What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
no_ico.webp 2019-06-14 19:05:00 (Déjà vu) Hackers Using Victims To Train Their Malware (lien direct) Outlaw hackers return with cryptocurrency mining botnet. The group is using Chinese victims as guinea pigs to try out their malware. The Outlaw hacking group has reemerged and is once again on the radar of cybersecurity researchers following the detection of a botnet attacking systems to mine for cryptocurrency. The botnet spreads a miner for Monero (XMR).  … The ISBuzz Post: This Post Hackers Using Victims To Train Their Malware Malware
no_ico.webp 2019-06-14 16:10:02 Comment: UK Companies Lose 2.5 Months Per Year Dealing With Poor Password Management (lien direct) It has been reported that businesses in the UK lose an average of two-and-a-half months per year in time spent dealing with poor password management, according to new research. As detailed in its report Password Practices 2019, OneLogin surveyed 600 global IT professionals to gauge how companies are protecting passwords in terms of tools, guidelines and practices.  2019 Password … The ISBuzz Post: This Post Comment: UK Companies Lose 2.5 Months Per Year Dealing With Poor Password Management
no_ico.webp 2019-06-14 15:55:05 Living On A Network That Must Not Die (lien direct) The network is the backbone of almost every organisation today. When it is not available productivity falls, the business loses money and its reputation suffers. Typically, the network and its efficient operation is fundamental to the organisation's success. And yet trends like remote working and virtualisation, while they help drive business flexibility and productivity, may also make the network more … The ISBuzz Post: This Post Living On A Network That Must Not Die
no_ico.webp 2019-06-14 02:24:02 (Déjà vu) Critical Flaw In Evernote Chrome Extension Exposed Sensitive Data Of Millions Of Users (lien direct) A critical flaw in the Evernote Web Clipper Chrome extension could allow potential attackers to access users’ sensitive information from third party online services.  Once Chrome’s site isolation security feature is broken, user data from accounts on other websites is no longer protected and this allows bad actors to access sensitive user info from third-party sites  Affected approximately 4,600,000 … The ISBuzz Post: This Post Critical Flaw In Evernote Chrome Extension Exposed Sensitive Data Of Millions Of Users
no_ico.webp 2019-06-14 01:21:00 Cyber Security Commentary On The DDOS Attacks On Telegram During Hong Kong Protests (lien direct) As part of our experts Comments Series,  Dr Guy Bunker, CTO at Clearswift Cyber Security commented below on the subject of the recent use of DDOS attacks on the messaging app Telegram, which the founder of Telegram states was a concerted state-sponsored attack intended to disrupt the Cantonese anti-extradition protests. Dr Bunker discusses the ways in which the attack … The ISBuzz Post: This Post Cyber Security Commentary On The DDOS Attacks On Telegram During Hong Kong Protests
no_ico.webp 2019-06-13 23:09:01 (Déjà vu) Ransomware Attack Has Halted Work At One Of The World\'s Largest Airplane Parts Manufacturers (lien direct) It has been announced that ASCO, one of the world’s largest suppliers of airplane parts, has ceased production in factories across four countries due to a ransomware infection reported at its plant in Zaventem, Belgium. As a result of having IT systems crippled by the ransomware infection, the company has sent home approximately 1,000 of … The ISBuzz Post: This Post Ransomware Attack Has Halted Work At One Of The World’s Largest Airplane Parts Manufacturers Ransomware
no_ico.webp 2019-06-13 21:30:02 (Déjà vu) American Medical Collection Agency Breach – 20 Million Patients\' Records Compromised (lien direct) Maryland Attorney General Brian E. Frosh has warned Marylanders that their medical and other private information may have been compromised by a cyberattack against American Medical Collection Agency, a third-party collection agency for laboratories, hospitals, physician groups, medical providers and others. The known list of those impacted affects over 20 million patients.  CONSUMER ALERT: Md. Attorney … The ISBuzz Post: This Post American Medical Collection Agency Breach – 20 Million Patients’ Records Compromised
