Security

ddos attack potentially targeted state voter registration site says fbi

DDoS Attack Potentially Targeted State Voter Registration Site, Says FBI

The FBI said that a distributed denial-of-service (DDoS) attack potentially targeted a state-level voter registration site. In a Private Industry Notification (PIN) released on February 4, the FBI said that a state-level voter registration and voter information website received a high volume of DNS requests over the period of a month. Those requests were consistent …

DDoS Attack Potentially Targeted State Voter Registration Site, Says FBI Read More »

Twitter Suspends Fake Accounts Abusing Feature that Matches Phone Numbers and Users

The company believes state-sponsored actors may also be involved. Twitter has disclosed a security incident in which third parties exploited its API to match phone numbers with user accounts. The company has identified and suspended a large network of fake accounts related to the incident and believes state-sponsored actors may also be involved. The problem …

Twitter Suspends Fake Accounts Abusing Feature that Matches Phone Numbers and Users Read More »

Researchers Find 24 ‘Dangerous’ Android Apps with 382M Installs

Shenzhen Hawk Internet Co. is identified as the parent company behind five app developers seeking excessive permissions in Android apps. Security researchers have identified 24 Android applications seeking dangerous and excessive permissions, all of which come from app developers under Chinese company Shenzhen Hawk Internet Co., Ltd., and have a combined total of 382 million …

Researchers Find 24 ‘Dangerous’ Android Apps with 382M Installs Read More »

ashley madison breach extortion scam targets hundreds

Ashley Madison Breach Extortion Scam Targets Hundreds

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter. View Original Source Article HERE

tN6tvRWU 400x400 150x150 4

The Number One Cybersecurity Statistic That C-Suite Executives Should Know

CEOs should not be in the dark about cybercrime –Steve Morgan, Editor-in-Chief Northport, N.Y. – Jan. 21, 2020 For years now CEOs and board members have been flunking their cybersecurity exams. That’s because there are far too many vendor (and analyst) reports that fail to use easy-to-understand language, and concepts, for C-suite executives. Do CEOs …

The Number One Cybersecurity Statistic That C-Suite Executives Should Know Read More »

financial tech firms disagree on ban of customer data screen scraping

Financial tech firms disagree on ban of customer data screen-scraping

by Lisa Vaas For years, financial technology (fintech) companies have used screen-scraping to retrieve customers’ financial data with their consent. Think lenders, financial management apps, personal finance dashboards, and accounting products doing useful things: like, say, your budgeting app will use screen-scraping to get at the incoming and outgoing transactions in your bank account, using …

Financial tech firms disagree on ban of customer data screen-scraping Read More »

How To Keep Your Privacy and Data Secure While Working With a Remote Team

Implementing basic strategies can ensure your remote team’s work will be secure, data will be protected, and you’ll be far less exposed to security risks. Working with a remote team comes with a laundry list of unique challenges and problems. Perhaps chief among these is ensuring that your data and information is kept secure. Remote …

How To Keep Your Privacy and Data Secure While Working With a Remote Team Read More »

bezos whatsapp cyberattacks show growing mobile sophistication

Bezos, WhatsApp Cyberattacks Show Growing Mobile Sophistication

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter. View Original Source Article HERE

facebook knows a lot about your online habits heres how to stop it

Facebook knows a lot about your online habits – here’s how to stop it

by Danny Bradbury Facebook is rolling out a global tool to help you understand what other sites and apps tell it about your activities, to make it forget what they’ve shared in the past, and to control what they share in the future. It’s called Off-Facebook Activity, and it’s part of the company’s effort to …

Facebook knows a lot about your online habits – here’s how to stop it Read More »

government spyware company spied on hundreds of innocent people

Government spyware company spied on 100s of innocent people

In March 2019, researchers with a group called Security Without Borders identified more than 20 government spyware apps squatting in plain sight, pretending to be harmless, vanilla apps on Google’s Play store. Security Without Borders is a non-profit that often investigates threats against dissidents and human rights defenders. Those apps were just a decoy through …

Government spyware company spied on 100s of innocent people Read More »

15 nfl teams twitter hijacked in lead up to the super bowl

15 NFL teams’ Twitter hijacked in lead-up to the Super Bowl

by Lisa Vaas The cybercriminal group OurMine has struck again, claiming responsibility for hijacking and defacing the Twitter accounts of the US National Football League (NFL) and 15 of its teams. The timing is pointed: The attacks hit during this, the media-hectic week that leads up to Sunday’s Super Bowl Championship, which will pit the …

15 NFL teams’ Twitter hijacked in lead-up to the Super Bowl Read More »

NFL, Multiple NFL Teams’ Twitter Accounts Hacked and Hijacked

Enterprise VulnerabilitiesFrom DHS/US-CERT’s National Vulnerability Database CVE-2015-3154PUBLISHED: 2020-01-27 CRLF injection vulnerability in Zend\Mail (Zend_Mail) in Zend Framework before 1.12.12, 2.x before 2.3.8, and 2.4.x before 2.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the header of an email. CVE-2019-17190PUBLISHED: 2020-01-27 A Local Privilege Escalation …

NFL, Multiple NFL Teams’ Twitter Accounts Hacked and Hijacked Read More »

security admin checklist

Security admins checklist: 10 tasks to perform every year

Here is a checklist of 10 important tasks security administrators should perform to keep devices protected and secure. Security administrators oversee the secured processes in place, safeguarding the day-to-day operations of an organization. While it is easy for users to focus solely on protecting computers and their devices, security admins are tasked with managing the overall …

Security admins checklist: 10 tasks to perform every year Read More »

Background Check Services Provider Agrees to Settle FTC Allegations that it Falsely Claimed Participation in the EU-U.S. Privacy Shield

A company that provides security and investigative services, including background check services, has agreed to settle Federal Trade Commission allegations that the firm misrepresented its participation in and compliance with the EU-U.S. Privacy Shield framework, which enables companies to transfer consumer data legally from European Union countries to the United States. In a complaint, the …

Background Check Services Provider Agrees to Settle FTC Allegations that it Falsely Claimed Participation in the EU-U.S. Privacy Shield Read More »

Facial Recognition - Making Sense of Security

Facial Recognition Firm Sued for Scraping 3 Billion Faceprints

Firm Sued For Scraping 3 Billion Faceprints for Facial Recognition New York facial recognition startup Clearview AI is being sued in a potential class action lawsuit that claims the company gobbled up photos out of “pure greed” to sell to law enforcement. This which has amassed a huge database of more than three billion images scraped …

Facial Recognition Firm Sued for Scraping 3 Billion Faceprints Read More »

job hunting beware hiring scams using spoofed company websites

Job hunting? Beware hiring scams using spoofed company websites

Cybercriminals are putting a new twist on an old trick Scammers are combining spoofed company websites and fake job ads to trick unsuspecting job seekers into surrendering their sensitive information and paying fraudulent fees. According to a recent public service announcement by the FBI’s Internet Crime Complaint Center (IC3), fraudsters increasingly post job openings on …

Job hunting? Beware hiring scams using spoofed company websites Read More »

FTC to Host Workshop Voice Cloning Technologies on Jan. 28

WHAT: The Federal Trade Commission will host a workshop to examine voice cloning technologies. WHEN: Tuesday, January 28, 12:30 p.m.-5:00 p.m. ET. WHERE: Constitution Center400 Seventh St., SWWashington, D.C. 20024 WHO: The event will feature remarks by FTC Commissioner Rohit Chopra as well as industry officials, academics, and others. WEBCAST: The workshop will be webcast. …

FTC to Host Workshop Voice Cloning Technologies on Jan. 28 Read More »

Scroll to Top