24 Jan 2020

Google: Flaws in Apple’s Private-Browsing Technology Allow for Third-Party Tracking

Apple designed technology to keep its customers safe and prevent them from being tracked when they search the web, but according to Google researchers, the preventative technology is riddled with security flaws. Google researchers found that Safari’s Intelligent Tracking Program allows third parties to track people’s browsing behavior. The Financial

Read More
24 Jan 2020

Bipartisan Coalition Bill Introduced to Reform NSA Surveillance

A coalition of US lawmakers introduced new bipartisan legislation that aims to protect Americans from government surveillance, such as that run by the NSA. The bill, named Safeguarding Americans’ Private Records Act, was introduced today by Senators Wyden and Daines in the upper chamber while Representatives Lofgren, Davidson, and Jaypal

Read More
24 Jan 2020

New York state wants to ban government agencies from paying ransomware demands

Last week, New York state senators proposed two bills that would ban local entities from using taxpayer money to meet ransomware demands sent by threat actor groups. The bills were proposed within two days of each other, with bill S7246 introduced on the 14th and bill S7289 on the 16th.

Read More
23 Jan 2020

Thousands of WordPress Sites Hacked to Fuel Scam Campaign

Over 2,000 WordPress sites have been hacked according to website security firm Sucuri. Sucuri analysts detected attackers exploiting vulnerabilities in plugins used by many WordPress customers to add additional features to their operations. The analysts detected the vulnerabilities in the third week of January. The hacks were purported to fuel

Read More
23 Jan 2020

Microsoft Exposes 250M Customer Support Records on Leaky Servers

Microsoft recently publicly disclosed a security breach that was a result of a misconfigured internal customer support database. The breach caused the exposure of approximately 250 million customer support and service records, many of which contained personally identifiable information. Microsoft stated that their investigation concluded that a change made to

Read More
23 Jan 2020

Email malware targets U.S. senator and military

Emotet, a powerful email malware, is being used to attack US government targets. Cybersecurity researchers reported that they are witnessing a resurgence in the malware’s popularity, particularly towards government entities. The malware attacks are spread through email and are able to infiltrate other contacts within the inbox. According to research,

Read More
23 Jan 2020

Facebook Crime Rises 19% as UK Tries to Police Social Media

In the UK, the government has plans to police social media. The government plans to issue sites with a new code of conduct requiring firms to protect children from viewing any content deemed to be detrimental to their wellbeing or mental health. A report published yesterday outlining the potential policies.

Read More
22 Jan 2020

Bezos’s Phone Hacked By Saudi Crown Prince, Report Says

Amazon CEO Jeff Bezos was allegedly hacked by Saudi Crown Prince Mohammed bin Salman in 2018, according to a report released on Tuesday. The Gaurdian reported that a malicious video file was sent from bin Salman to Bezos on WhatsApp resulted in the hack. The hack exposed large amounts of data from

Read More
22 Jan 2020

US Military Claimed ‘Success’ in Hacking ISIS: Documents

The US military released heavily redacted and previously top-secret documents that claimed the US Cyber Command successfully hacked ISIS, disrupting online propaganda efforts. The operation dates back to at least 2016, according to the security documents released Tuesday. The US military claimed that it had limited ISIS’s online efforts on

Read More
22 Jan 2020

Hacker Leaks More Than 500K Telnet Credentials for IoT Devices

A hacker has published credentials for more than 500,000 servers, home routers, and other devices. The leak is being advertised as the biggest leak of Telnet passwords to date. The leak also demonstrates the lack of security protocol upheld by Telnet as well as highlights persistent vulnerabilities in their networks.

Read More