no_ico.webp 2019-06-13 21:00:04 Experts Comments On Microsoft SymCrypt Vuln Can Bring Down Windows Servers (lien direct) A Google researcher has discovered a vulnerabiliy in the SymCrypt cryptographic library of Microsoft’s OS that can trigger a DDoS disruption in Windows 8 servers and above, causing a perpetual operation “when calculating the modular inverse on specific bit patterns with bcryptprimitives!SymCryptFdefModInvGeneric.”   Today is day 91, so the issue is now public. I consider this relatively low severity, but you could take down an … The ISBuzz Post: This Post Experts Comments On Microsoft SymCrypt Vuln Can Bring Down Windows Servers
no_ico.webp 2019-06-13 20:45:02 (Déjà vu) Nozomi Networks-Sponsored SANS Survey Finds Industrial Organizations Are Going All-In To Tackle Growing Threats To OT/ICS Cyber Security (lien direct) Citrix, a company which works with the likes of the FBI and US military, recently hit the headlines when it fell victim to hackers. The cyber criminals allegedly used a technique called password spraying, which exploits weak passwords. This is just one example of why the traditional username and password combination is no longer fit for purpose, … The ISBuzz Post: This Post Nozomi Networks-Sponsored SANS Survey Finds Industrial Organizations Are Going All-In To Tackle Growing Threats To OT/ICS Cyber Security
no_ico.webp 2019-06-13 09:45:04 My Voice Is My Ultimate Password – How Biometrics Can Keep Hackers At Bay (lien direct) Citrix, a company which works with the likes of the FBI and US military, recently hit the headlines when it fell victim to hackers. The cyber criminals allegedly used a technique called password spraying, which exploits weak passwords. This is just one example of why the traditional username and password combination is no longer fit for purpose, … The ISBuzz Post: This Post My Voice Is My Ultimate Password – How Biometrics Can Keep Hackers At Bay
no_ico.webp 2019-06-12 20:19:04 Patch Tuesday Commentary (lien direct) Yesterday, Microsoft published its monthly roll-up of security updates, known as Patch Tuesday. This month, the OS maker has patched 88 vulnerabilities, among which 21 received a rating of “Critical,” the company’s highest severity ranking.  Experts Comments:  Satnam Narang, Senior Research Engineer at Tenable:  “This month's Patch Tuesday release contains updates for nearly 90 CVEs, including fixes for four … The ISBuzz Post: This Post Patch Tuesday Commentary
no_ico.webp 2019-06-12 19:02:03 World\'s Top Security Vulnerabilities Revealed – HackerOne (lien direct) HackerOne is revealing the top 10 most impactful security vulnerabilities which have earned hackers over $54 million in bounties.    Based on the 120,000+ security vulnerabilities that hackers have reported across over 1,400 HackerOne customer programs, the data represents real-world risks that existed in organisations, including technology unicorns, governments, start-ups, financial institutions and open source projects.    HackerOne has launched an interactive site showing … The ISBuzz Post: This Post World’s Top Security Vulnerabilities Revealed – HackerOne
no_ico.webp 2019-06-12 18:31:01 Europe Its Own Biggest Enemy As Cyberattacks Continue To Soar (lien direct) New threat intelligence from F5 Labs shows that Europe suffers more attacks from within its borders than any other part of the world;  Majority of attacks stem from IP addresses in the Netherlands, followed by the United States, China, Russia, and France    F5 Labs identified top attacking networks and ISPs, as well as most prominently … The ISBuzz Post: This Post Europe Its Own Biggest Enemy As Cyberattacks Continue To Soar Threat
no_ico.webp 2019-06-12 14:35:02 MI5 \'Unlawfully\' Handled Bulk Surveillance Data, Lawsuit (lien direct) UK's secret service, MI5, may have broken the law by holding large volumes of citizens’ private data without proper protections, according to documents released today in the High Court.   "The documents show extraordinary and persistent illegality in MI5's operations, apparently for many years”https://t.co/O9IbcdA1Rs — Middle East Eye (@MiddleEastEye) June 11, 2019 Expert Comments:    … The ISBuzz Post: This Post MI5 ‘Unlawfully’ Handled Bulk Surveillance Data, Lawsuit
