Find Command Cheat Sheet » Free from Linux Training Academy » Download Now!
Welcome Guest | Sign In
LinuxInsider.com
Isn't It Time to Buy Cyber Insurance?
July 15, 2019
Every day we read stories about data breaches and cyberattacks on business and government websites, and the resulting the loss of personally identifiable information. Cybercrime is on the rise, and given the ever-evolving methods of attack, meaningful relief and reliable measures to fend off cybercriminals are unlikely in the foreseeable future. Companies need to insure against cybertheft.
Zoom Flaw Turns Mac Cam into Spy Cam
July 10, 2019
A security researcher has found a flaw in the popular video conferencing app Zoom that could be used to turn on the camera on a Macintosh computer without a user's permission. The vulnerability allows any website to forcibly join a user to a Zoom call, with their video camera activated, without a user's permission, explained Jonathan Leitschuh, a senior software engineer at Gradle.
The Router's Obstacle-Strewn Route to Home IoT Security
July 10, 2019
It is newly minted conventional wisdom that not a single information security conference goes by without a presentation about the abysmal state of IoT security. While this is a boon for researchers looking to make a name for themselves, this sorry state of affairs is definitely not beneficial for anyone who owns a connected device. IoT device owners aren't the only ones fed up, though.
The Threat of a Deepfake Fiasco
July 5, 2019
An AI technology called "deepfake" may be the next big threat we face as a society. Consider a recent video clip of Facebook CEO Marc Zuckerberg saying some outlandish things. You might think it is real -- but it's a deepfake. It's his image, and it sure sounds like him, but he never actually made that speech. "Can't be," you might think. "That has to be Zuckerberg talking." Wrong.
Chinese Hackers Linked to Global Attacks on Telcos
June 26, 2019
Chinese hackers likely are responsible for a series of cyberattacks against telecommunications companies around the world, security researchers have reported. The campaign, dubbed "Operation Soft Cell," has been active since 2012, according to Cybereason. There is some evidence suggesting even earlier activity against the telecommunications providers, all of whom were outside North America.
Firefox Users Warned to Patch Critical Flaw
June 20, 2019
Firefox users should update their browsers immediately to fix a critical zero-day vulnerability. Anyone using Firefox on a Windows, macOS or Linux desktop is at risk. Mozilla issued a patch Tuesday, but the vulnerability was discovered by Samuel Groß of Google Project Zero on April 15. Mozilla's fix came after Coinbase reported exploitation of the vulnerability for targeted spearphishing attacks.
Instagram Targets Account Hijacking
June 18, 2019
Account hijacking has become a nettlesome problem at Instagram so it has decided to do something about it. The social media company has begun testing a simpler method for users to reclaim their compromised accounts. It allows users locked out of their hacked accounts to ask for a six-digit code to be sent to the email address or phone number originally used to open the account.
Cybercriminals Score Billions in Cryptocurrency Thefts
May 21, 2019
Is anyone surprised to learn that in just the first quarter of 2019 more than $1.2 billion worth of cryptocurrency was stolen? Probably not. This story follows the old line from bank robber Willie Sutton who is credited with saying that he robbed banks "because that's where the money is." So not much has changed. Cryptocurrencies are not exactly money, though, even if they do have a market value.
Software Bug Gives Spyware Free Rein With a Single WhatsApp Call
May 15, 2019
Many users of Facebook's WhatsApp messaging software are scrambling to patch the program in response to news of a flaw that allowed spyware to be installed on mobile phones running Android and iOS. "This new type of attack is deeply worrying and shows how even the most trusted mobile apps and platforms can be vulnerable," said Mike Campin, vice president of engineering at Wandera.
Spring Cleaning Your Network Security
May 7, 2019
Spring may be my favorite time of year. The snow is melting, the sun is shining, and the air smells just a little bit fresher. It's as though the world is setting an example for the rest of us, letting us know that it's time to start fresh. It's time for spring cleaning -- and in the security world, spring cleaning means more than just wiping down countertops and lighting a few scented candles.
