Posted in Security

Be wary of scammers, some tips

Credit: CC0 Public Domain Readers, you really need to be on your toes. On Wednesday, federal prosecutors said that hack…

Continue Reading...
Posted in Security

ECB uncovers data breach in bank newsletter

The hack didn’t reach market-sensitive ECB data Hackers had access for months to the contact information of hundreds of financial…

Continue Reading...
Posted in Security

Electric car charging stations may be portals for power grid cyberattacks

The map displays substations┬áconnected by transmissions lines along with electric vehicle charging stations.┬áThe size of the blue circles is proportional…

Continue Reading...
Posted in Security

Router guest networks lack adequate security, according to researchers

Credit: CC0 Public Domain While many organizations and home networks use a host and guest network on the same router…

Continue Reading...
Posted in Security

Capital One suspect may have hacked 30-plus companies

Federal prosecutors say a woman charged in a massive data breach at Capital One may have hacked more than 30…

Continue Reading...
Posted in Security

App allows inspectors to find gas pump skimmers faster

An inspector holds up a phone equipped with Bluetana with a skimmer in the background. The two lines in red…

Continue Reading...
Posted in Security

Check Point Research shows DSLR camera vulnerabilities

A security researcher took advantage of vulnerabilities in a protocol used in digital cameras to infect ransomware into a DSLR…

Continue Reading...
Posted in Security

UN probing 35 North Korean cyberattacks in 17 countries

by Edith M. Lederer In this Sunday, Aug. 11, 2019, file photo, visitors watch the North side from the Imjingak…

Continue Reading...
Posted in Security

Carnegie Mellon team flexes hacking prowess with fifth DefCon title in seven years

PPP members and CMU alumni Erye Hernandez (INI ’14; left) and Tyler Nighswander (CS ’13; right) compete at the annual…

Continue Reading...
Posted in Security

Smartphone apps may connect to vulnerable backend cloud servers

A portion of the chart created to provide an overview of vulnerable mobile apps by genre. Credit: Georgia Tech Cybersecurity…

Continue Reading...