no_ico.webp 2019-06-12 12:55:03 Avast Business Launches New Patch Management (lien direct) With 55% of installed software on PCs worldwide out of date, Avast's new service will help small businesses prioritize, manage and deploy critical security updates   Redwood City, California, June 11, 2019 – Avast (LSE:AVST), the world leader in digital security products, has today launched a new Patch Management service to help small and mid-sized businesses manage necessary … The ISBuzz Post: This Post Avast Business Launches New Patch Management Guideline
no_ico.webp 2019-06-11 23:30:04 (Déjà vu) Malware Peddlers Hit Office Users With Old But Reliable Exploit (lien direct) Emails delivering RTF files equipped with an exploit that requires no user interaction (except for opening the booby-trapped file) are hitting European users' inboxes, Microsoft researchers have warned. Theexploit takes advantage of a vulnerability in an older version of the Office Equation Editor, which was manually patched by Microsoft in November 2017.  An active malware campaign using emails in … The ISBuzz Post: This Post Malware Peddlers Hit Office Users With Old But Reliable Exploit Malware Vulnerability
no_ico.webp 2019-06-11 19:01:01 (Déjà vu) New Extortion Scam Threatens To Ruin A Website\'s Reputation (lien direct) A new extortion scam campaign is underway that is targeting websites owners and stating that if they do not make a payment, the attacker will ruin their site’s reputation and get them blacklisted for spam. A new #extortion scam campaign is underway that is targeting websites owners and stating that if they do not make … The ISBuzz Post: This Post New Extortion Scam Threatens To Ruin A Website’s Reputation
no_ico.webp 2019-06-11 18:30:02 China\'s Shanghai University Which Exposed Over 8TB In Email Meta Data (lien direct) Another story has run today about an unsecured cloud database. This time it was China's Shanghai Jiao Tong University, which exposed over 8TB in email meta data.   Shanghai Jiao Tong University' database leaked https://t.co/XMxZXJMsxz #info #news #tech — Gray Hats (@the_yellow_fall) June 11, 2019 Expert Comments:  Steve Armstrong, Regional Director EMEA at Bitglass:   … The ISBuzz Post: This Post China's Shanghai University Which Exposed Over 8TB In Email Meta Data
no_ico.webp 2019-06-11 14:45:00 The Government Technology Innovation Strategy (lien direct) The government's Technology Innovation Strategy policy paper  explains that joint with DCMS, Oliver Dowden CBE MP will be working to ensure the safe and effective use of digital identities across the UK economy. In relation to data and technology, the policy outlines that the government will work collaboratively with stakeholders to support the development of the digital identity market.  UK … The ISBuzz Post: This Post The Government Technology Innovation Strategy
no_ico.webp 2019-06-11 11:30:01 US Border Agency Says Travellers\' Images Stolen By Hackers – Commentary (lien direct) Reports have surfaced that U.S. Customs and Border Protection (CBP) officials have announced that photos of travelers have been compromised as part of a “malicious cyber-attack. Customs officials said in a statement yesterday that the images, which included photos of people's license plates, had been compromised as part of an attack on a federal subcontractor. The agency maintains a … The ISBuzz Post: This Post US Border Agency Says Travellers' Images Stolen By Hackers – Commentary
no_ico.webp 2019-06-11 11:15:00 GDPR One Year On: What Have We Learned? (lien direct) Giridhara Raam, Product Evangelist, ManageEngine explores the impact of GDPR one year on and discusses what lies ahead GDPR One Year On: What Have We Learned? Businesses are comprised of different departments and professionals, with data flowing across the organisation. When there’s a data breach, it's usually the data protection officers (DPOs), CIOs, and CISOs who … The ISBuzz Post: This Post GDPR One Year On: What Have We Learned?
