allowed user passwords to be displayed in plain text. The issue arose, ironically, over the feature which allows users to see exactly what personal data Instagram has collected about them. Yes, the “Download your data” feature could potentially let anybody download […] The post A major Instagram security bug leaked users passwords as plain text appeared first on DIY Photography.
Tags: News, Bug, Instagram, Security

Unnamed stalkerware company has left gigabytes of sensitive personal info unprotected on the web and can't be reached to fix it

Security researcher Cian Heasley discovered an unprotected online storage folder accessible via the web that contains all the data that stalkers and snoops took from their victims' devices via a commercial program that steals photos and recordings from their devices. Included in the leak are 3.7GB of MP3 recordings (25,000 in total) of personal phone calls and 16GB of images (95,000 in total), including very sensitive and personal images. Both Heasley and Motherboard have repeatedly contac...
Tags: Post, Ghost Ships, Infosec, Responsible Disclosure, Security, Stalkerware

Facebook Says CHANGE YOUR PASSWORD, Admits Hundreds Of Millions Could Be Seen By It's Employees For Years

Hundreds of millions of Facebook account passwords were stored in plain text and searchable by thousands of Facebook employees going back as far as 2012. Facebook found the problem in January, but just went public with it on Thursday. Security experts are urging users to change their passwords immediately. From Facebook: "As part of a routine security review in January, we found that some user passwords were being stored in a readable format within our internal data storage...
Tags: Social Media, Facebook, Passwords, Security, Bruce Houghton

Wireless vulns in Medtronic's implanted defibrillators allow remote shocks, shutdown, denial-of-service battery attacks and data theft

Medtronic is the most notorious maker of insecure medical implants in America, with a long history of inserting computers into people's bodies with insecure wireless interfaces, toolchains and update paths, and nothing has changed. In a new CERT advisory -- scoring 9.3/10 for severity! -- we learn that remote attackers can hijack a Medtronic implanted defibrillator and administer potentially lethal shocks, shut down lifesaving features, and put the device into a high power-consumption mode ...
Tags: Post, FDA, Health, Ieds, Implants, Infosec, Medtronic, Security

Internet Access While Traveling: Tips for Keeping Your Data Safe

Are you tired of unreliable and painfully slow internet when traveling? Do you worry about your security? It does feel like an endless battle waiting for apps to respond and pages to load. Imagine spending your precious traveling time looking at a blank screen instead of enjoying the beautiful environment. To ensure you enjoy your internet access without worrying about your security while traveling, we have put together some really helpful tips. Ensure you stick to secure sites First, check th...
Tags: How To, Security, Travel

Intego Mac Podcast, Episode 75: This Is a Brain Hack

We take a deep dive into spam: how it works, and how you can manage it. We also discuss another Facebook blunder, some thoughts on preventing facial recognition software from spotting you, and a new scam allegedly from the CIA.
Tags: Tech, Podcast, Security

Facebook’s reportedly been storing millions of user passwords in plain text since 2012

Last night, Facebook revealed that it found a flaw in January in its systems that stored user passwords in plain text, which meant that anyone who had access to them could read those passwords without having to decrypt them. The vulnerability impacts “hundreds of millions of Facebook Lite users, tens of millions of other Facebook users, and tens of thousands of Instagram users.” What’s more shocking is that, according to cybersecurity journalist Brian Krebs, in some instances, the company has be...
Tags: Apps, Facebook, Security

Hundreds of Thousands of Medtronic Defibrillators Could Be Vulnerable to Hacking Due to Flaw

The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency has issued an alert that some Medtronic implanted defibrillators contain vulnerabilities that would allow them exploited by attackers who had the right knowledge of the devices and close proximity to an individual possessing one.…Read more...
Tags: Hacking, Defibrillator, Health, Security

Jared Kushner uses WhatsApp to talk with foreign leaders, claims Cummings

House Oversight Chairman Elijah Cummings says Abbe Lowell has confirmed that President Donald Trump's son-in-law and White House advisor Jared Kushner has been using the encryptable/disappear-able messaging WhatsApp to communicate with leaders of foreign nations. "Mr. Lowell could not answer whether Mr. Kushner's communications included classified information." Mr. Kushner's attorney disputes the claims in the Cummings letter. Kushner's the tip of the iceberg -- the House attention to this ...
Tags: Security, Post, Politics, News, Maryland, White House, Cnn, Whatsapp, Hillary Clinton, House, National Security, National Security Council, Donald Trump, Trump, Lauren Fox, Elijah Cummings

