Monday, November 11, 2019

Hackers are now targeting councils and governments, threatening to leak citizen data

Assistant Professor at College of Emergency Preparedness, Homeland Security and Cybersecurity, University at Albany, State University of New York

Roberto Musotto received funding from H2020. He is affiliated with the Cyber Security Research Cooperative Centre (CSCRC).

Brian Nussbaum is an assistant professor at the College of Emergency Preparedness, Homeland Security and Cybersecurity (CEHC) at the University at Albany, a cybersecurity fellow with the think tank New America, and an affiliate scholar with the Center for Internet and Society (CIS) at Stanford Law School.

logo
Publisher: The Conversation
Date: 20191111
Author: Brian Nussbaum
Twitter: @ConversationEDU
Reference: (Read more) Visit Source



Many things are taking place:

Team of hackers found vulnerabilities in Amazon Echo, Galaxy S10

A team of leading security researchers was recently crowned top hackers after finding vulnerabilities across multiple devices including an Alexa-powered Amazon Echo and a Samsung Galaxy S10.

Amat Cama and Richard Zhu, who go by Team Fluoroacetate, compromised the devices at an international bug bounty event called Pwn2Own in Tokyo late last week. The event, hosted by Zero Day Initiative, is home to "white hat" hackers who are paid top dollar if they find previously unknown bugs in gadgets supplied by big tech companies.

Publisher: USA TODAY
Author: Dalvin Brown
Reference: (Read more) Visit Source



The week in security: Keeping up with the hackers - CSO | The Resource for Data Security

Less than a third of organisations believe they can effectively deal with a new cybersecurity threat within a month, according to new research that highlights the continued vulnerability of today's businesses in the context of escalating cybersecurity threats.

Still other threats are internal, with hackers exploiting employees' credentials for a range of activities – but EDR tools offer much better visibility of suspicious behaviour that can help security staff pinpoint a potential network breach much faster.

Date: Monday, 11th November 2019
Twitter: @CSO_Australia
Reference: (Read more) Visit Source



From bogans to bubble tea: The Wellington hacker war that wasn’t | The Spinoff

What’s the once staunchly metal hacker convention Kiwicon doing swapping skulls for stuffed toys, and what’s the deal with the new con on the block? Alex Stronach reports.  It starts with hackers, pyrotechnics, and an alpaca in a party hat.

* * *

It’s June 2019, and every Kiwi pundit is grappling with a question they’re critically under-equipped to answer: just what is hacking? Did National hack the budget? Was Grant Robertson a liar when he claimed to have been hacked? The budget breach disappeared from the headlines without anybody ever answering those questions, but I wasn’t happy, so I kept asking. My questions took me to Kawaiicon, and Kawaiicon was a story of its own.

Publisher: The Spinoff
Date: 2019-11-11T10:09:59+13:00
Author: Alexander Stronach
Twitter: @TheSpinoffTV
Reference: (Read more) Visit Source



This may worth something:

Ring Doorbell Security Flaw Opened the Door to Hackers | Digital Trends

"Once this network is up, the app connects to it automatically, queries the device, then sends the credentials to the local network. All these exchanges are performed through plain HTTP. This means the credentials are exposed to any nearby eavesdroppers," the case study reads.

The hacker is able to trick the Ring device into malfunctioning, therefore causing the homeowner to try to reconfigure it, which is when a nearby hacker can slip into the network and gain access and possibly organize a larger attack against the network.

Publisher: Digital Trends
Date: 2019-11-07T09:43:54-08:00
Twitter: @digitaltrends
Reference: (Read more) Visit Source



We asked a hacker to try and steal a CNN tech reporter's data. Here's what happened - CNN
Publisher: CNN
Date: 2019-10-18T12:52:19Z
Author: Story by Donie O CNN Business Video by Samantha Guff John General and Richa Naik
Reference: (Read more) Visit Source



Hackers shut down Johannesburg's networks once again - MIT Technology Review

"I actually think Johannesburg is doing the right thing here," said Allan Liska, an analyst at the security company Recorded Future. "They aren't sure of the extent of the attack so they are shutting down systems to conduct an effective incident response. It is incredibly inconvenient for their constituents, but that abundance of caution will allow the city to effective assess any weak points and hopefully patch them before real damage can be done."

The exact details of that attack remain unclear as well, and banking services have been disrupted to some extent, but the banks say no data breach or risk to customers has occurred. It's unknown if the two incidents are related or represent two separate hacking groups crossing paths as they simultaneously target South Africa's capital city.

Publisher: MIT Technology Review
Date: 2019-10-25T15:31:15-04:00
Twitter: @techreview
Reference: (Read more) Visit Source



Just like WhatsApp, chats on Telegram and Signal are also vulnerable to hackers

Unlike WhatsApp and Apple iMessage, Telegram conversations aren't encrypted end-to-end by default Telegram follows a conventional approach of using a Cloud storage for its data

logo
Publisher: _____
Date: 2019-11-11T06:24:42+05:30
Reference: (Read more) Visit Source



Happening on Twitter

No comments:

Post a Comment

Featured Post

⁘Kim Is Fuming⁘: Kim Kardashian Reportedly Outraged Over Kanye West's Wife Bianca...

Kim Kardashian reportedly continues to have issues with her ex-husband, Kanye ⁘Ye⁘ West, over h...

Popular Posts