no_ico.webp 2019-06-10 11:55:00 Report Reveals Website Security Risk For Australian & NZ Firms (lien direct) New research has found 87% of SME websites using the Magento platform are currently at high risk from cyber attacks.   By contrast, under 10% of websites using other major e-commerce platforms surveyed register in the same high risk category.     The research, from cyber security firm Foregenix, analysed nearly 9 million websites worldwide, including 150,000 in Oceania – Australia and New … The ISBuzz Post: This Post Report Reveals Website Security Risk For Australian & NZ Firms APT 32
no_ico.webp 2019-06-10 08:30:01 The Future Of Evolution (lien direct) Having attended InfoSecurity 19, I must admit I was a tad disappointed with what was on offer – throw backs of the long, over deliberated 'Insider Threat', the usual focus on PCI, and of course the new the commercial money-spin kid on the block in the guise of GDPR. Add to this the rebranding of Anti-Virus/Malware Bronze Bullet solutions … The ISBuzz Post: This Post The Future Of Evolution
no_ico.webp 2019-06-08 23:30:05 Incident Response: Five Key Factors CISOs Should Consider When Building This Process (lien direct) As attacks become more sophisticated and frequent, 86% of CISOs agree that cyber-incidents within their companies are inevitable. So, it comes as no surprise that the majority (76%) believe that speed and quality of incident response (IR) are the most important factors when measuring their performance. This means that heads of IT security departments are now … The ISBuzz Post: This Post Incident Response: Five Key Factors CISOs Should Consider When Building This Process
no_ico.webp 2019-06-08 19:30:01 Security Issues On Illegal Streaming Of Live Matches (lien direct) Many people streamed the Nations League fixture between England and Holland, illegally, please find below comments from security expert why it is unsafe to stream illegally as part of our security experts comments series.  BBC News – Arrests shut down illegal TV streaming gang https://t.co/OKONhrB1xy #OTT #StreamingTV #Piracy #IPTV — IPTV Magazine (@IPTVMagazine) June 7, 2019 David Emm, Principal Security … The ISBuzz Post: This Post Security Issues On Illegal Streaming Of Live Matches
no_ico.webp 2019-06-08 17:18:01 Fortune 500 Giant Tech Data Exposed Customer And Billing Data (lien direct) It has been reported that security researchers discovered a security lapse at IT giant Tech Data allowed them to access customer and billing data. The Fortune 500 information technology giant secured an exposed server shortly after researchers found and reported the leaking data. The server was running a database used for logging internal company events for its StreamOne cloud … The ISBuzz Post: This Post Fortune 500 Giant Tech Data Exposed Customer And Billing Data
no_ico.webp 2019-06-08 14:00:01 New Research Has Uncovered The Amount It Costs To Buy Various Types Of Stolen Login Information Online (lien direct) A new research for a BBC Watchdog episode has uncovered the amount it costs to buy various types of stolen login information online.    They found that stolen bank details commanded the highest price. Just like a regular eBay listing, stolen credentials are for sale on various marketplaces hiding on the dark web.    Digital privacy and cyber security … The ISBuzz Post: This Post New Research Has Uncovered The Amount It Costs To Buy Various Types Of Stolen Login Information Online
no_ico.webp 2019-06-08 12:30:01 (Déjà vu) GoldBrute Botnet Credential Stuffing Attack (lien direct) A botnet is currently scanning the internet in search of poorly protected Windows machines with Remote Desktop Protocol connection enabled. Called GoldBrute, the malware compiled a list of over 1.5 million unique systems and tested access with brute-force credential stuffing attacks, ZDNet reported.  #GoldBrute Botnet Brute Forcing 1.5 million #RDP servers https://t.co/ZIo21VtM1k pic.twitter.com/YbEluHiZG8 — SANS ISC (@sans_isc) … The ISBuzz Post: This Post GoldBrute Botnet Credential Stuffing Attack Malware