Streaming site Kanopy exposed viewing habits of users, researcher says

On-demand video streaming site Kanopy has fixed a leaking server that exposed the detailed viewing habits of its users. Security researcher Justin Paine discovered the leaking Elasticsearch database last week and warned Kanopy of the exposure. The server was secured two days later on March 18, a spokesperson told TechCrunch. “We are currently investigating the scope and cause as well as reviewing all of our security protocols.” Kanopy is like Netflix but for classic movies and documentaries. The...
Tags: Security, Tech, Netflix, United States, World Wide Web, Elasticsearch, Paine, Kanopy, Justin Paine

Steam vulnerability exposed users to account hijacking and malware

A vulnerability in Valve‘s Steam platform made it possible for malicious actors to take over user accounts, pilfer their items, and even infect their systems with additional malware. The security kink resided in Steam‘s server browser functionality – which lets players look up severs for a number of games (including hit titles like CS:GO, Half-Life 2, and Team Fortress 2) – according to a HackerOne vulnerability disclosure made public on March 15. The security researchers who unearthed the bug n...
Tags: Security, Startups, Gaming, Apps, Team Fortress

Facebook admits it stored ‘hundreds of millions’ of account passwords in plaintext

Flip the “days since last Facebook security incident” back to zero. Facebook confirmed Thursday in a blog post, prompted by a report by cybersecurity reporter Brian Krebs, that it stored “hundreds of millions” of account passwords in plaintext for years. The discovery was made in January, said Facebook’s Pedro Canahuati, as part of a routine security review. None of the passwords were visible to anyone outside Facebook, he said. Facebook admitted the security lapse months later, after Krebs s...
Tags: Security, Social, Facebook, Mark Zuckerberg, Instagram, Social Media, Tech, Cryptography, Password, Computing, Brian Krebs, Photo Sharing, Operating Systems, Krebs, Pedro Canahuati

Browse safely and securely with Opera’s unlimited VPN on Android

Opera has added a new VPN to its Android browser, offering an easy way to keep your privacy and data locked up solid, and with no limits on usage or cost, you can keep it on all the time. The post Browse safely and securely with Opera’s unlimited VPN on Android appeared first on Digital Trends.
Tags: Android, Security, Mobile, News, Trends, Vpn, Opera

Microsoft warns Windows 7 users of looming end to security updates

Microsoft has rolled out a patch that will warn Windows 7 users that security updates will soon come to an end. The patch rolled out Wednesday warning users of the impending deadline, January 14, 2020, when the software giant will no longer roll out fixes for security flaws and vulnerabilities. The deadline comes some 10 years after Windows 7 first debuted in 2009, more than half a decade before Microsoft’s most recent operating system Windows 10 was introduced. Microsoft’s move to stop issui...
Tags: Security, Apps, Microsoft, Tech, Ransomware, Cybercrime, Windows 10, National Security Agency, Windows 7, Operating System, Microsoft Windows, Windows Xp, Operating Systems, Cyberattacks

How Phishing Scams Are Evolving—And How Not to Get Caught

Phishing is one of the most reliable methods a would-be hacker can take to access your digital accounts or even your bank account—and these kinds of attacks are becoming more common and more sophisticated over time. Even if you think you know a phishing email when you see one, new strategies continue to spring up.Read more...
Tags: Security, Science, Email, Internet, Phishing, Email Security

Law enforcement needs to protect citizens and their data

Robert Anderson Contributor Robert Anderson served for 21 years in the FBI, retiring as executive assistant director of the Criminal, Cyber, Response and Services Branch. He is currently an advisor at The Chertoff Group and the chief executive of Cyber Defense Labs. Over the past several years, the law enforcement community has grown increasingly concerned about the conduct of digital investigations as technology providers enhance the security protections of thei...
Tags: Apple, Google, Android, Security, Facebook, Column, Human Rights, Privacy, Law, Australia, Tech, Eu, European Union, Encryption, Cryptography, Fbi

How to Uninstall Avast on Mac

Mac users usually don’t use an antivirus software but it’s better to safeguard your machine than to be sorry. Avast offers “Avast Security for Mac”, a free to download and essential . There is also a Pro version of Avast security that provides premium security such as real-time alerts. Just in case you’re using Avast free antivirus on Mac and don’t wish to use it anymore then it’s better to remove the program. That’s because antivirus software is heavy on resources and could consume adequate m...
Tags: Security, Mac, Blogging, Antivirus, Uninstall, Avast, Tips 'n' Tricks, Antivirus Removal Tool