The Critical Role of Artificial Intelligence in Payments Tech
May 2, 2019
Long an obsession of science fiction writers, "artificial intelligence" in the modern era of fast-paced technological innovation is a term that is as ubiquitous as it is nebulous. For the payments technology industry, however, the term describes advanced analytical technology that has an outsized potential to improve the payments ecosystem for banks, payments processors, merchants and consumers.
AI Raises the Bar for Home Network Security
May 2, 2019
Consumers are becoming increasingly concerned about the hacking of their devices and data as they hear about more data breaches and have their own experiences with issues such as ransomware, identity theft and botnet attacks. Concerns about data security also have been shown to increase with ownership of more connected devices. Currently, U.S. broadband households own an average of 10.4 connected devices.
Cybersecurity Pros Join 'Right to Repair' Battle
May 2, 2019
An advocacy organization formed by cybersecurity professionals has joined the fight for "right to repair" legislation, which would allow consumers and third parties to repair electronic equipment without voiding manufacturers' warranties. Legislators in about 20 states have been working on some form of this legislation, but they have been stymied by a number of tech companies and industry groups.
Mobile Chrome Hoax Could Target Android Users
April 30, 2019
A new method for hiding the true location of a website from users of the mobile Chrome Web browser has come to light. Phishers can trick users into revealing their credentials for a legitimate website to operators of a malicious one, security researcher James Fisher reported. Scammers can exploit mobile Chrome's feature that hides the address bar when users are scrolling on a Web page.
Is Nvidia Tesla's Kryptonite?
April 29, 2019
Tesla sure didn't have a good week last week, given the kind of press coverage it got. I'm not that worried about Tesla going away, though, as its products are far too popular for it to disappear. On the other hand, management clearly needs to be fixed. What got me started looking at Tesla last week was that it pretty much announced that Nvidia was its Kryptonite.
Hackers Use Microsoft Help Desk to Pull Off Massive Email Breach
April 16, 2019
Hackers piggybacked onto a Microsoft customer support portal between Jan. 1 and March 28 to gain access to the emails of noncorporate account holders on webmail services Microsoft manages, including MSN.com, Hotmail.com and Outlook.com. Microsoft has confirmed that a "limited" number of customers who use its Web service had their accounts compromised.
Zuckerberg Tries, Tries Again
April 6, 2019
Mark Zuckerberg's most recent effort to change the conversation about Facebook seems like just another attempt at self-justification. In a recent op-ed, he places the onus squarely on the shoulders of government to regulate how social media works. "I believe we need new regulation in four areas: harmful content, election integrity, privacy and data portability," Zuckerberg wrote.
What Lies Beneath Facebook's Sudden Embrace of Government Regulation
April 5, 2019
Facebook CEO Mark Zuckerberg called for greater government oversight and even regulation of the Internet in an op-ed piece published last weekend. Zuckerberg, who famously built the social network by playing by his own rules, said it was time for government and regulators around the world to step up and help rein in the Internet. The main point was to regulate what he called "harmful content."
Phishers Bait Hooks for Netflix, Amex Users
March 22, 2019
Cybersecurity experts at Microsoft's Windows Defender Security Intelligence Team this week reported their discovery of two new email-based phishing campaigns. One targets Amex users while the other targets Netflix customers. Both campaigns reportedly are very well-crafted, featuring legitimate logos and even fill-in forms that closely mimic those on the respective company's own websites.
Can Facebook Solve Its Worsening Privacy Problem?
March 14, 2019
The good news is that of the many troubles Facebook has, privacy seems to be front and center for both CEO Mark Zuckerberg and COO Sheryl Sandberg. The question is, will the actions they take to address the company's privacy issues be enough? If not, this is the kind of problem that can and will cause long-term damage to the Facebook brand. Its leaders need to come up with an immediate fix.
