08 Feb 2019

No talks between Trump and China’s Xi before trade deadline

Contrary to a statement made by the U.S. president last week, Donald Trump has now said that he will not be meeting with his Chinese counterpart Xi Jinping before March 1, which is the deadline set by both leaders for the negotiation of a new trade deal between their countries. President

Read More
08 Feb 2019

How Americans Leave their Personal Info Open to Thieves

According to a new survey by CreditCards.com, Americans are greatly concerned about identity theft, yet 9 in 10 people engage in risky data security behavior. A whopping 82% of survey respondents indicated that they reused passwords for different user accounts in the past year, with 22% of them stating that they

Read More
08 Feb 2019

Business Email Compromise Attacks See Almost 500% Increase

A new report by Proofpoint indicates that business email compromise (BEC) scams surged 476% between between Q4 2017 and Q4 2018. Moreover, that same period saw a 226% increase of email fraud attempts targeting businesses.. Other key findings of the research where a dramatic increase (442%) of phishing attacks involving fake social

Read More
08 Feb 2019

Australia and US seize largest ever meth shipment

In a “historic seizure”, US authorities have confiscated a record amount of about 1.7 tons of methamphetamine in California last month. Smaller amounts of cocaine and heroin were also seized. The US cooperated with Australian police to stop the shipment of Australia-bound drugs, which was worth $911 million. As part of the

Read More
08 Feb 2019

Security vulnerabilities in video conferencing devices could be remotely exploited by hackers

Security researchers with Trustwave have spotted serious security flaws in four connected video conferencing products by Lifesize. The vulnerabilities could enable threat actors to remotely take control of the devices and access audio and video recordings. The affected products are Lifesize Team, Lifesize Room, Lifesize Passport and Lifesize Networker. Lifesize is

Read More
08 Feb 2019

U.S. Reduces Military Aid to Cameroon Over Human Rights Abuses

In response to mounting accusations of human rights abuses by Cameroon, the US Department of Defense (DoD) is decreasing its military aid to the Central African country, a strategically important ally in the battle against terrorism in the region. The US had been providing assistance to help Cameroon fight secessionist and

Read More
08 Feb 2019

Google Spots Attacks Exploiting iOS Zero-Day Flaws

On Thursday, Apple released iOS 12.1.4, the latest version of it’s mobile operating system, which patches four discovered security holes. Two of the vulnerabilities were connected to the recently uncovered FaceTime bug that allowed users to turn on the microphone and camera of the person they were calling. The other

Read More
07 Feb 2019

Which Countries Have the Worst and Best Cybersecurity?

A new study by Comparitech ranking the cybersecurity performance of 60 countries, shows that there is no clear top performer and that there is ample room for improvement everywhere. The study looked at a wide variety of categories, including mobile and computer malware infections, cyberattack preparedness and cybersecurity legislation. In

Read More
07 Feb 2019

Chinese Hackers Spy on U.S. Law Firm, Major Norwegian MSP

Between November 2017 and September 2018, Chinese hackers stole intellectual property or valuable business information from a U.S. law firm, a large Norwegian provider of IT services and an international apparel business. Recorded Future uncovered the campaign, which was carried out by APT10, a notorious hacking group with links to the Chinese government.

Read More
07 Feb 2019

Pentesters breach 92 percent of companies, report claims

Findings from a new report by Positive Technologies imply that nearly all organizations can be breached. A whopping 92% of all the penetration tests carried out by the firm’s researchers last year, resulted in the researcher breaking into the internal network of the organization under scrutiny. In most cases, Internet-connected web

Read More