Swiss authorities said Tuesday they have opened an investigation into allegations a Zug, Switzerland-based maker of encryption devices was a front operated by the CIA and West German intelligence that enabled them to break the codes of the countries that…
Category: SecurityWeek RSS Feed
US, German Spies Plundered Global Secrets Via Swiss Encryption Firm: Report
US and German intelligence services raked in the top secret communications of governments around the world for decades through their hidden control of a top encryption company, Crypto AG, US, German and Swiss media reported Tuesday. read more Advertise…
Equifax Breach is the Latest of Many Hacks Linked to China
In 2014, the Obama administration accused five Chinese military agents of targeting Pittsburgh-area industrial companies including Westinghouse Electric, Alcoa and U.S. Steel. Since then, the number of companies allegedly targeted by Chinese hackers has only grown. read more Advertise…
Adobe Patches 42 Vulnerabilities Across Five Products
Adobe’s February 2020 Patch Tuesday updates fix a total of 42 vulnerabilities across the company’s Framemaker, Acrobat and Reader, Flash Player, Digital Editions and Experience Manager products. read more Advertise on IT Security News. Read the complete article: Adobe…
Industrial Networks, the Latest Geopolitical Battleground
Organizations Must Understand What’s Driving the Escalated Targeting of Industrial Networks read more Advertise on IT Security News. Read the complete article: Industrial Networks, the Latest Geopolitical Battleground
Flaws in Accusoft ImageGear Expose Users to Remote Attacks
Critical vulnerabilities addressed in the Accusoft ImageGear library could be exploited by remote attackers to execute code on a victim machine, Cisco Talos’ security researchers report. read more Advertise on IT Security News. Read the complete article: Flaws in…
Another Flaw in Dell SupportAssist Allows Code Execution With Elevated Privileges
A researcher has discovered another DLL hijacking vulnerability in Dell SupportAssist that can be used to execute code with elevated privileges, and exploitation only requires low permissions. read more Advertise on IT Security News. Read the complete article: Another…
Firefox 74 Will Disable TLS 1.0 and TLS 1.1 by Default
Beginning March, when Firefox 74 is set to arrive in the release channel, Mozilla will disable older Transport Layer Security (TLS) protocol versions as default options for secure connections. read more Advertise on IT Security News. Read the complete…
Echobot Malware Drives Significant Increase in OT Attacks
Attacks targeting operational technology (OT) infrastructure increased by over 2000 percent in 2019 compared to the previous year, and the piece of malware most commonly seen in these attacks was the Mirai variant named Echobot, IBM revealed on Tuesday. read…
China Denies U.S. Allegations Over Military ‘Hackers’
Beijing said Tuesday it “never engages” in cybertheft, following US indictments of four Chinese army members for alleged involvement in the massive 2017 hacking of credit rating agency Equifax. read more Advertise on IT Security News. Read the complete…
Unique Illinois Privacy Law Leads to $550M Facebook Deal
Adam Pezen, Carlo Licata and Nimesh Patel are among millions of people who have been tagged in Facebook photos at some point in the past decade, sometimes at the suggestion of an automated tagging feature powered by facial recognition technology.…
Chinese Military Stole Masses of Americans’ Data, US Says
Four members of the Chinese military have been charged with breaking into the networks of the Equifax credit reporting agency and stealing the personal information of tens of millions of Americans, the Justice Department said Monday, blaming Beijing for one…
Misconfigured Docker Registries Expose Thousands of Repositories
Thousands of code repositories were found exposed in over one hundred Docker registries that are accessible from the Internet without authentication, Palo Alto Network reports. read more Advertise on IT Security News. Read the complete article: Misconfigured Docker Registries…
Presidential Candidates’ Use of DMARC Improves, but Remains Short of Optimum
Presidential candidates’ protection of their domains is improving, but could improve further. More specifically, of the 15 current candidates, eight now protect their domains from email spoofing with enforced DMARC. In May 2019, when there were still 23 candidates, only…
