Tuesday, July 20, 2021

Biden Administration Blames Hackers Tied to China for Microsoft Cyberattack Spree - WSJ

The U.S. government has high confidence that hackers tied to the Ministry of State Security, or MSS, carried out the unusually indiscriminate hack of Microsoft Exchange Server software that emerged in March, senior officials said.

In addition, four Chinese nationals were indicted over a range of separate hacking intrusions dating back a decade that allegedly stole corporate and research secrets from firms and universities around the world.

logo
Publisher: WSJ
Date: 2021-07-20T01:27:00.000Z
Author: Dustin Volz and Aruna Viswanatha
Twitter: @WSJ
Reference: (Read more) Visit Source



Pegasus spyware leak shows how iPhones are vulnerable to hackers - Vox

If you were paying attention to the news over the weekend, you might have heard something about "Pegasus.

Does the average person really have to worry about the government of Azerbaijan breaking into their phone and listening to their conversations or surveilling them through their phone cameras? Probably not.

logo
Publisher: Vox
Date: 2021-07-19T17:00:00-04:00
Author: Sara Morrison
Twitter: @voxdotcom
Reference: (Read more) Visit Source



Biden Puts a $10M Bounty on Foreign Hackers | WIRED

A more aggressive form of internet censorship has played out this week in Cuba, as authorities disrupted access to major social media and messaging platforms like Facebook and WhatsApp in the face of ongoing civil unrest.

Don't forget to set aside a little time this weekend to make sure your web searches are private and secure .

Publisher: Wired
Date: July 17 2021
Author: Cond Nast
Twitter: @wired
Reference: (Read more) Visit Source



How Quickly Hackers Access, Use Your Personal Data Following A Data Breach

SALT LAKE CITY — You might already know that when personal information gets compromised in a data breach, it often ends up on the dark web where hackers can access it and use it. But do you know how quickly the cyber criminals can reach your data once it hits the dark web?

It could happen within an hour, a cybersecurity researcher told the KSL Investigators, in hopes of sharing this knowledge so we can better protect ourselves.

logo
Publisher: KSLTV.com
Date: 2021-07-20T01:13:21 00:00
Twitter: @ksl5tv
Reference: (Read more) Visit Source



Local Veteran shares how hackers stole over $10,000 in Bitcoin

WAUSAU, Wis. (NBC 26) -- A local veteran claims to have been robbed of thousands of dollars from his bank account, and over $10,000 dollars in Bitcoins. Karl Klimes says it happened when his computer was hacked, in just a matter of hours.

The software Klimes ultimately found on his computer is known as a keylogger program, software that records your most vulnerable information every step of the way.

Publisher: WGBA
Date: 2021-07-19T22:29:21.905
Author: https www nbc26 com eric crest
Twitter: @nbc26
Reference: (Read more) Visit Source



Hackers Got Past Windows Hello by Tricking a Webcam | WIRED

That's because you can't trust any old webcam to offer robust protections in how it collects and transmits data. Windows Hello facial recognition works only with webcams that have an infrared sensor in addition to the regular RGB sensor. But the system, it turns out, doesn't even look at RGB data.

Publisher: Wired
Date: July 16 2021
Author: Cond Nast
Twitter: @wired
Reference: (Read more) Visit Source



Bloomberg - Are you a robot?
Reference: (Read more) Visit Source



Iranian Hackers Target US Military, Defense Companies | Voice of America - English

Iran appears to be intensifying its effort to exploit U.S. and Western targets in cyberspace, running a campaign aimed at manipulating American military personnel and defense companies on social media.

Tehran's latest campaign, orchestrated on Facebook by a group known as Tortoiseshell, used a series of sophisticated, fake online personas to make contact with U.S. servicemembers and employees of major defense companies in order to infect their computers with malware and extract information.

Publisher: Voice of America
Date: 3286EE554B6F672A6F2E608C02343C0E
Twitter: @VOANews
Reference: (Read more) Visit Source



Hackers Trick Windows Hello With a Single Infrared Image | PCMag

Windows Hello encompasses three authentication methods: a user-generated PIN, a fingerprint scanner, and a facial-recognition tool. CyberArk researchers specifically targeted its facial-recognition capabilities, but issues have also been discovered in other aspects of the system.

Publisher: PCMAG
Twitter: @pcmag
Reference: (Read more) Visit Source



Happening on Twitter

No comments:

Post a Comment