Category: Security Latest

The Russian Disinfo Operation You Never Heard About

Read the original article: The Russian Disinfo Operation You Never Heard About Secondary Infektion appears to be a distinct effort from the meddling of the IRA and GRU—and it went undetected for years.   Advertise on IT Security News. Read…

Former eBay Execs Allegedly Made Life Hell for Critics

Read the original article: Former eBay Execs Allegedly Made Life Hell for Critics Surveillance. Harassment. A live cockroach delivery. US attorneys have charged six former eBay workers in association with an outrageous cyberstalking campaign.   Advertise on IT Security News.…

Ex-Ebay Execs Allegedly Made Life Hell for Critics

Read the original article: Ex-Ebay Execs Allegedly Made Life Hell for Critics Surveillance. Harassment. A live cockroach delivery. US Attorneys have charged six former Ebay workers in association with an outrageous cyberstalking campaign.   Advertise on IT Security News. Read…

Zoom Shut Down US-Based Activists at China’s Request

Read the original article: Zoom Shut Down US-Based Activists at China’s Request Hackers for hire, a particularly ignominious phishing campaign, and more of the week’s top security news.   Advertise on IT Security News. Read the original article: Zoom Shut…

Coder-Turned-Kingpin Paul Le Roux Gets His Comeuppance

Read the original article: Coder-Turned-Kingpin Paul Le Roux Gets His Comeuppance The programmer who became a flagrant drug lord and weapons trafficker was sentenced in New York City to 25 years in prison.   Advertise on IT Security News. Read…

Researchers Expose a New Vulnerability in Intel’s CPUs

Read the original article: Researchers Expose a New Vulnerability in Intel’s CPUs The Software Guard eXtension is supposed to protect encryption keys and other sensitive data. But this isn’t the first time it’s been defeated.   Advertise on IT Security…

CHIP PORN

Read the original article: CHIP PORN This post doesn’t have text content, please click on the link below to view the original article. CHIP PORN   Advertise on IT Security News. Read the original article: CHIP PORN

Android 11 Will Help You Rein In Zombie App Permissions

Read the original article: Android 11 Will Help You Rein In Zombie App Permissions The latest update to Google’s operating system has a host of privacy and security improvements.   Advertise on IT Security News. Read the original article: Android…

How Covid-19 Contact Tracing Works on Your Phone

Read the original article: How Covid-19 Contact Tracing Works on Your Phone Developers are working on track-and-trace systems to keep infection levels low. The apps aren’t here yet, but here’s what they do—and how you can enable them.   Advertise…

Games Don’t Do Enough to Combat Toxicity at Launch

Read the original article: Games Don’t Do Enough to Combat Toxicity at Launch Riot Games has cutting-edge moderation tools at its disposal. Few of them are present in Valorant, which launched this week.   Advertise on IT Security News. Read…

‘Nonlethal’ Anti-Protest Weapons Can Cause Serious Harm

Read the original article: ‘Nonlethal’ Anti-Protest Weapons Can Cause Serious Harm Rubber bullets and tear gas are billed as relatively safe. They’re anything but.   Advertise on IT Security News. Read the original article: ‘Nonlethal’ Anti-Protest Weapons Can Cause Serious…

‘Non-Lethal’ Anti-Protest Weapons Can Cause Serious Harm

Read the original article: ‘Non-Lethal’ Anti-Protest Weapons Can Cause Serious Harm Rubber bullets and tear gas are billed as relatively safe. They’re anything but.   Advertise on IT Security News. Read the original article: ‘Non-Lethal’ Anti-Protest Weapons Can Cause Serious…

This Bot Hunts Software Bugs for the Pentagon

Read the original article: This Bot Hunts Software Bugs for the Pentagon Mayhem emerged from a 2016 government-sponsored contest at a Las Vegas casino hotel. Now it’s used by the military—and Netflix.   Advertise on IT Security News. Read the…

How to Protest Safely in the Age of Surveillance

Read the original article: How to Protest Safely in the Age of Surveillance Law enforcement has more tools than ever to track your movements and access your communications. Here’s how to protect your privacy if you plan to protest.  …

Shadowserver, an Internet Guardian, Finds a Lifeline

Read the original article: Shadowserver, an Internet Guardian, Finds a Lifeline Ten weeks ago, Shadowserver’s main source of funding dried up. Now, it’s back on level footing.   Advertise on IT Security News. Read the original article: Shadowserver, an Internet…