Ransomware Hits North Miami Beach Police Department
The City of North Miami Beach last week announced that ransomware was found on computers within its police department’s network. The attack was discovered on Tuesday and the FBI, the Secret Service, and the Miami-Dade Police Department were immediately alerted.…
Chinese Military Hackers Charged Over Equifax Data Breach
The United States government has officially charged four members of China’s People’s Liberation Army (PLA) with hacking into credit reporting agency Equifax and being responsible for the massive data breach that exposed highly sensitive information on more than 145 million…
Tips for a Smarter Approach to Password Policy
In many cases, passwords are the primary line of defense protecting user accounts from being hijacked in an account takeover (ATO) attack. With the right policies and parameters in place to ensure strong, unique passwords, this defense can be quite…
Netherlands University Pays $240,000 After Targeted Ransomware Attack
University of Maastricht Pays Roughly $240,000 in Bitcoin Following Targeted Ransomware Attack read more Advertise on IT Security News. Read the complete article: Netherlands University Pays $240,000 After Targeted Ransomware Attack
Facebook Paid $2.2 Million in Bug Bounty Rewards in 2019
Over the course of 2019, Facebook paid security researchers a total of $2.2 million in rewards for vulnerability reports submitted to the social media platform’s bug bounty program. read more Advertise on IT Security News. Read the complete article:…
Israel’s Likud Party Exposed Details of Over 6 Million Voters
An election application used by Israel’s Likud party has exposed the personal information of over 6 million voters. Likud, the party of Israeli Prime Minister Benjamin Netanyahu, has contracted a company named Feed-b to create an election management system called…
Facebook’s Twitter, Instagram Accounts Hacked
A group of hackers called OurMine hijacked some of Facebook’s official Twitter and Instagram accounts over the weekend through a third-party social media management service. The hackers briefly hijacked the Twitter accounts of Facebook and its Messenger application, and the…
Iran Says Foils Cyberattack Targeting Internet Providers
read more Advertise on IT Security News. Read the complete article: Iran Says Foils Cyberattack Targeting Internet Providers
Cyborgs, Trolls and Bots: A Guide to Online Misinformation
Cyborgs, trolls and bots can fill the internet with lies and half-truths. Understanding them is key to learning how misinformation spreads online. read more Advertise on IT Security News. Read the complete article: Cyborgs, Trolls and Bots: A Guide…
Chrome Will Block Insecure Downloads on HTTPS Pages
In an attempt to improve the security of its users, the Chrome browser will soon start blocking insecure downloads on HTTPS pages, Google announced. The plan, which the Internet giant laid out this week, is expected to be completed sometime…
IoT Devices at Major Manufacturers Infected With Malware via Supply Chain Attack
Three of the world’s largest manufacturers had some IoT devices running Windows 7 infected with a piece of malware in what experts believe to be a supply chain attack. read more Advertise on IT Security News. Read the complete…
Organizations Quick to Patch Critical Citrix ADC Vulnerability
More than 80 percent of organizations impacted by CVE-2019-19781, a critical vulnerability in the Citrix Application Delivery Controller (ADC) and Gateway, have already taken steps to secure their deployments. read more Advertise on IT Security News. Read the complete…
DoJ Looking for Victims of ‘Quantum Stresser’ DDoS Service
The U.S. Department of Justice has asked victims of the Quantum Stresser DDoS-for-hire service, whose operator was recently sentenced, to come forward. read more Advertise on IT Security News. Read the complete article: DoJ Looking for Victims of ‘Quantum…
Brazil Judge Rejects Hacking Accusation Against Greenwald
A judge in Brazil’s capital on Thursday dismissed accusations that journalist Glenn Greenwald was involved in hacking phones of officials, following weeks of criticism that his prosecution would infringe on constitutional protections for the press. read more Advertise on…
Smart, or Not So Smart? What the Ring Hacks Tell Us About the Future of IoT
