Cybersecurity News
Universal Health Services Ransomware Attack Impacts Hospitals Nationwide

Give up Google, don't hit 'accept all': how to fight for your privacy

In Privacy Is Power, professor Carissa Véliz has made a shocking survey of how much intimate data we are surrendering. But she has a plan to fight back
“If you’re reading this book, you probably already know your personal data is being collected, stored and analysed,” Carissa Véliz begins, in Privacy Is Power. Her challenge, as a writer and a privacy advocate, is to shake us out of our complacency; to persuade us to see this not as a necessary sacrifice in the digital age, but an intolerable invasion. From the mounting dread I felt while reading Privacy Is Power, I’d say she was successful.
From the moment you wake up and first check your phone, to the marketers that infer your mood from your music choices, to the smart speaker that shares your private conversations, or the television that listens in on them (from the terms and conditions of a Samsung smart TV: “Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured”), there is nowhere to hide – or even just be – in this hyper-connected hellscape. Corporations can track you both by your face and your digital footprint, your medical records may be handed over to Big Tech, and advertisers may learn of your break-up before you do. In her book, Véliz, a professor at the Institute for Ethics in AI at Oxford University, often veers into the second person, cleverly underscoring her point: it’s impossible not to picture yourself blindly navigating this horror, then you remember - you already are.
Think twice before sharing. Before you post something, think how it might be used against you.
In Japan last year, a man sexually assaulted a pop star, claiming he had found her by analysing reflections in her eyes in photos she had posted online
Related: Government admits breaking privacy law with NHS test and trace
Privacy Is Power: Why and How You Should Take Back Control of Your Data, by Carissa Véliz is published by Bantam Press. To order a copy, go to guardianbookshop.com.
Continue reading...Joker Trojans Flood the Android Ecosystem

UHS hospital network hit by ransomware attack
UHS operates more than 400 hospitals across the US and UK. Some US hospitals have been down since Sunday.Twitter Warns Developers of API Bug That Exposed App Keys, Tokens

9 Tips to Prepare for the Future of Cloud & Network Security

Safeguarding Schools Against RDP-Based Ransomware
How getting online learning right today will protect schools, and the communities they serve, for years to come.MFA-Minded Attackers Continue to Figure Out Workarounds
While MFA can improve overall security posture, it's not a "silver bullet" -- and hacks continue.MFA-Minded Attackers Continue to Figure Out Workarounds
While MFA can improve overall security posture, it's not a "silver bullet" -- and hacks continue.Suspicious logins & RATs reported after ransomware attack on US govt contractor
Ransomware attack on Tyler Technologies is looking worse by the day.Students rise up against forced remote spy app usage in colleges, universities
Recent clashes highlight concerns that forcing students to use remote exam monitoring software is an affront to personal privacy.Google removes 17 Android apps doing WAP billing fraud from the Play Store
The 17 apps were infected with the Joker (Bread) malware, which Google described in January 2020 as one of the most persistent threats it dealt with since 2017.Bug Bounty FAQ: Top Questions, Expert Answers

KuCoin cryptocurrency exchange hacked for $150 million
KuCoin said an intruder drained all its hot wallets today.Pastebin adds 'Burn After Read' and 'Password Protected Pastes' to the dismay of the infosec community
The two new features will make it easier to disguise malware operations.FortiGate VPN Default Config Allows MitM Attacks

6 Things to Know About the Microsoft 'Zerologon' Flaw
Until all domain controllers are updated, the entire infrastructure remains vulnerable, the DHS' CISA warns.Industrial Cyberattacks Get Rarer but More Complex

Ring’s Flying In-Home Camera Drone Escalates Privacy Worries
