Tuesday, December 17, 2019

Somebody’s Watching: Hackers Breach Ring Home Security Cameras - The New York Times

Ashley LeMay and Dylan Blakeley recently installed a Ring security camera in the bedroom of their three daughters, giving the Mississippi parents an extra set of eyes — but not the ones that they had bargained for.

Four days after mounting the camera to the wall, a built-in speaker started piping the song "Tiptoe Through the Tulips" into the empty bedroom, footage from the device showed.

When the couple's 8-year-old daughter, Alyssa, checked on the music and turned on the lights, a man started speaking to her, repeatedly calling her a racial slur and saying he was Santa Claus. She screamed for her mother.

Date: 2019-12-15T18:54:26.000Z
Reference: (Read more) Visit Source



Were you following this:

Smart cars vulnerable to hackers

East Lansing, MI (WILX) -- Hackers can hack just about anything, from your cellphone, computer and possibly even a smart car.

Smart cars have opened up a world of possibilities when it comes to transportation and technology, but according to new research by Michigan State University, it has also opened a backdoor for hackers.

Research from MSU shows cracks in cyber security that people aren't aware of when it comes to smart cars.

Date: 9CD4A96D8A076527F07FD24CFCDE5489
Author: Sarah Clinkscales
Twitter: @WILXTV
Reference: (Read more) Visit Source



How to protect your Amazon Ring camera against hackers - Business Insider

Grainy security footage shows an 8-year-old girl in her bedroom when an unfamiliar voice begins addressing her over the speaker. The stranger talks her, taunting her and claiming to be Santa Claus, before the voice cuts off.

The chilling episode is just the latest in a series of hacks that have targeted Ring cameras, Amazon's internet-enabled home security cameras.

Cybersecurity experts told Business Insider there are straightforward steps Ring owners can take to secure their devices from similar attacks.

logo
Publisher: Business Insider
Date: 2019-12-16
Author: Aaron Holmes
Twitter: @sai
Reference: (Read more) Visit Source



Hackers attack Galt city computer systems | abc10.com

GALT, Calif. — Hackers have crippled key computer systems for the city of Galt in pursuit of a ransom payment, city officials announced Tuesday.

"It's having a significant impact by way of our employees," Galt interim City Manager Tom Haglund explained. "They can't access any computer systems. Our telephone system is down. And, we can't receive or make phone calls into or out of the city,"

A ransomware attack is a type of malware that typically threatens to release private information unless a ransom is paid.

Publisher: KXTV
Date: 12/17/2019 8:37:50 PM
Twitter: @ABC10
Reference: (Read more) Visit Source



Check out this next:

Florida City Faces $1M Ransom by Hackers

A Florida city confirmed Friday that hackers seeking to extort money were responsible for crippling its computer systems earlier this week but officials have yet to decide whether they will pay a reported $1 million ransom.

If they do opt to fork over the money, they may have to dip into Pensacola city coffers; the city of about 52,000 in Florida’s Panhandle -whose annual budget is roughly $245 million – is not insured for such an attack.

logo
Publisher: Insurance Journal
Date: 2019-12-17T17:44:43-05:00
Twitter: @ijournal
Reference: (Read more) Visit Source



Hacker Hacks Hacking Platform, Gets Paid $20,000 By The Hacked Hackers

A hacker, and HackerOne community member, by the name of haxta4ok00, posted a report to the bug bounty platform on November 24, which stated: "i can read all reports @security and more program." The hacker, in broken English, was revealing something very worrying indeed. Namely that they had accessed a HackerOne security analyst's account and was able to read sensitive information as a result.

"While I commend HackerOne for their response," said Craig Young, a senior security researcher at Tripwire, "this incident is yet another reminder of a distinct risk organizations take by using managed vulnerability reporting services like BugCrowd or HackerOne." Anywhere that valuable data is consolidated will inevitably become, as Young said, "a hugely attractive attack target for intelligence agencies, or even criminal actors, to fill their arsenal."

Publisher: Forbes
Date: 2019-12-06
Author: Davey Winder
Twitter: @forbes
Reference: (Read more) Visit Source



Hackensack Meridian pays hackers after ransomware attack

Hackensack Meridian said that, "due to the frequency with which healthcare organizations are targeted by cyber criminals," it had a coverage plan in place to cover the costs associated with the cyberattack, including payment and recovery efforts. The system said it could not disclose the amount of the ransom payment due to confidentiality agreements.

In total, healthcare providers, health plans and their business associates have reported more than 450 breaches this year, according to data from HHS' Office for Civil Rights, the agency that maintains the government's database of healthcare breaches.

Publisher: Modern Healthcare
Date: 2019-12-16T11:37:27-0500
Author: Jessica Kim Cohen
Reference: (Read more) Visit Source



Report: Financial firms still losing customer data to malware and hackers - TechRepublic

Hacking and malware caused 75% of all the breaches, but accidental disclosures and insider threats are both up over 2018. Bitglass warns that for organizations that struggle with implementing proper security measures, moving to the cloud will lead to even more risk from both those factors.

Bitglass found that many big brands in financial services --American Express, SunTrust Bank, Capital One, Discover-- have had multiple breaches. American Express lost data in 2009, 2012, 2013, 2014, and 2019, while Capital One lost data four times in the last eight years. Capital One lost data from 106 million people in March 2019, making it the third largest breach recorded in US history.

Publisher: TechRepublic
Twitter: @TechRepublic
Reference: (Read more) Visit Source



Happening on Twitter

No comments:

Post a Comment