Late last year, the news was full of stories about smart cameras that had been hacked. read more Advertise on IT Security News. Read the complete article: Smart, or Not So Smart? What the Ring Hacks Tell Us About…
Critical Bluetooth Vulnerability Exposes Android Devices to Attacks
One of the security flaws that Google addressed with the February 2020 set of Android patches is a critical vulnerability in Bluetooth that could lead to code execution. read more Advertise on IT Security News. Read the complete article:…
Malicious Optimizers Hosted on Google Play Amassed 470,000 Downloads
Malicious optimizer, booster, and utility applications hosted on Google Play gathered nearly half a million downloads before being taken down, Trend Micro reports. read more Advertise on IT Security News. Read the complete article: Malicious Optimizers Hosted on Google…
Japanese Defense Contractors Pasco, Kobe Steel Disclose Old Breaches
Japanese defense contractors Pasco and Kobe Steel this week disclosed cyber intrusions they suffered back in 2016 and 2018. read more Advertise on IT Security News. Read the complete article: Japanese Defense Contractors Pasco, Kobe Steel Disclose Old Breaches
Iranian Hackers Target Journalists in New Phishing Campaign
The Iran-linked threat group know as “Charming Kitten” has been targeting journalists, political and human rights activists in a new campaign aimed at stealing email account credentials, Certfa Lab reports. read more Advertise on IT Security News. Read the…
New Campaign Leverages BitBucket to Deliver Arsenal of Malware
Active Campaign Uses BitBucket Cloud Storage Platform to Deliver 7 Different Malware Payloads read more Advertise on IT Security News. Read the complete article: New Campaign Leverages BitBucket to Deliver Arsenal of Malware
Cloud Security Firm Netskope Raises $340 Million at $3 Billion Valuation
Cloud security company Netskope on Thursday announced that it has raised $340 million in a Series G funding round, valuing the firm at nearly $3 billion. read more Advertise on IT Security News. Read the complete article: Cloud Security…
DLL Hijacking Vulnerability Found in Realtek HD Audio Driver
A vulnerability in the Realtek HD Audio Driver package could be abused to execute arbitrary payloads with elevated privileges on a vulnerable machine, SafeBreach Labs has discovered. Tracked as CVE-2019-19705, the vulnerability could be leveraged to evade defenses and achieve…
Patch Management Company Automox Raises $30 Million
US-based cyber hygiene and patch management company Automox this week announced that it has raised $30 million in a Series B funding round, which brings the total raised by the firm to $42 million. read more Advertise on IT…
Forescout Technologies to be Acquired in $1.9 Billion Deal
Enterprise device security firm Forescout Technologies (NASDAQ:FSCT) announced on Thursday that it has agreed to be acquired by private equity firm Advent International in a deal valued at $1.9 billion. read more Advertise on IT Security News. Read the…
Louisiana Governor Urges Officials to Ready for Cyberattacks
Gov. John Bel Edwards called on Louisiana’s local government leaders Wednesday to protect their data, reminding them of recent cyberattacks across the state and saying they’re likely to face such a strike in the future. read more Advertise on…
FBI Director Warns of Ongoing Russian ‘Information Warfare’
FBI Director Chris Wray said Wednesday that Russia is engaged in “information warfare” heading into the 2020 presidential election, though he said law enforcement has not seen ongoing efforts by Russia to target America’s election infrastructure. read more Advertise…
Chrome 80 Released With 56 Security Fixes
Google this week released Chrome 80 to the stable channel with 56 vulnerability patches and various other improvements to user security. read more Advertise on IT Security News. Read the complete article: Chrome 80 Released With 56 Security Fixes
Google Shared Private Videos With Wrong Users
A bug in the Google Takeout download service has resulted in some users’ videos being inadvertently shared with other people. read more Advertise on IT Security News. Read the complete article: Google Shared Private Videos With Wrong Users
CERN Physics Lab Drops Facebook Over Data Concerns
Europe’s physics lab CERN on Wednesday said it had stopped using a Facebook team-chat application because of concerns about handing over data to the US tech giant. CERN said it had wound up its Facebook Workplace account on January 31…
