This may worth something:
Couple whose 8-year-old daughter was taunted by Ring hacker sues
Two couples who say their home security cameras were hacked filed a class-action lawsuit against Ring LLC for invasion of privacy and negligence.
Ashley LeMay and her husband, Dylan Blakeley, said in December that a stranger hacked a camera they set up in their 8-year-old daughter's bedroom and taunted the child . Todd Craig and his girlfriend, Tania Amador, said that same month a hacker threatened them with "termination" if they did not pay a ransom.
Hackers on the other side of the world can take control of your vehicle
Fact is, computer hackers on the other side of the world potentially could — while you're driving — crash your navigation system, cut your brakes, disrupt your steering or remotely take control of the entire vehicle. Hackers do not need to be in close proximity; all they need is something as simple as internet connectivity. Cars have become heavily connected to the internet.
* * *
That's why automakers in Detroit, Germany, France, China and Japan are aggressively working to monitor technology protections in private cars, trucks and SUVs connected to the global internet to provide navigation assistance and so much more.
If you haven't shored up that Citrix hole, you were probably hacked over the weekend: Exploit
Those admins who haven't put mitigations in place by now will want to make sure they address their situation immediately, as infosec researchers have now publicly shared working exploit code for the remote takeover bug. The proof-of-concept code can be used to trivially achieve arbitrary code execution with no account credentials – hijack systems, in other words – via a directory traversal.
People's honey pots are being actively attacked, so if you haven't put in place the mitigations by now, and you have vulnerable systems facing the internet, you were probably hacked over the weekend by miscreants mass-scanning the 'net for machines to compromise. A thread tracking technical aspects of the vulnerability is here .
Check out this next:
Tax season is underway: How to avoid hackers when you file online
ROANOKE, Va. – The IRS is trying to make it easier for you to file your taxes online for free and not get scammed in the process.
Many have already started preparing to file their taxes -- which is good if you want to avoid hackers.
Kathy Pickering, chief tax officer for H&R Block said, "Your W-2′s are coming in, in the mail. Maybe, you're starting to get some bank statements with that year-end tax information."
The IRS has put new protections in place prohibiting Turbo Tax and other companies' free filing software from showing up in Google searches. This way, the next time you search for any online tax filing apps, you should be able to easily find and use the free software.
Government Website Is Hacked With Pro-Iran Messages - The New York Times
"Hacked by Iran Cyber Security Group Hackers," text on the website read before it was put back online. "This is only small part of Iran's cyber ability!"
It was not immediately clear if the attack had come from Iran or if the country had ordered it. Mr. Somerset said the office "continues to coordinate with the appropriate authorities to investigate the origins of the intrusion."
A spokeswoman for the Cybersecurity and Infrastructure Security Agency, which is under the Department of Homeland Security, said in a statement that there was no confirmation that hackers sponsored by Iran were behind the attack.
Tesla Invites Hackers To Compete | PYMNTS.com
To challenge hackers to find flaws in its vehicles, Tesla , the electric automaker, is returning to the Pwn2Own hacking competition run by Trend Micro 's Zero Day Initiative (ZDI), electrek reported.
* * *
"Driving off with a brand-new Model 3 will be a harder challenge this year, which means the potential rewards will be much higher as well," ZDI said in a press release. "Microsoft also returns as partner and VMware returns as a sponsor with their somewhat more traditional Pwn2Own targets. All told, more than $1,000,000 USD in cash and prizes are available to contestants, including the new Tesla car."
TikTok vulnerability could have let hackers access users' videos - The Verge
Check Point Research says it was able to spoof text messages to users that appeared to come from TikTok
Cybersecurity research firm Check Point Research says it found "multiple vulnerabilities" within video sharing app TikTok that demonstrated its insecurity as scrutiny for the Chinese-owned company continues to grow.
Check Point says it notified TikTok's parent company about the security vulnerabilities in November, and the app has since fixed the problem.
Happening on Twitter
A hacking group sponsored by Iran's government been trying to guess passwords for hundreds of accounts linked to US… https://t.co/yVEyOZ5KNA techreview (from Cambridge, MA) Mon Jan 13 13:49:17 +0000 2020
A hacking group sponsored by Iran's government has been trying to get access to American electric utilities for at… https://t.co/lHYmilZ2J5 techreview (from Cambridge, MA) Mon Jan 13 14:15:25 +0000 2020
Trump re-election campaign targeted by Iran-linked hackers: sources | Article [AMP] | Reuters https://t.co/8FUKYbLqeV TrueFactsStated (from DC and on the road. ) Tue Jan 07 18:31:07 +0000 2020
No comments:
Post a Comment