Sunday, March 1, 2020

Hackers are actively exploiting zero-days in several WordPress plugins | ZDNet

WordPress is, by far, the most widely used website building technology on the internet. According to the most recent statistics, more than 35% of all internet websites run on versions of the WordPress CMS (content management system).

Due to its huge number of active installations, WordPress is a massive attack surface. Attempts to hack into WordPress sites are like a constant hum in the background of all internet traffic, going on at any given time.

logo
Publisher: ZDNet
Author: Catalin Cimpanu
Twitter: @ZDNet
Reference: (Read more) Visit Source



This may worth something:

Hackers send cryptocurrency exchange offline with DDoS attacks

Someone is disrupting cryptocurrency exchanges with Distributed Denial of Service attacks, with both Bitfinex and OKEx hit in the past 24 hours.

" I was not aware of the attack against OKEx yesterday. I'm interested to understand similarities," tweeted Bitfinex CTO Paulo Ardoino. "We've seen a level of sophistication that means a deep preparation from the attacker."

Seems the real attack. Attacker showed us his hand and allowed us to quickly prevent this from happening in the future, no matter the scale.

Publisher: Hard Fork | The Next Web
Date: 2020-02-28T15:21:17 00:00
Author: David Canellis
Twitter: @thenextweb
Reference: (Read more) Visit Source



Why hackers love email as top phishing target to steal your data

Mike Banic, the vice president of marketing for security firm Lookout is focused on protecting mobile devices, as opposed to laptops and desktops, since so much more of our work is being done on smartphones and tablets now.

Indeed, the smartphone belonging to Amazon CEO Jeff Bezos was likely hacked in 2019 by the Crown Prince of Saudi Arabia via a WhatsApp direct message, according to a United Nations investigation.

However, the free app is very basic. Features like safe browsing, theft alerts and customer service start at $2.99 monthly and go to $9.99 monthly.

Publisher: USA TODAY
Author: Jefferson Graham
Reference: (Read more) Visit Source



Clearview AI hack exposes facial recognition company's client list

Clearview AI , the creepy facial-recognition company that scrapes your photos from social media, has been hacked.

According to a report by The Daily Beast , hackers accessed data including "its entire list of customers, the number of searches those customers have made and how many accounts each customer had set up."

Yes, a company primarily focused on cybersecurity was hit with a data breach. Not a great look, guys!

In a notice sent to clients, which was reviewed by The Daily Beast, the company claimed there was "no compromise of Clearview's systems or network," the breach was fixed, and that none of the clients' search histories were accessed.

logo
Publisher: Mashable
Date: 2020-02-26T10:41:59-08:00
Author: Marcus Gilmer
Twitter: @mashable
Reference: (Read more) Visit Source



Not to change the topic here:

3 essential ways to protect your home security cameras from hackers | Fox News

Luckily, securing your connected cameras isn’t difficult once you know what to do. Step one? Let’s lock down your accounts.

* * *

Beyond that, consider the bigger picture. How secure is your router? If you haven’t adjusted its settings recently, I bet you have a few to change.

Your router isn’t the only thing that requires the latest software. Be sure your camera, doorbell or security system is updated, too. This is as easy as connecting to the internet, checking for updates and hitting “install."

Publisher: Fox News
Date: 2020-02-27
Twitter: @foxnews
Reference: (Read more) Visit Source



Hacked home devices: Protecting your home against hackers invading your smart devices | KRCR
Publisher: KRCR
Date: 2020-02-02T19:51:47 00:00
Author: Sade Browne
Twitter: @KRCR7
Reference: (Read more) Visit Source



How a hacker's mom broke into prison—and the warden's computer | Ars Technica

In fairness, it was Rita Strand's idea. Then 58, she had signed on as chief financial officer of Black Hills the previous year after three decades in the food service industry. She was confident, given that professional experience, that she could pose as a state health inspector to gain access to the prison. All it would take was a fake badge and the right patter.

"She approached me one day and said 'You know, I want to break in somewhere," says Strand, who is sharing the experience this week at the RSA cybersecurity conference in San Francisco. "And it's my mom, so what am I supposed to say?"

Publisher: Ars Technica
Author:
Twitter: @arstechnica
Reference: (Read more) Visit Source



Stealing advanced nations' Mac malware isn't hard. Here's how one hacker did it | Ars Technica

SAN FRANCISCO—Malware developers are always trying to outdo each other with creations that are stealthier and more advanced than their competitors'. At the RSA Security conference this week, a former hacker for the National Security Agency demonstrated an approach that's often more effective: stealing and then repurposing a rival's code.

Patrick Wardle, who is now a security researcher at the macOS and iOS enterprise management firm Jamf, showed how reusing old Mac malware can be a smarter and less resource-intensive approach for deploying ransomware, remote access spy tools, and other types of malicious code. Where the approach really pays dividends, he said, is with the repurposing of advanced code written by government-sponsored hackers.

Publisher: Ars Technica
Author:
Twitter: @arstechnica
Reference: (Read more) Visit Source



No comments:

Post a Comment