Hackers Can Steal Data From Air-Gapped Computers Via Screen Brightness
Researchers have shown how hackers could silently exfiltrate sensitive information from air-gapped computers by manipulating the brightness of their screen. read more Advertise on IT Security News. Read the complete article: Hackers Can Steal Data From Air-Gapped Computers Via…
Leidos Buys L3Harris Security and Automation Business for $1 Billion
Reston, VA-based Leidos Holdings has announced a definitive agreement to buy the airport security and automation businesses from UK-based L3Harris for $1 billion in cash. read more Advertise on IT Security News. Read the complete article: Leidos Buys L3Harris…
Cisco Discovery Protocol Flaws Expose Tens of Millions of Devices to Attacks
Tens of millions of Cisco devices deployed in enterprise environments are exposed to attacks due to vulnerabilities identified by researchers in a proprietary discovery protocol they all use. read more Advertise on IT Security News. Read the complete article:…
Vulnerability in WhatsApp Desktop Exposed User Files
Facebook has patched a vulnerability in WhatsApp Desktop that could allow an attacker to launch cross-site scripting (XSS) attacks and access files from the victim’s system when paired with WhatsApp for iPhone. read more Advertise on IT Security News.…
Leveraging Gap Analysis to Drive Security Metrics
Gap Analysis Can Serve as a Wonderful Driver for Improving Security Metrics read more Advertise on IT Security News. Read the complete article: Leveraging Gap Analysis to Drive Security Metrics
Smart Lightbulbs Used to Compromise Home and Business Networks
Researchers have demonstrated an ability to compromise an IoT smart bulb, and then use malware from the internet-connected bulb to infiltrate the rest of a network — regardless of whether that is a home or office. read more Advertise…
Iowa Fiasco Highlights Security Risks in US Vote, Officials Say
US officials and cyber experts warned Tuesday that the voting debacle in the Democratic caucuses in Iowa underscored the vulnerabilities in the country’s election infrastructure in everything from hacking to trust-eroding conspiracy theories. read more Advertise on IT Security…
Trial Begins for Ex-CIA Worker Charged With Leaking Secrets
A prosecutor told a jury at the opening of an espionage trial Tuesday that an angry CIA employee got his vengeance by committing the agency’s biggest leak of classified information ever, but a defense lawyer said her client was innocent.…
Cybersecurity Bill Would Set Defense Plan for Local Agencies
A new Maryland bill would ask the state’s Department of Information Technology to develop a baseline plan for localities within the state to help battle cyber attacks. read more Advertise on IT Security News. Read the complete article: Cybersecurity…
Sudo Vulnerability Allows Privilege Escalation to Root
A patch has been released for a vulnerability in Sudo that can be exploited by an unprivileged attacker to gain full root permissions on the targeted system. read more Advertise on IT Security News. Read the complete article: Sudo…
Irish Regulator Probes Google, Tinder Over Data Processing
Irish regulators have launched separate inquiries into Google and dating app Tinder over how they process user data, in a new round of regulatory scrutiny aimed at tech companies. read more Advertise on IT Security News. Read the complete…
Android’s February 2020 Update Patches Critical System Vulnerabilities
Google this week released the February 2020 set of security updates for the Android operating system, which address a total of 25 vulnerabilities, including 2 rated critical severity. read more Advertise on IT Security News. Read the complete article:…
Twitter Moves to Curb Manipulated Content Including ‘Deepfakes’
Twitter unveiled a plan Tuesday to curb the spread of manipulated content including “deepfake” videos as part of a move to fight misinformation which could result in violence or other harm. read more Advertise on IT Security News. Read…
Dropbox Paid Out Over $1 Million Through Bug Bounty Program
File hosting company Dropbox says it has awarded researchers over $1 million for vulnerabilities reported through its bug bounty program. read more Advertise on IT Security News. Read the complete article: Dropbox Paid Out Over $1 Million Through Bug…
