Four Chocolate Factory trackers cracked the Top 25 in all regions Google, once again, is the “undisputed leader” when it comes to monitoring people’s behavior on the internet, according to Kaspersky’s annual web tracking report.… This article has been indexed…
Tag: The Register – Security
Russia’s digital warfare on Ukraine shows no signs of slowing: Malware hits surge
Severe incidents may be down, but Putin had to throw one in for good measure Russia’s use of malware to support its military efforts in Ukraine is showing no signs of waning while its tactics continually evolve to bypass protections.……
10 nasty software bugs put thousands of fuel storage tanks at risk of cyberattacks
Thousands of devices remain vulnerable, US most exposed to the threat Tens of thousands of fuel storage tanks in critical infrastructure facilities remain vulnerable to zero-day attacks due to buggy Automatic Tank Gauge systems from multiple vendors, say infosec researchers. ……
10 nasty bugs put thousands of fuel storage tanks at risk of attacks
Thousands of devices remain vulnerable and the US is most exposed to the threat Tens of thousands of fuel storage tanks in critical infrastructure facilities remain vulnerable to zero-day attacks due to buggy Automatic Tank Gauge systems from multiple vendors,…
How to spot a North Korean agent before they get comfy inside payroll
Mandiant publishes cheat sheet for weeding out fraudulent IT staff Against a backdrop of rising exposure to North Korean agents seeking (mainly) US IT roles, organizations now have a cheat sheet to help spot potential operatives.… This article has been…
A data leak and a data breach
How to protect personal data Partner Content For people who haven’t personally experienced them, terms like data leak or data breach may seem unfamiliar and foreign – much like visiting a new destination abroad.… This article has been indexed from…
Some US Kaspersky customers find their security software replaced by ‘UltraAV’
Back story to replacement for banned security app isn’t enormously reassuring Some US-based users of Kaspersky antivirus products have found their software replaced by product from by a low-profile entity named “UltraAV” – a change they didn’t ask for, and…
Telegram will now hand over IP addresses, phone numbers of suspects to cops
Maybe a spell in a French cell changed Durov’s mind In a volte-face, Telegram CEO Pavel Durov announced that the made-in-Russia messaging platform will become a lot less cozy for criminals.… This article has been indexed from The Register –…
Necro malware continues to haunt side-loaders of dodgy Android mods
11M devices exposed to trojan, Kaspersky says The Necro trojan is once again making a move against Android users, with up to eleven million individuals thought to be exposed to infected apps.… This article has been indexed from The Register…
‘Cybersecurity issue’ takes MoneyGram offline for three days – and counting
Still no ‘R’ word, but smells like ransomware from here A “cybersecurity issue” has shut down MoneyGram’s systems and payment services since Friday, and the fintech leader has yet to update customers as to when it expects to have its…
US proposes ban on Chinese, Russian connected car tech over security fears
No room for your spy mobiles on our streets The US Commerce Department has decided not to wait for the inevitable, and today announced plans that would ban connected vehicle technology – and vehicles using it – from Chinese and…
So how’s Microsoft’s Secure Future Initiative going?
34,000 engineers pledged to the cause, but no word on exec pay Microsoft took a victory lap today, touting the 34,000 full-time engineers it has dedicated to its Secure Future Initiative (SFI) since it launched almost a year ago and…
UPS supplier’s password policy flip-flops from unlimited, to 32, then 64 characters
That ‘third party’ person sure is responsible for a lot of IT blunders, eh? A major IT hardware manufacturer is correcting a recent security update after customers complained of a password character limit being introduced when there previously wasn’t one.……
Move over, Cobalt Strike. Splinter’s the new post-exploit menace in town
No malware crew linked to this latest red-teaming tool yet Attackers are using Splinter, a new post-exploitation tool, to wreak havoc in victims’ IT environments after initial infiltration, utilizing capabilities such as executing Windows commands, stealing files, collecting cloud service…
Apple’s latest macOS release is breaking security software, network connections
PLUS: Payer of $75M ransom reportedly identified; Craigslist founder becomes security philanthropist, and more Infosec In Brief Something’s wrong with macOS Sequoia, and it’s breaking security software installed on some updated Apple systems.… This article has been indexed from The…
US indicts two over socially engineered $230M+ crypto heist
Just one victim milked of nearly a quarter of a billion bucks Two individuals are in cuffs and facing serious charges in connection to a major theft of cryptocurrency worth more than $230 million from a single victim.… This article…
Ivanti patches exploited admin command execution flaw
Fears over chained attacks affecting EOL product The US Cybersecurity and Infrastructure Security Agency (CISA) just added the latest Ivanti weakness to its Known Exploited Vulnerability (KEV) catalog, a situation sure to annoy some – given that it’s yet another…
Cybercrooks strut away with haute couture Harvey Nichols data
Nothing high-end about the sparsely detailed, poorly publicized breach High-end British department store Harvey Nichols is writing to customers to confirm some of their data was exposed in a recent cyberattack.… This article has been indexed from The Register –…
CISA boss: Makers of insecure software are the real cyber villains
Write better code, urges Jen Easterly. And while you’re at it, give crime gangs horrible names like ‘Evil Ferret’ Software developers who ship buggy, insecure code are the real villains in the cyber crime story, Jen Easterly, boss of the…
Valencia Ransomware explodes on the scene, claims California city, fashion giant, more as victims
Boasts ‘appear to be credible’ experts tell El Reg A California city, a Spanish fashion giant, an Indian paper manufacturer, and two pharmaceutical companies are the alleged victims of what looks like a new ransomware gang that started leaking stolen…