Donated devices are doxing your data, says new research

In the space of six months, one security researcher found thousands of files from dozens of computers, phones and flash drives — most of which contained personal information. All the researcher did was scour the second-hand stores for donated and refurbished tech. New research published by security firm Rapid7 revealed how problematic discarded technology can be. For his research, Josh Frantz bought 85 devices for $650, and found over 366,300 files, including images and documents. After an analy...
Tags: Security, Ebay, Tech, Cryptography, Social Security, Computing, Driver, Data Recovery, Computer Security, FRANTZ, University of Hertfordshire, USB flash drive, Josh Frantz

Sprint customers say a glitch exposed other people’s account information

Several Sprint customers have said they are seeing other customers’ personal information in their online accounts. One reader emailed TechCrunch with several screenshots describing the issue, warning that they could see other Sprint customers’ names and phone numbers. The reader said they informed the phone giant of the issue, and a Sprint representative said they had “several calls pertaining to the same issue.” In all, the reader saw 22 numbers in a two-hour period, they said. Several other...
Tags: Security, Privacy, Tech, Companies, Telecommunications, Sprint, Telephony, Caller ID, Madeline Finch

The Botnet Malware Behind Some of the Biggest DDoS Attacks Ever Just Got an Upgrade 

Mirai malware, which can infect and grant even unsophisticated actors control over hundreds of thousands of IoT devices, is responsible for some of the most devastating distributed denial-of-service (DDoS) attacks ever seen. Read more...
Tags: Security, Science, Mirai, Effin Botnets

Security & Android apps: why automated testing matters

Android smart devices have gained tremendous popularity, leading to the pervasiveness of its apps. As of December 2018, there were over 2.6 million Android applications distributed within its official app store, Google Play. Ranging from financial and educational to personalization and entertainment, the app store had over 30 categories of apps.  Source: Android Central Given the widespread adoption of Android as an efficient mobile operating system (OS), there is an increasing need ...
Tags: Google, Security, Mobile, Seo

Slack hands over control of encryption keys to regulated customers

Slack announced today that it is launching Enterprise Key Management (EKM) for Slack, a new tool that enables customers to control their encryption keys in the enterprise version of the communications app. The keys are managed in the AWS KMS key management tool. Geoff Belknap, chief security officer (CSO) at Slack, says that the new tool should appeal to customers in regulated industries, who might need tighter control over security. “Markets like financial services, health care and governmen...
Tags: Security, Cloud, Enterprise, Tech, Encryption, Slack, CSO, Geoff Belknap, Belknap, Encryption Key Management, TechCrunch Slack, Slack Belknap

10 Ways to Be a Better Man

You may be a great guy and have good intentions, but until you become the man that you know you can and should be, people won’t rush to show you more respect. This is a subject that I know a lot about because it is something I went through myself. I went from being a man who was overlooked for promotions at work, rejected by women and ignored by friends to a man who is running his own successful business for the last nine years. And yes, even the ladies have noticed. Along the way, I have learne...
Tags: Security, Leadership, Lifehacks, Don

A huge trove of medical records and prescriptions found exposed

A health tech company was leaking thousands of doctor’s notes, medical records, and prescriptions daily after a security lapse left a server without a password. The little-known software company, California-based Meditab, bills itself as one of the leading electronic medical records software makers for hospitals, doctor’s offices, and pharmacies. The company, among other things, processes electronic faxes for healthcare providers, still a primary method for sharing patient files to other provide...
Tags: Health, Security, California, Articles, Tech, Fax, Social Security, Dubai, Health Insurance, Illness, Puerto Rico, San Juan, University of Texas, U S Department of Health and Human Services, Marrero, HIPAA

Facebook failed to block 20% of uploaded New Zealand shooter videos

Facebook said it removed 1.5 million videos from its site within the first 24 hours after a shooter livestreamed his attack on two New Zealand mosques, killing 50 people. In a series of tweets, Facebook’s Mia Garlick said a total of 1.2 million videos were blocked at the point of upload. Videos that included “praise or support” from the attack were also removed, she said, using a mix of automated technologies — like audio detection — and human content moderators. Facebook did not say why the 300...
Tags: Security, Facebook, Islamic State, Social Media, Tech, New Zealand, Photo Sharing, Sheryl Sandberg, World Wide Web, Facebook Twitter, Garlick, Christchurch New Zealand, Jacinda Ardern, Facebook Newsroom, Ardern, Mia Garlick