Israeli Venture Firm Partners With NYC to Launch Cybersecurity Accelerator
Jerusalem Venture Partners Launches Cybersecurity Hub in Partnership with New York City read more Advertise on IT Security News. Read the complete article: Israeli Venture Firm Partners With NYC to Launch Cybersecurity Accelerator
Vulnerabilities in Mini-SNMPD Lead to DoS, Information Disclosure
Vulnerabilities recently patched in Mini-SNMPD could be abused for denial-of-service (DoS) attacks or to obtain sensitive information, Cisco Talos’ security researchers report. read more Advertise on IT Security News. Read the complete article: Vulnerabilities in Mini-SNMPD Lead to DoS,…
Twitter Suspends Fake Accounts for Exploiting API Vulnerability
Twitter on Monday announced that it has suspended a large number of fake accounts that had exploited an API vulnerability to match usernames to phone numbers. read more Advertise on IT Security News. Read the complete article: Twitter Suspends…
HPE Acquires Identity Management Firm Scytale
Hewlett Packard Enterprise (HPE) on Monday announced that it has acquired Scytale, an identity management startup that specializes in cloud-native security and zero trust networking. read more Advertise on IT Security News. Read the complete article: HPE Acquires Identity…
Changing the Disclosure Shame Culture
For Cyberdefense to Progress, We Must Break Through the Cultural Barrier of Breach Disclosure Shame read more Advertise on IT Security News. Read the complete article: Changing the Disclosure Shame Culture
Australian Shipping Giant Toll Hit by Ransomware
Australian transportation and logistics giant Toll Group was forced to shut down some of its online services in response to a ransomware attack and customers are not happy with the way the company has handled the incident. read more …
Vulnerability in Linear eMerge Access Controllers Exploited in the Wild
Hackers are actively targeting a vulnerability in Linear eMerge E3 access controllers to infect the devices with malware and abuse them to launch distributed denial-of-service (DDoS) attacks, SonicWall revealed over the weekend. read more Advertise on IT Security News.…
Medtronic Releases Patches for Cardiac Device Flaws Disclosed in 2018, 2019
Medical device company Medtronic informed customers last week that it has released patches for some cardiac device vulnerabilities disclosed in 2018 and 2019. The vendor says it takes time to develop and validate patches for such complex and safety-critical devices…
Six Arrested in UK Over Malta Bank Cyber-Heist
Six individuals were arrested in the United Kingdom last week for their involvement in a bank cyber-heist and money laundering operation. read more Advertise on IT Security News. Read the complete article: Six Arrested in UK Over Malta Bank…
Chinese Hackers Target Hong Kong Universities With New Backdoor Variant
The China-linked threat group tracked as Winnti was observed using a new variant of the ShadowPad backdoor in recent attacks targeting Hong Kong universities, ESET’s security researchers report. read more Advertise on IT Security News. Read the complete article:…
Elevate Your Intelligence Game
Over the past five years, Cyber threat intelligence (CTI) has become one of the fastest growing elements in the cybersecurity space. Gartner expects as much as $2.3 billion to spent on it by 2023. read more Advertise on IT…
Trend Micro Patches More Vulnerabilities in Anti-Threat Toolkit
An update announced last week by Trend Micro for its Anti-Threat Toolkit (ATTK) addresses some additional attack methods related to a vulnerability initially patched in October 2019. read more Advertise on IT Security News. Read the complete article: Trend…
Japanese Electronics Giant NEC Discloses Old Data Breach
Japanese IT and electronics company NEC Corporation has revealed that hackers had access to its network for a long time, but the incident occurred several years ago. read more Advertise on IT Security News. Read the complete article: Japanese…
Election Officials Get Training Before 2020 Voting Begins
When state election officials gathered ahead of the last presidential election, major topics were voter registration, identity theft and ballot design. This year, the main theme is election security. read more Advertise on IT Security News. Read the complete…
Google Open Sources Code for Security Key Devices