State-Based Contact-Tracing Apps Could Be a Mess

Read the original article: State-Based Contact-Tracing Apps Could Be a Mess With no nationwide Covid-19 notification software in sight, security and interoperability issues loom large.   Advertise on IT Security News. Read the original article: State-Based Contact-Tracing Apps Could Be…

Trump’s New Intelligence Chief Spells Trouble

Read the original article: Trump’s New Intelligence Chief Spells Trouble John Ratcliffe is the least-qualified director of national intelligence in history—and a staunch partisan as well.   Advertise on IT Security News. Read the original article: Trump’s New Intelligence Chief…

Don’t Be Fooled by Covid-19 Contact-Tracing Scams

Read the original article: Don’t Be Fooled by Covid-19 Contact-Tracing Scams Fraudsters have found yet another way to take advantage of the pandemic.   Advertise on IT Security News. Read the original article: Don’t Be Fooled by Covid-19 Contact-Tracing Scams

Look Out for This Covid-19 Excel Phishing Scam

Read the original article: Look Out for This Covid-19 Excel Phishing Scam Plus: An iOS leak, an EasyJet breach, and more of the week’s top security news.   Advertise on IT Security News. Read the original article: Look Out for…

5 Simple Ways to Make Your Gmail Inbox Safer

Read the original article: 5 Simple Ways to Make Your Gmail Inbox Safer These built-in features definitely protect your data, but they can help keep your inbox tidy too.   Advertise on IT Security News. Read the original article: 5…

The Hypocrisy of Mike Pompeo

Read the original article: The Hypocrisy of Mike Pompeo In the few short years since his time in Congress, the secretary of state has conveniently reversed himself on multiple fronts.   Advertise on IT Security News. Read the original article:…

The Nigerian Fraudsters Ripping Off the Unemployment System

Read the original article: The Nigerian Fraudsters Ripping Off the Unemployment System Security researchers have spotted the “Scattered Canary” group scamming vital benefits programs amid the Covid-19 pandemic.   Advertise on IT Security News. Read the original article: The Nigerian…

The Nigerian Fraudsters Ripping Off the Unemployment System

Read the original article: The Nigerian Fraudsters Ripping Off the Unemployment System Security researchers have spotted the “Scattered Canary” group scamming vital benefits programs amid the Covid-19 pandemic.   Advertise on IT Security News. Read the original article: The Nigerian…

The FBI Backs Down Against Apple—Again

Read the original article: The FBI Backs Down Against Apple—Again The agency cracked the Pensacola iPhones, but it still views Cupertino as a problem—even though it’s easier to break into iPhones than it has been in years.   Advertise on…

Cryptocurrency Hardware Wallets Can Get Hacked, Too

Read the original article: Cryptocurrency Hardware Wallets Can Get Hacked, Too New research shows vulnerabilities in popular cold storage options that would have revealed their PINs.   Advertise on IT Security News. Read the original article: Cryptocurrency Hardware Wallets Can…

Zoom Security Gets a Boost With Keybase Acquisition

Read the original article: Zoom Security Gets a Boost With Keybase Acquisition Plus: A GoDaddy breach, a ransomware attack, and more of the week’s top security news.   Advertise on IT Security News. Read the original article: Zoom Security Gets…

Defcon Is Canceled

Read the original article: Defcon Is Canceled For real this time. Its sister conference, Black Hat, has also been called off.   Advertise on IT Security News. Read the original article: Defcon Is Canceled

How a Facebook Bug Took Down Your Favorite iOS Apps

Read the original article: How a Facebook Bug Took Down Your Favorite iOS Apps Thank a tiny change to a software development kit for widespread crashes Wednesday, including the Spotify and TikTok apps.   Advertise on IT Security News. Read…

GitHub Takes Aim at Open Source Software Vulnerabilities

Read the original article: GitHub Takes Aim at Open Source Software Vulnerabilities GitHub Advanced Security will help automatically spot potential security problems in the world’s biggest open source platform.   Advertise on IT Security News. Read the original article: GitHub…

LockBit Is the New Ransomware for Hire

Read the original article: LockBit Is the New Ransomware for Hire A recent infection, which managed to plunder a company’s network within hours, demonstrates why the malware has become so prevalent.   Advertise on IT Security News. Read the original…

