Cybersecurity News
Poll: Worried About Losing Your Job?
With the unemployment rate surging due to COVID-19, are you concerned your job is in jeopardy?Small Businesses Tapping COVID-19 Loans Hit with Data Exposure
The SBA said sensitive information about applicants may have been revealed to others applying for disaster loan program funds.This is what happens to cryptocurrency paid out in sextortion campaigns
Researchers have followed the trail of dirty coins generated through extorting sextortion spam victims.Hackers have breached 60 ad servers to load their own malicious ads
Why buy legitimate ad slots to deliver malvertising when you can just hack the server instead.Domain Registrars Under Pressure to Combat COVID-19-Related Scams
A huge increase in malicious website registrations has prompted concern from US lawmakers.Using Big Tech to tackle coronavirus risks swapping one lockdown for another | Adam Smith
An app that logs movements and contacts might seem like a fair trade now but we risk giving away our privacy for good
Even when the lockdown is lifted, there is no guarantee that life will ever return to normal. To prevent a future outbreak of coronavirus, the UK will need to roll out mass testing, maintain some social distancing measures and closely monitor communities to curb future flare-ups.
In pursuing that last aim, governments across the world are developing technology to track our movements. When lockdown ends, technology could be a valuable means of controlling future outbreaks, alerting people to cases of Covid-19 in their area and hopefully preventing future shutdowns.
Related: The expansion of mass surveillance to stop coronavirus should worry us all | Veena Dubal
Adam Smith is a technology reporter at the Independent
Continue reading...Buying a secondhand device? Here’s what to keep in mind
If you’re trying to be responsible towards the planet, also be responsible to yourself and take these steps so that the device doesn’t end up costing you more than you’ve saved
The post Buying a secondhand device? Here’s what to keep in mind appeared first on WeLiveSecurity
Smart IoT home hubs vulnerable to remote code execution attacks
IoT hubs used in homes and offices were found to be susceptible to exploit due to critical bugs in their firmware.Serious flaws found in multiple smart home hubs: Is your device among them?
In worst-case scenarios, some vulnerabilities could even allow attackers to take control over the central units and all peripheral devices connected to them
The post Serious flaws found in multiple smart home hubs: Is your device among them? appeared first on WeLiveSecurity
Automated Bots Are Increasingly Scraping Data & Attempting Logins
The share of bot traffic to online sites declines, but businesses are seeing an overall increase in automated scraping of data, login attempts, and other detrimental activity.Banking.BR Android Trojan Emerges in Credential-Stealing Attacks
A new Android trojan targets banking customers with overlay attacks to steal their bank credentials and ultimately take over their accounts.Researchers Use Microsoft Terminal Services Client in New Attack Method
The technique would enable attackers to run malicious code via Remote Desktop Protocol using DLL side-loading to bypass security controls.NFL Tackles Cybersecurity Concerns Ahead of 2020 Draft Day
Researchers weigh in on potential security concerns surrounding the 2020 NFL Draft.New iOS exploit discovered being used to spy on China's Uyghur minority
New "Insomnia" exploit works on iOS versions 12.3, 12.3.1, and 12.3.2; was patched in iOS 12.4 last year.8 Tips for Small Merchants: Protecting Payment Data During COVID-19
The COVID-19 pandemic is quickly changing how many small merchants accept payments. Merchants that previously only had brick-and-mortar locations are moving to accept e-commerce and over-the-phone transactions.