no_ico.webp 2019-06-08 11:30:03 Microsoft Deletes Its Facial Recognition Database (lien direct) Microsoft has deleted a massive database of 10 million images which was being used to train facial recognition systems, the Financial Times reports. The database was released in 2016 and was built of online images of 100,000 well-known people. The database is believed to have been used to train a system operated by police forces … The ISBuzz Post: This Post Microsoft Deletes Its Facial Recognition Database
no_ico.webp 2019-06-08 10:30:00 NSA Warns Windows Users To Patch PCs Against BlueKeep (lien direct) The US National Security Agency (NSA) has warned Microsoft Windows users to make sure they are using updated systems to guard against the flaw known as “BlueKeep“, as it exists in past editions of Microsoft Windows. Microsoft has warned that this flaw is potentially “wormable,” meaning it could spread without user interaction across the internet.   Gavin Millard, VP of … The ISBuzz Post: This Post NSA Warns Windows Users To Patch PCs Against BlueKeep
no_ico.webp 2019-06-08 10:15:04 One In 10 Brits Now Live A Cashless Life (lien direct) Please find below a comment from David Orme, SVP at IDEX Biometrics ASA, in response to today's news that one in 10 brits now live a largely cashless life, according to new UK Finance findings.    In this comment David argues that in order for a completely cashless future to be possible, Governments must work alongside banks to ensure the … The ISBuzz Post: This Post One In 10 Brits Now Live A Cashless Life
no_ico.webp 2019-06-06 23:51:03 The Missing Mandate In Australia\'s Efforts To Protect The Finance Sector From Cyber Threats (lien direct) Australia's financial services industry regulator has a new information security standard that is set to kick in from July, opening up a potential pathway to a much-needed national intelligence-led attack simulation scheme for the industry. The Australian Prudential Regulation Authority's (APRA) incoming CPS 234 standard on information security, which late last year was fast-tracked “due … The ISBuzz Post: This Post The Missing Mandate In Australia's Efforts To Protect The Finance Sector From Cyber Threats
no_ico.webp 2019-06-06 23:50:02 Consumers Reluctant To Swap Psswords For Biometrics For Fear Of Identity Fraud (lien direct) Paysafe launches new global research into consumer payment trends    Over half of consumers (56 percent) are worried that the shift to biometrics to authenticate online payments will dramatically increase the amount of identity fraud, according to new research conducted by Paysafe, a leading global payments provider. The research found that four fifths (81 percent) of consumers still favour passwords for … The ISBuzz Post: This Post Consumers Reluctant To Swap Psswords For Biometrics For Fear Of Identity Fraud Guideline
no_ico.webp 2019-06-06 23:30:00 Customized Ads & What They Drop On Websites (lien direct) A surprising report from college researchers show that personalized ads are barely more successful than regulars ads. However, it is what those ads drop on the websites that could get publishers in trouble.    Expert Comments: Chris Olson, CEO at The Media Trust:   “An ad exchange's third-party cookies are not the only technologies that hoover up information … The ISBuzz Post: This Post Customized Ads & What They Drop On Websites
no_ico.webp 2019-06-06 21:55:03 LabCorp Breach Exposes 7.7 Mil Consumers\' PII, Health And Payment Info (lien direct) LabCorp has disclosed that 7.7 million customers may have been impacted by a data breach of a third party billing provider which exposed PII, payment data and PHI.   Not just Quest: now LabCorp has confirmed a data breach affecting 7.7 million patients. https://t.co/44bJ6RcyZl — TechCrunch (@TechCrunch) June 5, 2019 Experts Comments:  George Wrenn, Founder and CEO at CyberSaint Security: “Due to … The ISBuzz Post: This Post LabCorp Breach Exposes 7.7 Mil Consumers’ PII, Health And Payment Info Data Breach
