Cybersecurity News
16 DDoS attacks take place every 60 seconds, rates reach 622 Gbps
With over 23,000 recorded attacks per day, customer-facing enterprise services are bearing the brunt of attacks.8 Things Users Do That Make Security Pros Miserable

Lenovo, HP, Dell Peripherals Face Unpatched Firmware Bugs

Five years after the Equation Group HDD hacks, firmware security still sucks
Device manufacturers are not forcing driver signatures at all times.Microsoft to deploy ElectionGuard voting software for the first time tomorrow
Residents in Fulton, Wisconsin will elect representatives for the Wisconsin Supreme Court via voting machines running Microsoft's ElectionGuard voting software.Microsoft to deploy ElectionGuard voting software for the first time
Residents in Fulton, Wisconsin will elect representatives for the Wisconsin Supreme Court via voting machines running Microsoft's ElectionGuard voting software.Bug in WordPress plugin can let hackers wipe up to 200,000 sites
Same bug can also let attackers gain access to the admin account.FC Barcelona Twitter account hacked – again
The same hackers have also got their mitts on social media accounts of other high-profile sporting targets
The post FC Barcelona Twitter account hacked – again appeared first on WeLiveSecurity
Pay Up, Or We’ll Make Google Ban Your Ads
A new email-based extortion scheme apparently is making the rounds, targeting Web site owners serving banner ads through Google's AdSense program. In this scam, the fraudsters demand bitcoin in exchange for a promise not to flood the publisher's ads with so much bot and junk traffic that Google's automated anti-fraud systems suspend the user's AdSense account for suspicious traffic.Israeli soldiers tricked into installing malware by Hamas agents posing as women
IDF: Six social media accounts were redirecting soldiers to installing three malware-infected apps.Iranian hackers have been hacking VPN servers to plant backdoors in companies around the world
Iranian hackers have targeted Pulse Secure, Fortinet, Palo Alto Networks, and Citrix VPNs to hack into large companies.Our personal health history is too valuable to be harvested by the tech giants | Eerke Boiten

Action to prevent deeper access to our private lives and data is more essential than ever
Health data paints a rich picture of our lives. Even if you remove your name, date of birth and NHS number to “anonymise” yourself, a full health history will reveal your age, gender, the places where you have lived, your family relationships and aspects of your lifestyle.
Used in combination with other available information, this may be enough to verify that this medical history relates to you personally and to target you online. Consequently, whenever the NHS shares health data, even if it is anonymised, we need to have confidence in who it goes to and what they can do with it.
When data about us influences a credit rating or a hiring decision, we are unlikely ever to find out
Continue reading...IOTA cryptocurrency shuts down entire network after wallet hack
Hackers exploit vulnerability in official IOTA wallet to steal millionsSecond Windows 10 update is now causing problems by hiding user profiles
Botched Windows 10 KB4532693 update is hiding user profiles. Uninstalling update fixes problems.Martin and Dorothie Hellman on Love, Crypto & Saving the World

Bluetooth LE devices impacted by SweynTooth vulnerabilities
BLE software kits from six chipset vendors impacted. More vendor names to be revealed soon.OpenSSH adds support for FIDO/U2F security keys
OpenSSH 8.2 adds support for authentication via FIDO/U2F protocols, most commonly used with hardware security keys.Phishing Campaign Targets Mobile Banking Users
Consumers in dozens of countries were targeted, Lookout says.Huawei Controversy Highlights 5G Security Implications

500 Malicious Chrome Extensions Impact Millions of Users
