Security

Cyber Security Reviews – Security will bring to our readers whats happening on the Security scene around the world.

0 Comments
Supporters of President Trump who want to date like-minded individuals had Emily Moreno, a former aide to Sen. Marco Rubio, to thank for creating the Donald Dater app, but their gratitude might have fallen flat after their information was leaked on the day the app was launched. According to Time, Monero confirmed the leak was discovered on
0 Comments
by Lisa Vaas Were you one of the dozens of people who got a bizarre Twitter message yesterday? Does anyone know what this twitter notification could possibly mean? https://t.co/iY6hQNLOgy — Nigella Lawson (@Nigella_Lawson) October 16, 2018 The messages were a long string of what looked like random numbers and letters. They were so mystifying that
0 Comments
A new vulnerability discovered in Apple’s latest iOS, 12.0.1, released last week, allows an attacker with physical access to an iPhone entry into photos on a locked phone, according to Jose Rodriguez, a Spanish security researcher. While the bypass bug, reported by The Hacker News, does require that an attacker have physical access to an
0 Comments
by Louisa Hardwick Canberra’s US embassy accidentally exposed details of one of its more enticing get-togethers last week, after an employee distributed a meeting invite to an undisclosed number of email recipients, The Guardian reported. Gavin Sundwall, US Mission to Australia public affairs counsellor, was, however, unperturbed, by what he claimed was a “training error”:
0 Comments
An attack aimed at Central Asian diplomatic organizations, dubbed the Octopus Trojan, is able to disguise itself as a popular online messenger, according to researchers at Kaspersky Lab. The Trojan, a malicious program for Windows, has possible links to DustSquad, a Russian-language cyber-espionage actor that focuses on Central Asian users that Kaspersky researchers have been monitoring
0 Comments
by Paul Ducklin What is this Facebook breach? The breach was announced by Facebook itself on 28 September 2018. It worked something like this… Facebook has a View As feature that lets you preview your profile as other people would see it. This is supposed to be a security feature that helps you check whether
0 Comments
In analyzing global cybercrime patterns ThreatMetrix found that identity spoofing, fueled by stolen identity data, is the most prevalent attack vector for the gaming and gambling industry. Additionally, the Q2 2018 Gaming & Gambling Report discovered that location (IP) spoofing attacks increased 257% year-over-year, making it the fastest growing attack vector in the space. Because
0 Comments
On October 11, 2018, WikiLeaks published AmazonAtlas, a 20-page document from late 2015 containing the addresses and operational details for more than 100 of Amazon’s data centers, one of which indicates an affinity for the comedy of Jerry Seinfeld. In addition to revealing the information about the data centers, located in 15 cities across nine countries,
0 Comments
A new variant of the Magecart attacks has been targeting smaller e-commerce operations, according to The Media Trust’s digital security and operations (DSO) team. Researchers found a new type of malware that targets payment pages on legitimate Magento-hosted retail sites. Dubbed CartThief, the malware’s behavior is similar to that of the current iteration of the
0 Comments
by John E Dunn Kanye West did something incredibly unwise during his visit to the White House this week that had nothing to do with making the media and a famously impatient President Trump sit through a 10-minute expletive-laced monologue. Pulling out an iPhone XS to show the assembled throng a picture of the hydrogen-powered
0 Comments
UK supermarket giant Morrisons is in the Court of Appeal this week fighting to have overturned a judgement that it should compensate employees after a major insider data leak. A High Court judge ruled last year that the company was “vicariously liable” for the actions of one of its employees, former internal auditor Andrew Skelton,
0 Comments
Google just unsealed information about an apparently exploitable bug in WhatsApp that could have allowed a malevolent caller to take over your device. Just answering a call could have been enough to land you in trouble. Project Zero researcher Natalie Silvanovich found a buffer overflow that could be triggered by data transmitted as part of
0 Comments
Centrify has spun out its Identity-as-a-Service (IDaaS) service into a new company, which it has named Idaptive. The move will allow Centrify to move its focus to privileged access, as part of its strategy around the zero trust concept, while Idaptive’s offering includes single single-on, adaptive multi-factor authentication, enterprise mobility management and user behavior analytics
0 Comments
The United States and UK authorities have joined Amazon and Apple in contesting a blockbuster story last week that Chinese spies implanted tiny chips onto supply chain components used in the tech giants’ products. The Bloomberg story, which cites 17 unnamed sources including three at Apple and four US officials, claimed that the microchips were
0 Comments
A regional US fast food chain has become the latest victim of the notorious Fin7 hacking group after a breach of card data involving countless customers. The FBI informed Pacific North West chain Burgerville on August 22 that it had been a target of the group, also known as Carbanak. It was believed that the
0 Comments
Credential phishing campaigns, in which high-profile individuals are unwittingly falling victim to malicious actors who are looking to gain access into business systems, have proven to be a successful attack vector. According to a new Menlo Security report, Understanding a Growing Threat: Credential Phishing, credential phishing is a quickly growing cyber-attack and is increasingly becoming
0 Comments
A security vendor has discovered nearly 200 domains spoofing legitimate UK news sites in order to spread fake news. DNS security firm DomainTools ran a search on five of the UK’s most popular sites: BBC News, Sky News, ITV News and the websites of the Guardian and the Daily Mail newspapers. It discovered 197 domains
0 Comments
by Lisa Vaas Step aside Amazon, drone deliveries are already a thing in prisons. There are many things that conspirators on the outside can do drone-wise: drop mobile phones, chargers, batteries, drugs, knives, memory cards, earphones, saws, or even drills. There are also many ways for those drone drops to be duds: sometimes they crash
0 Comments
by Mark Stockley Over the summer I decided to give my kids an old Apple laptop to share. We use laptops for school homework from time to time but my kids spend most of their screen time poking and swiping tablets. I wanted to broaden their horizons a little: do a bit of coding; a