Mozilla Offers Free Secure File-Sharing Service
March 13, 2019
Mozilla has announced Firefox Send, a free encrypted file-sharing service that works in any browser. To share a file, you simply visit the Send site and drag your file to a box on the Web page. Unregistered users may upload up to 1 gigabyte in files, while registered users have a 2.5 GB allowance. After uploading your files, you choose an expiration time for the link used to share them.
End of the Line for Windows 7: Open Road for Hackers
March 7, 2019
Microsoft has been urging customers to upgrade from its Windows 7 operating system, while attempting to ease the transition with several options for extended support. It will stop providing routine fixes and security patches effective January 2020. Regular support for Windows Server 2008 also will end at that time. Windows 7 enterprise customers can subscribe to Extended Security Updates.
August Adds Wireless HD Video Doorbell to Smart Home Line
March 6, 2019
The August View is a wireless doorbell that can stream sharp 1440p HD video. It supports two-way audio, so you can talk to guests via an Internet connection. The View can be paired with August and Connected by August smart locks. That means you not only can speak to visitors remotely, but also can let them into your house. That functionality can be handy for accepting package deliveries.
Facebook's 2FA 'Security' Practices Violate User Privacy
March 5, 2019
Facebook has undermined privacy on its network by exposing mobile phone numbers provided to secure user accounts through two-factor authentication. That's because anyone can use the numbers to look up a user's account. One doesn't even have to be a Facebook member to do so. Moreover, there's no way to opt out of the setting, although it can be limited to "friends" only.
Android Addition Opens FIDO Password Killer to Billions
February 26, 2019
The FIDO Alliance hammered another nail into the passwords coffin with the announcement that devices running Android 7.0 or higher will be compatible with FIDO2, the latest version of its authentication solution. Certification of Android 7.0+ means devices running those versions of Google's mobile operating system will support FIDO2 out of the box or through a software update.
Wireless Carriers Caught Playing Fast and Loose With Location Data
February 8, 2019
AT&T, T-Mobile and Sprint have sold access to subscribers' real-time location data to aggregators, which in turn have sold it to about 250 bounty hunters and related businesses, according to a report. In some cases, the data allowed users to track individuals to their specific locations inside a building. Some companies made thousands of location requests to data brokers.
E-Ticketing Flaw Exposes Airline Passenger Data to Hackers
February 7, 2019
The e-ticketing systems of eight airlines, including Southwest Airlines and Dutch carrier KLM, have a vulnerability that can expose passengers' personal data, mobile security vendor Wandera has reported. They use unencrypted links that hackers can intercept easily. The hackers then can view and, in some cases, even change the victim's flight booking details, or print their boarding passes.
What's Wrong With the Social Media Model
January 31, 2019
The social media model has come under increased scrutiny following revelations of data misuse and news of executives reneging on some security commitments. People expecting to change the situation will need to address how social media works. This means changing not just the business model, which describes how a social media business makes money, but the fundamental technology model too.
Apple Squashes FaceTime Eavesdropping Bug
January 30, 2019
Apple has suspended its Group FaceTime application following reports that a bug in the software allowed callers to eavesdrop on the people they were calling. The flaw let a person making a FaceTime call listen through the phone of the person called before the call was accepted or rejected. It reportedly also allowed access to the front-facing camera in an iPhone.
Apple Pay's US Expansion Will Fuel Mobile Payment Turf Wars
January 23, 2019
Apple on Tuesday announced more large retailers will accept Apple Pay: Target, Taco Bell, Hy-Vee supermarkets in the Midwest, Speedway convenience stores, and the Jack in the Box fast food chain. With those additions, 74 of the top 100 merchants in the United States, and 65 percent of all retail locations across the country, now support Apple Pay, the company said.
See More Articles in Consumer Security Section >>
Which type of online advertising is most likely to attract your favorable attention?
Straightforward display ads
Ads based on my interests
Informational articles on products/services
Video ads
Ads designed to grab my attention, e.g. pop-ups, autoplay
None -- I avoid all online ads