Google on Thursday announced that it has released the source code for a project named OpenSK in an effort to allow users to create their own security key devices. OpenSK is written in Rust and it supports both FIDO U2F…
New Project Informs Security Teams of Phished Users
A newly launched project wants to help inform IT security representatives and domain owners when their users fall victim to phishing. read more Advertise on IT Security News. Read the complete article: New Project Informs Security Teams of Phished…
Researcher Finds Over 60 Vulnerabilities in Physical Security Systems
read more Advertise on IT Security News. Read the complete article: Researcher Finds Over 60 Vulnerabilities in Physical Security Systems
US Says EU Understands 5G Risks But Pushes on Huawei
The United States on Thursday welcomed the European Union’s new rules on fifth-generation internet but pressed them to go further after the bloc resisted Washington’s pressure to ban China’s Huawei directly. read more Advertise on IT Security News. Read…
With Intelligence, Fans, Businesses and NFL Can Remain Protected Against Cyber Threats
In the sports arena, the cyber and physical worlds are converged. The NFL and Super Bowl offer excellent examples of how laced together the two are. Last year, viewers streamed the Super Bowl across 7.5 million mobile devices. The NFL…
House Committee Passes Bills Improving CISA Leadership and Authority
Two bills approved this week by the House Homeland Security Committee were drafted to improve the leadership and legal authority of the Cybersecurity and Infrastructure Security Agency (CISA). read more Advertise on IT Security News. Read the complete article:…
Hackers Can Earn $20,000 for Xbox Vulnerabilities
Microsoft on Thursday announced the launch of an Xbox bug bounty program with rewards of up to $20,000 for critical remote code execution vulnerabilities. read more Advertise on IT Security News. Read the complete article: Hackers Can Earn $20,000…
Iranian Hackers Target U.S. Research Organization in Ongoing Campaign
A threat group linked to Iran has targeted a U.S.-based research company whose services are used by businesses and government organizations, cybersecurity firm Intezer reveals. read more Advertise on IT Security News. Read the complete article: Iranian Hackers Target…
AI-based Document Classification Firm Concentric Emerges From Stealth
Concentric Emerges from Stealth with AI Document Classification Product and $7.5 Million Seed Funding read more Advertise on IT Security News. Read the complete article: AI-based Document Classification Firm Concentric Emerges From Stealth
Flaw in ‘Code Snippets’ Plugin Exposed Many WordPress Sites to Attacks
Popular WordPress plugin Code Snippets recently received a patch for a high-severity vulnerability that can be exploited to take control of affected websites. read more Advertise on IT Security News. Read the complete article: Flaw in ‘Code Snippets’ Plugin…
Cisco Patches DoS, Information Disclosure Flaws in Small Business Switches
Cisco this week informed customers that some of its Small Business Switches are affected by high-severity vulnerabilities that can be exploited to obtain sensitive device information and to launch denial-of-service (DoS) attacks. read more Advertise on IT Security News.…
Interior Department Halts Drone Operations Over Cybersecurity Concerns
The United States Department of the Interior (DOI) this week has halted the operation of unmanned aircraft systems (UAS) over cybersecurity concerns most likely related to the use of Chinese drones. read more Advertise on IT Security News. Read…
Devices Still Vulnerable to DMA Attacks Despite Protections
Many devices, including ones often found in enterprise environments, are likely still vulnerable to direct memory access (DMA) attacks, despite the fact that hardware and software vendors have implemented protections that should prevent such attacks, firmware security company Eclypsium said…
The Best Treatment Plan for Your Security Pain Starts with a Data-Driven Diagnosis
The Value of Threat Intelligence Comes Down to Relevance and Accessibility read more Advertise on IT Security News. Read the complete article: The Best Treatment Plan for Your Security Pain Starts with a Data-Driven Diagnosis
SEO Spam Dominated Website Infections in 2019: Report
Last year, SEO spam was the most frequently observed threat on compromised websites, according to a new report from GoDaddy-owned web security company Sucuri. read more Advertise on IT Security News. Read the complete article: SEO Spam Dominated Website…