Spies Say Covid-19 Isn’t Manmade

Read the original article: Spies Say Covid-19 Isn’t Manmade Plus: A malicious GIF, Android malware, and more of the week’s top security news.   Advertise on IT Security News. Read the original article: Spies Say Covid-19 Isn’t Manmade

Spies Say Covid-19 Isn’t a Manmade

Read the original article: Spies Say Covid-19 Isn’t a Manmade Plus: A malicious GIF, Android malware, and more of the week’s top security news.   Advertise on IT Security News. Read the original article: Spies Say Covid-19 Isn’t a Manmade

What Is Fleeceware, and How Can You Protect Yourself?

Read the original article: What Is Fleeceware, and How Can You Protect Yourself? Sneaky developers are charging big bucks for basic apps. Here’s how to spot a scam in sheep’s clothing.   Advertise on IT Security News. Read the original…

What Is Fleeceware and How Can You Protect Yourself?

Read the original article: What Is Fleeceware and How Can You Protect Yourself? Sneaky developers are charging big bucks for basic apps. Here’s how to spot a scam in sheep’s clothing.   Advertise on IT Security News. Read the original…

The ADL Calls Out Steam for Giving Extremists a Pass

Read the original article: The ADL Calls Out Steam for Giving Extremists a Pass The nonprofit has identified hundreds of profiles that espouse hate, with little attempt from the gaming platform to stop them.   Advertise on IT Security News.…

The Covid-19 Pandemic Reveals Ransomware’s Long Game

Read the original article: The Covid-19 Pandemic Reveals Ransomware’s Long Game Hackers laid the groundwork months ago for attacks. Now they’re flipping the switch.   Advertise on IT Security News. Read the original article: The Covid-19 Pandemic Reveals Ransomware’s Long…

The Weird Partisan Math of Vote-by-Mail

Read the original article: The Weird Partisan Math of Vote-by-Mail Research says that expanding mail-in voting doesn’t help Democrats. So why are Republicans so afraid of it?   Advertise on IT Security News. Read the original article: The Weird Partisan…

The Weird Partisan Math of Vote-By-Mail

Read the original article: The Weird Partisan Math of Vote-By-Mail Research says that expanding mail-in voting doesn’t help Democrats. So why are Republicans so afraid of it?   Advertise on IT Security News. Read the original article: The Weird Partisan…

The Covid-19 Pandemic Reveals Ransomware’s Long Game

Read the original article: The Covid-19 Pandemic Reveals Ransomware’s Long Game Hackers laid the groundwork months ago for attacks. Now they’re flipping the switch.   Advertise on IT Security News. Read the original article: The Covid-19 Pandemic Reveals Ransomware’s Long…

Sneaky Zero-Click Attacks Are a Hidden Menace

Read the original article: Sneaky Zero-Click Attacks Are a Hidden Menace Hacks that can play out without any user interaction may be more common than we realize, in part because they’re so difficult to detect.   Advertise on IT Security…

Hackers Target Oil Companies as Prices Plunge

Read the original article: Hackers Target Oil Companies as Prices Plunge The sophisticated spear-phishing campaign hit as energy companies planned their response to falling crude prices.   Advertise on IT Security News. Read the original article: Hackers Target Oil Companies…

Hackers Target Oil Companies as Prices Plunge

Read the original article: Hackers Target Oil Companies as Prices Plunge The sophisticated spear-phishing campaign hit as energy companies planned their response to falling crude prices.   Advertise on IT Security News. Read the original article: Hackers Target Oil Companies…

How Apple and Google’s Social Distancing Maps Work

Read the original article: How Apple and Google’s Social Distancing Maps Work New tools from the tech giants shows the dramatic impact of sheltering in place, using location data from phones like yours.   Advertise on IT Security News. Read…

How Apple and Google’s Social Distancing Maps Work

Read the original article: How Apple and Google’s Social Distancing Maps Work New tools from the tech giants shows the dramatic impact of sheltering in place, using location data from phones like yours.   Advertise on IT Security News. Read…

A Vital Hack Could Turn Medical Devices Into Ventilators

Read the original article: A Vital Hack Could Turn Medical Devices Into Ventilators Hundreds of thousands of lower-grade breathing devices are going unused because manufacturers say they can’t perform life-saving functions. But a new patch might change that.   Advertise…