Friday, December 30, 2022

Personal Cybersecurity: Protecting Yourself from Hackers

Personal Cybersecurity: Protecting Yourself from Hackers

Guarding your personal cybersecurity and protecting yourself from cybercrime should be important to anyone who uses electronic devices. Cybercrime Magazine forecasts that by the year 2025, cybercrime will cost $10.5 trillion globally, up from $3 trillion in 2015 .

Often, users get malware on their electronic devices without even knowing it. As a result, their personal information can be leaked or sold, or they experience a malfunction with services on their computer or smartphone.

logo
Publisher: Edge
Date: 2022-12-30T15:00:00 00:00
Author: _____
Reference: (Read more) Visit Source



Ukraine: Russian Hackers' Focus is Civilian Infrastructure

Business Continuity Management / Disaster Recovery , Critical Infrastructure Security , Cybercrime

State-backed Russian hacking groups are continuing to focus less on Ukrainian military targets and much more on civilian infrastructure, Ukrainian cybersecurity officials report.

Twitter: @BnkInfoSecurity
Reference: (Read more) Visit Source



Google Home speakers allowed hackers to snoop on conversations

A bug in Google Home smart speaker allowed installing a backdoor account that could be used to control it remotely and to turn it into a snooping device by accessing the microphone feed.

Researcher Matt Kunze discovered the issue and received $107,500 for responsibly reporting it to Google last year. Earlier this week, the researcher published technical details about the finding and an attack scenario to show how the flaw could be leveraged.

Publisher: BleepingComputer
Twitter: @BleepinComputer
Reference: (Read more) Visit Source



Hackers' latest trick looks like free movie streaming | Fox News

CyberGuy shows you how to screencast on your Android phone so you can display the content from your phone to your TV screen.

The recent FIFA World Cup brought out another round of bad actors capitalizing on the streaming demand of the popular games.

For example, back in 2021,  ReasonLabs found a new form of malware disguising itself as a way to watch the latest SpiderMan film for free online while it was still in theaters.

Publisher: Fox News
Date: 2022-12-29
Twitter: @foxnews
Reference: (Read more) Visit Source



Indian government sector top target for hackers in 2022

New Delhi, Dec 30 The number of cyber attacks targeting the Indian government sector increased by a whopping 95 per cent in the second half of 2022 compared to the same period last year, a report showed on Friday.

The attacks on the Indian government intensified to the point where it became the country that was most frequently targeted in this sector in 2022.

Date: 2022-12-30T12:22:27 05:30
Author: IANS
Reference: (Read more) Visit Source



Suspected North Korean hackers deploy corrupt Android app in attack on reporter | NK PRO

Researchers say powerful malware comes disguised as fake app, highlighting overlap with past DPRK cyber campaigns

The spyware, which the researchers dub RambleOn in a new report, is disguised as a secure messaging application, but in reality fetches malicious payloads from Russian and Swiss cloud service providers.

logo
Publisher: NK PRO
Date: 2022-12-30T02:36:53 00:00
Author: ethan jewell
Reference: (Read more) Visit Source



Hackers Use Kevin O'Leary's Twitter Account to Promote Crypto Scam

If you're on a Galaxy Fold, consider unfolding your phone or viewing it in full screen to best optimize your experience.

These scams typically involve a fake Twitter account impersonating the celebrity in question. In this case, hackers were able to access O'Leary's real account and send out a series of tweets. This included a tweet saying, "My accounts was not hacked!

Publisher: _____
Date: 2022-12-29T17:00:23.516034-05:00
Twitter: @TheAscentMoney
Reference: (Read more) Visit Source



Crypto platform 3Commas admits hackers stole API keys

An anonymous Twitter user published yesterday a set of 10,000 API keys allegedly obtained from the 3Commas cryptocurrency trading platform.

3Commas bots use these API keys to generate profit for the customers by interacting with cryptocurrency trading exchanges without requiring account credentials, to perform automated investment and trading actions on behalf of the users.

Publisher: BleepingComputer
Twitter: @BleepinComputer
Reference: (Read more) Visit Source



LastPass Hackers Password Vaults | Silicon UK Tech News

But now LastPass has admitted that the hackers actually obtained the cloud storage access key and dual storage container decryption keys, and "the threat actor copied information from backup that contained basic customer account information and related metadata."

The hacker was "also able to copy a backup of customer vault data from the encrypted storage container."

logo
Publisher: Silicon UK
Date: 2022-12-30T08:49:56 00:00
Author: https www facebook com tom jowitt
Twitter: @SiliconGB
Reference: (Read more) Visit Source







Army of the Alien Monkeys


Earth is nice. We want it.

We welcome your submission to us.




No comments:

Post a Comment