Friday, November 15, 2019

How can you protect yourself from hackers? An IBM social engineer offers advice - TechRepublic

See part one, IBM social engineer easily hacked two journalists' information ; part two, How cybercriminals trick you into giving your information over the phone ; and part three, How a hacker at IBM uses disguises and devices to steal private information .

Dan Patterson: All right, Stephanie, a large part of your job requires that you build trust, build a rapport, and you do that often by spoofing a phone number to appear as though it's coming from a trusted source. It could be a friend; it could be a family member; it could be a bank. All of us have seen these spam robocalls on our . Sometimes the robocalls that get me look as though they're coming from my number or a very similar number.

Publisher: TechRepublic
Twitter: @TechRepublic
Reference: (Read more) Visit Source



In case you are keeping track:

This App Will Tell You if Your iPhone Gets Hacked - VICE

A few years ago, Dan Guido's partner couldn't log into her bank account via the bank's official iPhone app. The app kept alerting her that her phone was not secure.

"Being a security guy, I freaked out," said Guido, who is the founder of the cybersecurity research firm Trail of Bits.

The bank's app, it turned out, was designed to detect iPhone hacks, but the detection code was buggy and "total garbage," according to Guido. That's when he and his colleagues decided to create a better tool to detect iPhone jailbreaks and hacks.

Publisher: Vice
Date: 2019-11-14T13:00:00Z
Author: Lorenzo Franceschi Bicchierai
Twitter: @vice
Reference: (Read more) Visit Source



Disney+ Users Getting Hacked, Login Information Sold Online

We just learned that some Disney+ users are reporting on Social Media that their accounts are showing unauthorized user profiles. These users are sharing that when they have logged into their accounts, they are seeing strange names and additional profiles that have been created and added to their account.

This isn't an uncommon problem. If you were to search eBay, you could find multiple listings for shared Hulu accounts. Thankfully, Hulu makes it easier to monitor this fishy activity. Hulu's settings allow you to see which devices are connected to the account and remove any that look suspicious, through their Manage Your Account section.

Publisher: Inside the Magic
Date: 2019-11-15T19:45:46+00:00
Author: https www facebook com EmilleEnchanted
Twitter: @InsideTheMagic
Reference: (Read more) Visit Source



Samsung, LG, Motorola Phones Hacked: New Qualcomm Security 'Hole' Puts Users At Risk

So what exactly is the TrustZone? Yaniv Balmas, Check Point's head of cyber research, explains that "TrustZone holds all your secrets—fingerprints, facial recognition, credit cards, passports, whatever secrets you can think of, these things are stored in TrustZone. Think of it as a safe manufactured by the chip manufacturer—in this case Qualcomm. The thing about this safe is the no-one knows other than Qualcomm how it is actually built. It's proprietary and no-one can see inside of it."

Publisher: Forbes
Date: 2019-11-14
Author: Zak Doffman
Twitter: @forbes
Reference: (Read more) Visit Source



While you're here, how about this:

WPI researchers discover weak spots for hackers in Intel, STM chips | Worcester Business Journal

Two Worcester Polytechnic Institute researchers and a team they lead have discovered what the school says are serious security vulnerabilities in computer chips affecting laptop, desktop and other users around the world.

The issues — which have since been addressed, WPI says — were in computer chips made by California-based Intel Corp. and the Swiss firm STMicroelectronics. The flaws would have allowed hackers to steal information supposed to be stored securely, compromising a computer's operating system.

Publisher: Worcester Business Journal
Twitter: @wbjournal
Reference: (Read more) Visit Source



How to stop public USB ports from hacking your phone

The L.A. County District Attorney’s office put out a scary warning this week: That USB charger provided at airports, hotels, or other public locations could be loaded with malware that will hack your charging phone or tablet, reports ZDNet .

While that sounds scary, it may be nothing to worry about. Back in 2013, security researchers showed that a minicomputer disguised as a USB charging brick could install data-stealing malware on iPhones, which at the time were running iOS 6 or earlier. Apple took notice and promptly closed the loophole in iOS 7 .

Publisher: Fast Company
Date: 2019-11-15T10:00:25
Author: Sean Captain
Twitter: @fastcompany
Reference: (Read more) Visit Source



The Evidence That Links Russia's Most Brazen Hacking Efforts | WIRED

Since the Russian military agency known as the GRU first entered the spotlight as the hackers that targeted the 2016 US election, it's become increasingly known as the actor behind much of the Kremlin's most brazen digital behavior. It's responsible for everything from the first-ever blackout triggered by hackers —turning off the power to a quarter million Ukrainians in December 2015—to NotPetya, the worst cyberattack in history , a worm that inflicted $10 billion in damage.

Publisher: Wired
Author: Condé Nast
Twitter: @wired
Reference: (Read more) Visit Source



From Hail Storms to Hackers: Is America's Power Grid Secure?

That’s a lot of power, and it takes a lot of nonstop work to keep it flowing. But how safe is America’s power grid from cyberattacks and other disruptions?

Cyberintrusions are no longer a theoretical possibility. In March, hackers succeeded in breaching a utility that serves portions of California, Utah and Wyoming. The attack lasted 10 hours and disabled control systems for more than 500 megawatts of wind and solar power – enough generating capacity for several hundred thousand homes.

logo
Date: 2019-11-15
Author:
Twitter: @governing
Reference: (Read more) Visit Source



Happening on Twitter

No comments:

Post a Comment

Popular Posts