Cybersecurity News
Claire’s Customers Targeted with Magecart Payment-Card Skimmer
The Magecart group targeted the tween accessories specialist starting the day after it shuttered its retail locations due to coronavirus.15 June 2020
‘Lamphone’ Hack Uses Lightbulb Vibrations to Eavesdrop on Homes
A new hack allowed researchers to discern sound -- including "Let it Be" by the Beatles, and audio from a Donald Trump speech -- from lightbulb vibrations.15 June 2020
Warning issued over hackable security cameras
The owners of the vulnerable indoor cameras are advised to unplug the devices immediately
The post Warning issued over hackable security cameras appeared first on WeLiveSecurity
15 June 2020
South African bank to replace 12m cards after employees stole master key
Postbank says employees printed its master key at one of its data centers and then used it to steal $3.2 million.15 June 2020
The Bright Side of the Dark Web
As the hitmen and fraudsters retreat, the Dark Web could become freedom's most important ally.15 June 2020
Intel brings novel CET technology to Tiger Lake mobile CPUs
Intel says CET can protect against ROP/JOP/COP malware.15 June 2020
Web skimmers found on the websites of Intersport, Claire's, and Icing
The malicious code has now been removed from all stores, but users are advised to review card statements for suspicious transactions.15 June 2020
Expert Insight - test
Creating a culture of supporting and advancing women is no small feat, but it's worth the challenge. Start with yourself. Here's how.14 June 2020
Privnotes.com Is Phishing Bitcoin from Users of Private Messaging Service Privnote.com
For the past year, a site called Privnotes.com has been impersonating Privnote.com, a legitimate, free service that offers private, encrypted messages which self-destruct automatically after they are read. Until recently, I couldn't quite work out what Privnotes was up to, but today it became crystal clear: Any messages containing bitcoin addresses will be automatically altered to include a different bitcoin address, as long as the Internet addresses of the sender and receiver of the message are not the same.14 June 2020
Lamphone attack lets threat actors recover conversations from your light bulb
Academics record light variations in a light bulb to recover the sound waves (speech, conversations, songs) from a room 25 meters (80 feet) away.13 June 2020
15 Individuals Plead Guilty to Multimillion-Dollar Online Auction Fraud Scheme
Members of Romanian gang used fraudulent ads for nonexistent products to extract money from US Internet users, DoJ says.12 June 2020
Cryptominers Found in Azure Kubernetes Containers
Images from a public repository contained cryptominers that Microsoft researchers found in Kubeflow instances running on Azure.12 June 2020
Knoxville Ransomware Attack Leads to IT Network Shutdown
The ransomware attack hit the Tennessee city of Knoxville this week, causing disruptions in various services.12 June 2020
Knoxville Pulls IT Systems Offline Following Ransomware Attack
Knoxville's government took its network offline and turned off infected servers and workstations after a ransomware attack this week.12 June 2020
7 Must-Haves for a Rockin' Red Team
Follow these tips for running red-team exercises that will deliver added insight into your operations.12 June 2020
Microsoft Joins Ban on Sale of Facial Recognition Tech to Police
Microsoft has joined Amazon and IBM in banning the sale of facial recognition technology to police departments and pushing for federal laws to regulate the technology.12 June 2020
Android ‘ActionSpy’ Malware Targets Turkic Minority Group
Researchers warn that the Earth Empusa threat group is distributing the spyware by injecting code into fake and watering-hole pages.12 June 2020
Inside Stealthworker: How it Compromises WordPress, Step-by-Step
A new wave of attacks using old malware is threatening WordPress sites that don't have strong password policies.12 June 2020
Russia says Germany has not provided any evidence of Bundestag hack
Germany may seek to impose sanctions on Russia, rather than actually trial the hacker.12 June 2020
Building Security into Software
Part 1 of a two-part series about securing machine learning.12 June 2020