Friday, December 20, 2019

Ring Doorbell & Camera Account Hacking - Consumer Reports

A Ring spokesperson told Consumer Reports that the data exposure didn't involve the company's own system. There is "no evidence of an unauthorized intrusion or compromise of Ring's systems or network," the spokesperson said.

Ring doesn't require users to do so, however. Ring's head of communications, Yassi Shahmiri, declined to comment on why Ring doesn't require the use of two-factor authentication. 

The set of stolen login information also came with other account information, such as the names of cameras and users' timezones. "All that information is accessible if you have someone's credentials," Shahmiri said.

Publisher: Consumer Reports
Date: 2019-12-20T00:50Z
Twitter: @consumerreports
Reference: (Read more) Visit Source



This may worth something:

Member of 'The Dark Overlord' hacking group extradited to the US | ZDNet

A British man was extradited to the US this week to face charges of hacking and extorting US companies while part of an infamous hacking group known as The Dark Overlord (TDO).

According to court documents, US authorities believe Wyatt was one of the many TDO members who, since 2016, have been hacking US companies, stealing their data, and asking for huge ransoms.

However, the group's hacking activity is way broader. Since early 2016, TDO has claimed responsibility for tens of hacks. Below is a list of breaches for which the group has publicly taken credit, and which received media coverage.

logo
Publisher: ZDNet
Author: Catalin Cimpanu
Twitter: @ZDNet
Reference: (Read more) Visit Source



Apple Confirms iPhone Hacking Reward Of $1.5 Million

The point is that every operating system, every application, has the potential to come complete with vulnerabilities that can be exploited if found. I'd go so far as to say you could probably remove the "potential" bit of that statement; just because a vulnerability hasn't been found yet, doesn't mean it's not there.

Things continue nice and easy with a requirement of being the first person to report the issue if you want the reward and agreeing not to disclose it before the official Apple security advisory is made public. The requirement for a clear report with a working exploit might take some researchers by surprise. Quite often, a security researcher will provide what's known as a "proof of concept" when reporting a vulnerability, this details how an exploit might work in theory.

Publisher: Forbes
Date: 2019-12-20
Author: Davey Winder
Twitter: @forbes
Reference: (Read more) Visit Source



Hackers Raise the Stakes By Possibly Causing Physical Harm - Lexology

Computer hacking, and the permutation of crimes that can be committed by hackers, generally does not spur images of infliction of physical harm. However, in a chilling turn of events, computer hackers have opened a new front in the damage that can be inflicted through cybercrime.

In an attack that appears motivated more in an attempt to inflict physical harm, as opposed to simply hacking for financial gain, the Epilepsy Foundation announced on December 16, 2019 that it had filed a formal criminal compliant after the organization’s Twitter feed was hacked. The Foundation reported that a series of attacks were ‘designed to trigger seizure(s)’.

Reference: (Read more) Visit Source



Check out this next:

Bloomberg - Are you a robot?
Reference: (Read more) Visit Source



Meet Cliff Stoll, the Mad Scientist Who Invented the Art of Hunting Hackers | WIRED

In 1986, Cliff Stoll's boss at Lawrence Berkeley National Labs tasked him with getting to the bottom of a 75-cent accounting discrepancy in the lab's computer network, which was rented out to remote users by the minute. Stoll, 36, investigated the source of that minuscule anomaly, pulling on it like a loose thread until it led to a shocking culprit: a hacker in the system.

* * *

In fact, Stoll is an unlikely legend for his cybersecurity industry admirers. On the day I visited Stoll in his Oakland home last month, just a few days after the 30th anniversary of The Cuckoo's Egg 's publication, he had spent the morning watching Mercury transit the Sun with his telescope. Stoll has a PhD in planetary astronomy and had intended to make stargazing his career before Lawrence Berkeley transferred him—not entirely voluntarily—into the IT department.

Publisher: Wired
Author: Andy Greenberg
Twitter: @wired
Reference: (Read more) Visit Source



Ransomware Hackers Are Testing Local Governments Demanding Big Payments | Information Security

Ransomware attacks in the UK are on the rise, how can local governments best prepare for the eventuality of a ransomware hit?

Most local governments are forced to assign IT budgets and resources to improve services through next-generation technologies like 5G networks, IoT, and cloud computing. In the process, their operations and data are becoming more connected through local and global networks, and their IT professionals are overwhelmed by IT data regulations and demand for innovation. There's little time or resources left to protect their networks.

Publisher: Information Security Buzz
Date: 2019-12-20T13:55:14+00:00
Twitter: @Info_Sec_Buzz
Reference: (Read more) Visit Source



Visa warns drivers to watch out for 'concerning trend' of hacked gas pumps - MarketWatch

While a record-breaking number of Americans are expected to travel to friends and family and getaways this holiday season, they'll need to be on guard for hackers who might try accessing their personal data along the way.

There are some simple precautions that can help you avoid, or at least quickly spot, a cyberattack that could spoil your holiday travel plans.

Two cyberattacks over the summer targeted the point-of-sale systems on gas pumps in North America, according to a December security alert from Visa V, +0.45% , the payment technology giant. "It is likely these merchants are an increasingly attractive target for cybercrime groups," according to Visa's notice .

logo
Publisher: MarketWatch
Date: 2019-12-20T08:48:00-05:00
Author: Andrew Keshner
Twitter: @624413
Reference: (Read more) Visit Source



Happening on Twitter

No comments:

Post a Comment