EU Stops Short of Recommending Ban on China’s Huawei
LONDON (AP) — The European Union unveiled security guidelines for next generation high-speed wireless networks that stop short of calling for a ban on Huawei, in the latest setback for the U.S. campaign against the Chinese tech company. read more…
Serious Vulnerability Discovered in OpenSMTPD
Researchers at cybersecurity firm Qualys have identified a potentially serious vulnerability in OpenSMTPD that can allow remote command execution with elevated privileges. read more Advertise on IT Security News. Read the complete article: Serious Vulnerability Discovered in OpenSMTPD
Investment in Privacy Pays Cybersecurity Dividends: Cisco
Better Privacy Means Better Security, Report Shows read more Advertise on IT Security News. Read the complete article: Investment in Privacy Pays Cybersecurity Dividends: Cisco
Magento 2.3.4 Patches Critical Code Execution Vulnerabilities
Magento 2.3.4 was released this week with patches for six vulnerabilities, including three that are considered critical. The first of these severe security issues is related to deserialization of untrusted data. Tracked as CVE-2020-3716, the bug could lead to arbitrary…
Apple Patches Tens of Vulnerabilities in iOS, macOS Catalina
Apple this week released software updates to address tens of security flaws in iOS, iPadOS, macOS Catalina, and other products. A total of 23 vulnerabilities were addressed in iOS 13.3.1 and iPadOS 13.3.1, now rolling out for iPhone 6s and…
Leaked Report Shows United Nations Suffered Hack
The United Nations has been hacked. An internal confidential document from the United Nations, leaked to The New Humanitarian and seen by The Associated Press, says that dozens of servers were “compromised” at offices in Geneva and Vienna. read more…
New Public Company SCVX Formed to Acquire Cybersecurity Firms
World’s First Cybersecurity Special Purpose Acquisition Company (SPAC) to Build a New Cybersecurity Platform read more Advertise on IT Security News. Read the complete article: New Public Company SCVX Formed to Acquire Cybersecurity Firms
Russia Blocks Swiss-based ProtonMail Over Wave of Bomb Threats
Russia has blocked a second encrypted email provider, Swiss-based ProtonMail, in efforts to halt a prolonged series of anonymous bomb threats, the security service said Wednesday. The FSB security service said Russia acted against Geneva-based ProtonMail after blocking another social…
Use of SCPI Protocol Exposes Measurement Instruments to Attacks
Measurement instruments that support the Standard Commands for Programmable Instruments (SCPI) protocol are exposed to hacker attacks, cybersecurity firm Trend Micro warned on Tuesday. read more Advertise on IT Security News. Read the complete article: Use of SCPI Protocol…
Google Paid Out $6.5 Million Through Bug Bounty Programs in 2019
Google claims it paid out over $6.5 million through its bug bounty programs in 2019, which brings the total awarded by the company since the launch of its first program in 2010 to more than $21 million. read more …
Firm Says Wawa Customers’ Hacked Credit Card Info Being Sold
Convenience store giant Wawa Inc. said Tuesday it is responding to reports that hacked information from its customers’ credit cards may be being sold on the dark web. read more Advertise on IT Security News. Read the complete article:…
Ring Doorbell App for Android Sends Out Loads of User Data
The Ring doorbell application for Android contains third-party trackers and sends out a large amount of personally identifiable information (PII), the Electronic Frontier Foundation (EFF) has discovered. read more Advertise on IT Security News. Read the complete article: Ring…
Facebook Rolls Out Tool Globally to Clear Third-Party Data
Facebook said Tuesday a new tool allowing users of the social network to view and delete data it collects from third parties is rolling out to the estimated two billion members of the leading social network worldwide. read more …
Vulnerability Allowed Attackers to Join Zoom Meetings
A vulnerability in the Zoom online meeting system could allow attackers eavesdrop on meetings and view all shared content, Check Point security researchers have discovered. read more Advertise on IT Security News. Read the complete article: Vulnerability Allowed Attackers…