no_ico.webp 2019-06-05 13:00:04 Apple Sign On Commentary (lien direct) Apple let the public know that it has introduced a new way to stop third-party sites and services from getting your information when you sign up for an app. According to Apple software engineering chief, Crag Federighi, one-click sign on can be convenient for consumers but can come at the cost of users' privacy. Personally … The ISBuzz Post: This Post Apple Sign On Commentary
no_ico.webp 2019-06-05 12:10:03 Comment: Australian uni breach (lien direct) Following news that an Australian university has been hacked, affecting sensitive data going back 19 years, please find below comment from SailPoint, the identity governance experts. The comment covers the importance of ensuring that sensitive data is governed by cybersecurity measures, regardless of the system in which it is kept – on premises or in the … The ISBuzz Post: This Post Comment: Australian uni breach
no_ico.webp 2019-06-05 11:30:01 Industry comments: Public Accounts Committee advises kitemark system for electronic devices (lien direct) Following the news that the Public Accounts Committee has advised that the UK government should introduce a kitemark system for electronic devices, please find comment below from Jim Phillipoff, Head of Business Development, Irdeto and SecureData's Chief Security Strategy Officer, Charl van der Walt. Jim Phillipoff, Head of Business Development, Irdeto: “As the UK consultation … The ISBuzz Post: This Post Industry comments: Public Accounts Committee advises kitemark system for electronic devices
no_ico.webp 2019-06-05 11:00:05 Expert Advice on Attackers bypassing Microsoft RDP (lien direct) On June 4, 2019, the CERT Coordination Centre (CERT/CC) Carnegie Mellon's Computer Emergency Response Team released an advisory regarding discovered behaviour in the Microsoft Windows Remote Desktop Protocol (RDP), which can allow an attacker to bypass the lock screen on some remote sessions. Microsoft was notified of this finding and has stated that the “behaviour does … The ISBuzz Post: This Post Expert Advice on Attackers bypassing Microsoft RDP
no_ico.webp 2019-06-04 23:30:03 Malware Being Hosted On Azure (lien direct) According to this link (https://blog.appriver.com/threat-alert-microsoft-azure-malware), attacks have escalated to malware being hosted on the Azure service. Not only is Azure hosting malware, it is also functioning as the command and control infrastructure for the malicious files.  Roy Rashti, Cybersecurity Expert at BitDam:  “Cloud providers own their servers, meaning they have full access to the data. … The ISBuzz Post: This Post Malware Being Hosted On Azure Malware
no_ico.webp 2019-06-04 18:30:02 (Déjà vu) Phishing Scam Pretends To Be Undelivered Emails (lien direct) Bleeping computer reported a new phishing campaign is underway that pretends to be a list undelivered email being held for you on your Outlook Web Mail service. Users are then prompted to decide what they wish to do with each mail, with the respective links leading to a fake login form.  Corin Imai, Senior Security Advisor at … The ISBuzz Post: This Post Phishing Scam Pretends To Be Undelivered Emails Guideline
no_ico.webp 2019-06-04 17:37:00 A Password Cracking Dictionary Found Online (lien direct) A big password cracking dictionary (1,493,677,782 words, 15GB) with every wordlist, dictionary, and password database leak found on the internet.  Expert Comments:   Jake Moore, Security Specialist at ESET:  “This is an enormous database of passwords available to anyone who may want to get their hands on it. This shouldn't be shrugged off as just another breach. When passwords … The ISBuzz Post: This Post A Password Cracking Dictionary Found Online
no_ico.webp 2019-06-04 15:55:02 The Next Generation Of Agnostic Cloud Security Delivered By cloudAshur (lien direct) The year is 2019, and I doubt anyone attending Infosecurity Show 2019 would challenge the statement 'We live in times of Insecurity'. With a backdrop covering a spectrum of Cyber Attacks, by example, with Yahoo suffering a 3 billion record compromise back in 2013, through to the Marriott Hack circa 2014 – 2018 which exposed … The ISBuzz Post: This Post The Next Generation Of Agnostic Cloud Security Delivered By cloudAshur Hack Yahoo
