Cybersecurity News
Cybercriminals Could be Coming After Your Coffee

23 October 2020
Cybercriminals Could be Coming After Your Coffee

23 October 2020
IoT Device Takeovers Surge 100 Percent in 2020

23 October 2020
Flurry of Warnings Highlight Cyber Threats to US Elections
FBI and intelligence officials issue fresh warnings about election interference attempts by Iranian and Russian threat actors.23 October 2020
Louisiana Calls Out National Guard to Fight Ransomware Surge

23 October 2020
US Treasury sanctions Russian research institute behind Triton malware
US imposes sanctions against Russia's Central Scientific Research Institute of Chemistry and Mechanics (CNIIHM).23 October 2020
Election Security: Beyond Mail-In Voting

23 October 2020
Apple notarizes six malicious apps posing as Flash installers
Apple notarization process bypassed for the second time in six weeks.23 October 2020
Georgia Election Data Hit in Ransomware Attack

23 October 2020
COVID-19 Vaccine-Maker Hit with Cyberattack, Data Breach

23 October 2020
Phishing groups are collecting user data, email and banking passwords via fake voter registration forms
With the election window closing, phishing groups are striking the iron while it's hot.23 October 2020
Week in security with Tony Anscombe
Security challenges for connected medical devices – Zero-day in Chrome gets patched – How to avoid USB drive security woes
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
23 October 2020
Nvidia Warns Gamers of Severe GeForce Experience Flaws

23 October 2020
A Pause to Address 'Ethical Debt' of Facial Recognition
Ethical use will require some combination of consistent reporting, regulation, corporate responsibility, and adversarial technology.23 October 2020
Ransomware Takes Down Network of French IT Giant

23 October 2020
Nvidia tackles code execution flaws, data leaks in GeForce Experience
The worst of the bugs is an uncontrolled search path issue with severe, exploitable consequences.23 October 2020
Securing medical devices: Can a hacker break your heart?
Why are connected medical devices vulnerable to attack and how likely are they to get hacked? Here are five digital chinks in the armor.
The post Securing medical devices: Can a hacker break your heart? appeared first on WeLiveSecurity
23 October 2020
Botnet Infects Hundreds of Thousands of Websites
KashmirBlack has been targeting popular content management systems, such as WordPress, Joomla, and Drupal, and using Dropbox and GitHub for communication to hide its presence.22 October 2020
The Now-Defunct Firms Behind 8chan, QAnon
Some of the world's largest Internet firms have taken steps to crack down on disinformation spread by QAnon conspiracy theorists and the hate-filled anonymous message board 8chan. But according to a California-based security researcher, those seeking to de-platform these communities may have overlooked a simple legal solution to that end: Both the Nevada-based web hosting company owned by 8chan's current figurehead and the California firm that provides its sole connection to the Internet are defunct businesses in the eyes of their respective state regulators. In practical terms, what this means is that the legal contracts which granted these companies temporary control over large swaths of Internet address space are now null and void, and American Internet regulators would be well within their rights to cancel those contracts and reclaim the space.22 October 2020
7 Mobile Browsers Vulnerable to Address-Bar Spoofing
Flaws allow attackers to manipulate URLs users see on their mobile devices, Rapid7 says22 October 2020