Friday, December 27, 2019

Ring sued by man who claims camera was hacked and used to harass his kids | Technology | The

A man in Alabama is suing the Amazon-owned home security company Ring, claiming his internet-connected camera was hacked and used to harass his children.

Ring user John Baker Orange purchased a Ring camera in July 2019 and in recent weeks allegedly experienced a chilling cybersecurity breach involving his children aged seven, nine, and 10, according to the lawsuit.

"Recently, Mr Orange's children were playing basketball when a voice came on through the camera's two-way speaker system", the lawsuit said. "An unknown person engaged with Mr Orange's children commenting on their basketball play and encouraging them to get closer to the camera".

logo
Publisher: the Guardian
Date: 2019-12-27T20:39:01.000Z
Author: Kari Paul
Twitter: @guardian
Reference: (Read more) Visit Source



While you're here, how about this:

Pensacola Ransomware: Hackers Release 2GB Data as a Proof

Hackers who carried out Maze Ransomware attack in the Pensacola city of Florida have released two gigabytes of data files stolen before encrypting the data on the internet. This was done to prove that they possessed credible data which could be put up for sale on the dark web. They held the media responsible for this as they called them names and instigated to take such drastic steps.

On Saturday December 7, the Pensacola city of Florida was hit by a cyber-attack that forced the city to suspend majority of its networks. At the time, severity and critical nature of the attack was not known and the City's IT employees worked tirelessly to restore services. It was later confirmed that the outage was caused by a ransomware attack.

Publisher: CISO MAG | Cyber Security Magazine
Date: 2019-12-27T11:52:07+00:00
Twitter: @cisomag
Reference: (Read more) Visit Source



More than 3,000 Ring doorbell accounts may be vulnerable to hackers—here's what you need to know

Ring has denied the data exposure involved the company's own system. A spokesperson told Consumer Reports that there's "no evidence of an unauthorized intrusion or compromise of Ring's systems or network."

Publisher: KTNV
Date: 2019-12-27T16:50:15
Twitter: @KTNV
Reference: (Read more) Visit Source



Hackers have a new target: Your car - Komando.com

Have you turned your house into a "smart home" yet? Millions of Americans have already started making the switch and most love the convenience that comes with it.

Smart technology doesn't end when you walk out the door. It's now made its way to most modern vehicles — but there's a problem. Hackers are now targeting smart cars and there really isn't anything to stop them.

Is your smart car vulnerable to cyberattacks? According to new research published in the "Journal of Crime and Justice," the answer is an unequivocal "yes."

Publisher: Komando.com
Date: 2019-12-26T23:00:00+00:00
Twitter: @kimkomando
Reference: (Read more) Visit Source



In case you are keeping track:

Fallout 76's Christmas is interrupted by inventory-stealing hackers - Polygon

Fallout 76 has been rocked by yet another major bug that played out just before Christmas. Hackers were able to open up the inventory of other players and help themselves to everything within, as if the player was a loot chest. This is obviously a major problem, as the hackers could take everything a player had earned.

* * *

Bethesda has responded on the Fallout 76 subreddit on Dec. 24, with a post entitled " An Update on the Current PC Exploit ".

Publisher: Polygon
Date: 2019-12-26T12:36:11-05:00
Author: Cass Marshall
Twitter: @Polygon
Reference: (Read more) Visit Source



How Passwords Get Hacked - Security Boulevard

Unfortunately, complex means a bit more than replacing the letter " a " with an " @ " or an " ! " in place of an " i ." Adding a couple random numbers won't work either. Many people use these tricks and hackers are well aware of them. This hardening technique may buy you a couple extra seconds against a hacker, but they can still get in.

Publisher: Security Boulevard
Date: 2019-12-26T17:13:05+00:00
Twitter: @securityblvd
Reference: (Read more) Visit Source



Chinese hacking group has found new way to bypass two-factor authentication - SiliconANGLE

The hack was detailed late last week by security researchers from Fox-IT Holding B.V. APT20, the group behind the campaign, targets web servers as the first point of entry with a particular focus on Jboss.

Where it gets interesting is that the researchers claim they found evidence that APT20 was gaining access to VPN accounts that were protected by 2FA. Hacking 2FA isn’t new, and the process involved is somewhat complicated , but APT20 is said to have found a new way to bypass the process.

logo
Publisher: SiliconANGLE
Date: 2019-12-24T20:59:01-05:00
Twitter: @SiliconANGLE
Reference: (Read more) Visit Source



Trolls, Hackers, Spies: The Cyber Decade - VICE

It occurred to us at Motherboard that for this final episode of CYBER in the 2010s we could recount the year in stories that we've done. The real scoops , traffic hogs , and think pieces . But then again, this is the decade that changed infosec. This was the decade that made hackers critical players on the world stage, our personal digital information sacred, and our political systems fixed into some strange, social media hellscape.

* * *

So on this episode of CYBER, our dear editor-in-chief Jason Koebler and host Ben Makuch will take you through from the beginning of the decade to its end: from Guy Fawkes masks, strings of weaponized code to your brain being manipulated by a Facebook ad.

Publisher: Vice
Date: 2019-12-26T15:00:00Z
Author: Ben Makuch
Twitter: @vice
Reference: (Read more) Visit Source



Happening on Twitter

No comments:

Post a Comment