no_ico.webp 2019-06-04 13:45:02 Quest Diagnostic\'s Breach: Expert Commentary (lien direct) In light of the recent Quest Diagnostics breach, which compromised the credit card numbers, medical information and personal data of 11.9 million patients, Industry leaders commented below as part of our experts comments series.   Experts Comments:   Kevin Gosschalk, CEO at Arkose Labs:  “The Quest Diagnostics breach is a timely reminder that when a company is working with a vendor, … The ISBuzz Post: This Post Quest Diagnostic’s Breach: Expert Commentary Guideline
no_ico.webp 2019-06-04 13:30:00 New Study Reveals Cybercrime May Be Widely Underreported-Even When Laws Mandate Disclosure (lien direct) ISACA's State of Cybersecurity Report Also Finds Only 1 in 3 Organizations Highly Confident in Their Ability to Detect and Respond to Threats   Stand out data from this portion of the report includes:  1 in 2 respondents say cybercrime is underreported, even when its required to report it.  60% of information security professionals say … The ISBuzz Post: This Post New Study Reveals Cybercrime May Be Widely Underreported-Even When Laws Mandate Disclosure
no_ico.webp 2019-06-03 23:06:00 Major Hotel Chains\' Security Systems Exposed In Pyramid Hotel Group Data Leak (Marriott, Plaza, other chains may be impacted) (lien direct) In response to news that of a major Security Platform Leaking Hotel Security Logs, Including Marriott Properties, an expert with Cequence Security offers perspective. Ameya Talwalkar, Co-founder and CPO at Cequence Security: Leaving applications that store sensitive information open to the Internet because of policy mismanagement or misconfiguration is a growing problem as cloud adoption … The ISBuzz Post: This Post Major Hotel Chains’ Security Systems Exposed In Pyramid Hotel Group Data Leak (Marriott, Plaza, other chains may be impacted)
no_ico.webp 2019-06-03 21:00:05 Chinese Database Exposes 42.5 Million Records From Dating Apps (lien direct) It has been reported that tens of millions of records about users of different dating apps have been discovered in a single database with no password protection. About 42.5 million records were exposed. Dating logs made up 38.3 million records, while 3.87 million consisted of “geonames.” Records were discovered by researcher Jeremiah Fowler, and were mostly about American users, based … The ISBuzz Post: This Post Chinese Database Exposes 42.5 Million Records From Dating Apps
no_ico.webp 2019-06-03 20:10:01 How Voice Biometrics Can Combat The Rise In Stolen Fingerprints (lien direct) A marketplace for stolen fingerprints has recently emerged, with research highlighting that criminals are selling the digital fingerprints of more than 60,000 individuals. With this being said, it was seen as the inevitable outcome for static biometric modalities, like fingerprints. Identity theft has risen to nearly 500 victims a day in the UK and the … The ISBuzz Post: This Post How Voice Biometrics Can Combat The Rise In Stolen Fingerprints
no_ico.webp 2019-06-03 18:30:03 (Déjà vu) Meet HiddenWasp, The New Malware Strain Targeting Linux Systems (lien direct) Security researchers have found a new strain of Linux malware that appears to have been created by Chinese hackers and has been used as a means to remotely control infected systems. Named HiddenWasp, this malware is composed of a user-mode rootkit, a trojan, and an initial deployment script. Newly discovered HiddenWasp Linux malware shares similarities with … The ISBuzz Post: This Post Meet HiddenWasp, The New Malware Strain Targeting Linux Systems Malware
no_ico.webp 2019-06-03 18:30:02 Dating App Scammers Spotted By AI (lien direct) Scams on dating sites and apps were hard to tackle because they were usually not large campaigns and were not generated automatically. Profiles of fakes and scammers used more images and “emotive language”. The common words employed were “caring”, “passionate” and “loving”. The system was trained using almost 15,000 profiles from the free Dating ‘N … The ISBuzz Post: This Post Dating App Scammers Spotted By AI
Last update at: 2024-07-17 18:08:42
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter