Auto Added by WPeMatico

As Zoom Booms Incidents of ‘ZoomBombing’ Become a Growing Nuisance

Numerous instances of online conferences being disrupted by pornographic images, hate speech or even threats can be mitigated using some platform tools.

By |2020-03-26T11:51:04-04:00March 26th, 2020|conference calls, coronavirus, COVID-19, hackers, Hacks, online meetings, Pornography, privacy, social media, threat actors, twitter, virtual workplace, Web Security, zoom, Zoom-bombing, Zoom-crashing, ZoomBombing|Comments Off on As Zoom Booms Incidents of ‘ZoomBombing’ Become a Growing Nuisance

Data Breach Occurs at Agency in Charge of Secure White House Communications

A leak at the Defense Information Systems Agency exposed personal information of government employees, including social security numbers.

By |2020-02-24T08:37:32-05:00February 24th, 2020|2020 election, data breach, Data Compromise, Defense Information Systems Agency, Department of Defense, Government, hackers, President Trump, Security, state-sponsored actors, White House|Comments Off on Data Breach Occurs at Agency in Charge of Secure White House Communications

MGM Grand Breach Leaked Details of 10.6 Million Guests Last Summer

This week a hacking forum posted data from the breach—which included personal and contact details for celebrities, tech CEOs, government officials and employees at large tech companies.

By |2020-02-20T06:48:37-05:00February 20th, 2020|Breach, Cloud misconfiguration, cloud server, cybercrime, cybercriminals, data breach, data leak, hackers, hacking forum, justin bieber, MGM Grand, personal details, Phishing, threat actors, twitter|Comments Off on MGM Grand Breach Leaked Details of 10.6 Million Guests Last Summer

Equifax Breach: Four Members of Chinese Military Charged with Hacking

Feds have charged four members of the Chinese People’s Liberation Army (PLA) in connection with the infamous 2017 Equifax breach.

By |2020-02-10T12:32:30-05:00February 10th, 2020|apache struts flaw, Breach, china hacks, Chinese people's liberation army, Chinese PLA, data breach, Equifax, Equifax breach, Government, hack, hackers, personal data|Comments Off on Equifax Breach: Four Members of Chinese Military Charged with Hacking

Microsoft Offers Rewards of Up to $20,000 in New Xbox Bug Bounty Program

Program is the latest the tech giant has launched that pay users and security researchers to find vulnerabilities in its numerous products.

By |2020-01-31T07:01:32-05:00January 31st, 2020|Azure, bug bounty, Bugs, gamers, Gaming, hackers, Microsoft, Microsoft Security Response Center, rewards, Security Researchers, Vulnerabilities, Xbox, XBox Live|Comments Off on Microsoft Offers Rewards of Up to $20,000 in New Xbox Bug Bounty Program

LoRaWAN Encryption Keys Easy to Crack, Jeopardizing Security of IoT Networks

New research from IOActive has found that “blindly” trusting the encryption of the widely adopted device protocol can lead to DDoS, sending of false data and other cyber attacks.

By |2020-01-28T07:02:50-05:00January 28th, 2020|Critical Infrastructure, cyber attacks, Cybersecurity, DDoS, Encryption, hackers, Healthcare, industrial control networks, IOActive, IoT, IoT security, Long Range Wide Area Networking, LoRaWAN networks, network keys, Smart Home, Vulnerabilities|Comments Off on LoRaWAN Encryption Keys Easy to Crack, Jeopardizing Security of IoT Networks

Dutch Politician Could Get Three Years in Prison for Hacking iCloud Accounts

Prosecution asks for imprisonment of the hacker who stole nude photos and other personal data from women’s iCloud accounts and then distributed some of the material online.

By |2019-12-04T08:52:44-05:00December 4th, 2019|apple, Celebgate, Data Privacy, hackers, Hacking, Hacks, Holland, iCloud, iphone, Jennifer Lawrence, Kirsten Dunst, Mitchel van der K, privacy, The Fappening, The Netherlands|Comments Off on Dutch Politician Could Get Three Years in Prison for Hacking iCloud Accounts

‘StrandHogg’ Vulnerability Allows Malware to Pose as Legitimate Android Apps

The flaw can allow hackers to take over typical device functions like sending messages and taking photos because users think malicious activity is a mobile app they use regularly.

By |2019-12-03T08:26:14-05:00December 3rd, 2019|Android, Exploit, google play, hackers, Malware, mobile apps, Mobile Security, StrandHogg, Trojan, Vulnerabilities, vulnerability|Comments Off on ‘StrandHogg’ Vulnerability Allows Malware to Pose as Legitimate Android Apps