WordPress is, by far, the most widely used website building technology on the internet. According to the most recent statistics, more than 35% of all internet websites run on versions of the WordPress CMS (content management system).
Due to its huge number of active installations, WordPress is a massive attack surface. Attempts to hack into WordPress sites are like a constant hum in the background of all internet traffic, going on at any given time.
This may worth something:
Hackers send cryptocurrency exchange offline with DDoS attacks
Someone is disrupting cryptocurrency exchanges with Distributed Denial of Service attacks, with both Bitfinex and OKEx hit in the past 24 hours.
" I was not aware of the attack against OKEx yesterday. I'm interested to understand similarities," tweeted Bitfinex CTO Paulo Ardoino. "We've seen a level of sophistication that means a deep preparation from the attacker."
Seems the real attack. Attacker showed us his hand and allowed us to quickly prevent this from happening in the future, no matter the scale.
Why hackers love email as top phishing target to steal your data
Mike Banic, the vice president of marketing for security firm Lookout is focused on protecting mobile devices, as opposed to laptops and desktops, since so much more of our work is being done on smartphones and tablets now.
Indeed, the smartphone belonging to Amazon CEO Jeff Bezos was likely hacked in 2019 by the Crown Prince of Saudi Arabia via a WhatsApp direct message, according to a United Nations investigation.
However, the free app is very basic. Features like safe browsing, theft alerts and customer service start at $2.99 monthly and go to $9.99 monthly.
Clearview AI hack exposes facial recognition company's client list
Clearview AI , the creepy facial-recognition company that scrapes your photos from social media, has been hacked.
According to a report by The Daily Beast , hackers accessed data including "its entire list of customers, the number of searches those customers have made and how many accounts each customer had set up."
Yes, a company primarily focused on cybersecurity was hit with a data breach. Not a great look, guys!
In a notice sent to clients, which was reviewed by The Daily Beast, the company claimed there was "no compromise of Clearview's systems or network," the breach was fixed, and that none of the clients' search histories were accessed.
Not to change the topic here:
3 essential ways to protect your home security cameras from hackers | Fox News
Luckily, securing your connected cameras isn’t difficult once you know what to do. Step one? Let’s lock down your accounts.
* * *
Beyond that, consider the bigger picture. How secure is your router? If you haven’t adjusted its settings recently, I bet you have a few to change.
Your router isn’t the only thing that requires the latest software. Be sure your camera, doorbell or security system is updated, too. This is as easy as connecting to the internet, checking for updates and hitting “install."
Hacked home devices: Protecting your home against hackers invading your smart devices | KRCR
How a hacker's mom broke into prison—and the warden's computer | Ars Technica
In fairness, it was Rita Strand's idea. Then 58, she had signed on as chief financial officer of Black Hills the previous year after three decades in the food service industry. She was confident, given that professional experience, that she could pose as a state health inspector to gain access to the prison. All it would take was a fake badge and the right patter.
"She approached me one day and said 'You know, I want to break in somewhere," says Strand, who is sharing the experience this week at the RSA cybersecurity conference in San Francisco. "And it's my mom, so what am I supposed to say?"
Stealing advanced nations' Mac malware isn't hard. Here's how one hacker did it | Ars Technica
SAN FRANCISCO—Malware developers are always trying to outdo each other with creations that are stealthier and more advanced than their competitors'. At the RSA Security conference this week, a former hacker for the National Security Agency demonstrated an approach that's often more effective: stealing and then repurposing a rival's code.
Patrick Wardle, who is now a security researcher at the macOS and iOS enterprise management firm Jamf, showed how reusing old Mac malware can be a smarter and less resource-intensive approach for deploying ransomware, remote access spy tools, and other types of malicious code. Where the approach really pays dividends, he said, is with the repurposing of advanced code written by government-sponsored hackers.
No comments:
Post a Comment