Find Command Cheat Sheet » Free from Linux Training Academy » Download Now!
Welcome Guest | Sign In
LinuxInsider.com
Rakuten Super Logistics
Hackers Use Microsoft Help Desk to Pull Off Massive Email Breach
April 16, 2019
Hackers piggybacked onto a Microsoft customer support portal between Jan. 1 and March 28 to gain access to the emails of noncorporate account holders on webmail services Microsoft manages, including MSN.com, Hotmail.com and Outlook.com. Microsoft has confirmed that a "limited" number of customers who use its Web service had their accounts compromised.
End of the Line for Windows 7: Open Road for Hackers
March 7, 2019
Microsoft has been urging customers to upgrade from its Windows 7 operating system, while attempting to ease the transition with several options for extended support. It will stop providing routine fixes and security patches effective January 2020. Regular support for Windows Server 2008 also will end at that time. Windows 7 enterprise customers can subscribe to Extended Security Updates.
E-Ticketing Flaw Exposes Airline Passenger Data to Hackers
February 7, 2019
The e-ticketing systems of eight airlines, including Southwest Airlines and Dutch carrier KLM, have a vulnerability that can expose passengers' personal data, mobile security vendor Wandera has reported. They use unencrypted links that hackers can intercept easily. The hackers then can view and, in some cases, even change the victim's flight booking details, or print their boarding passes.
Crypto Support in Samsung Galaxy S10 Could Fall Flat
January 30, 2019
The Samsung Galaxy S10, scheduled for launch on Feb. 20, likely will incorporate a cryptocurrency wallet. "Samsung has a long history of throwing everything it can think of, technology-wise, into its flagship Galaxy S series smartphones," remarked Ken Hyers, research director at Strategy Analytics. Most users aren't fully aware of their Galaxy S phone capabilities, he noted.
Quora Looks for Answers in Wake of Massive Data Breach
December 5, 2018
The personal data of some 100 million people who have used Quora, a popular question and answer website, has been compromised, the company disclosed. "We recently discovered that some user data was compromised as a result of unauthorized access to one of our systems by a malicious third party," wrote Quora CEO Adam D'Angelo in an online post. "We are working rapidly to investigate the situation."
Cryptohackers Breach StatCounter to Steal Bitcoins
November 8, 2018
Hackers planted malware on StatCounter to steal bitcoin revenue from Gate.io account holders, according to Eset researcher Matthieu Faou, who discovered the breach. The malicious code was added to StatCounter's site-tracking script last weekend, he reported. The malicious code hijacks any bitcoin transactions made through the Web interface of the Gate.io cryptocurrency exchange.
How to Protect Your Online Privacy: A Practical Guide
November 7, 2018
Do you take your online privacy seriously? Most people don't. They have an ideal scenario of just how private their online activities should be, but they rarely do anything to actually achieve it. The problem is that bad actors know and rely on this fact, and that's why there's been a steady rise in identity theft cases from 2013 to 2017, often resulting in loss of reputation or financial woes.
Mobile Phone Security: All You Need to Know
November 6, 2018
We rely on our phones to process and store reams of personal digital data. Our digital activities -- from checking bank balances to paying for a product with a tap of the screen, to sending friends and family messages over social media, to accessing work emails remotely -- have turned our phones into a goldmine of personal information. How secure is your mobile device?
Former White House CIO Theresa Payton: 'There Are Grave Concerns About Election Interference'
October 26, 2018
Theresa Payton, CEO of Fortalice Solutions, is one of the most influential experts on cybersecurity and IT strategy in the United States. She is an authority on Internet security, data breaches and fraud mitigation. She served as the first female chief information officer at the White House, overseeing IT operations for President George W. Bush and his staff.
The Crypto-Criminal Bar Brawl
September 25, 2018
As if e-commerce companies didn't have enough problems with transacting securely and defending against things like fraud, another avalanche of security problems -- like cryptojacking, the act of illegally mining cryptocurrency on your end servers -- has begun. We've also seen a rise in digital credit card skimming attacks against popular e-commerce software such as Magento.
Why You Should Manage Your IoT Devices Like Employees
September 15, 2018
There is a well-known joke among security professionals: Q: "What does IoT stand for?" A: "Internet of Threats." Sadly, this joke is our reality. An estimated 20.4 billion Internet of Things devices will be deployed by 2020, according to Gartner, in what some have dubbed "the fourth industrial revolution." These connected devices are being manufactured to streamline everything we do.
Android Apps Riskier Than Ever: Report
September 12, 2018
Widespread use of unpatched open source code in the most popular Android apps distributed by Google Play has caused significant security vulnerabilities, suggests an American Consumer Institute report. Thirty-two percent -- or 105 apps out of 330 of the most popular apps in 16 categories sampled -- averaged 19 vulnerabilities per app, according to the report. Researchers found critical vulnerabilities in many common applications.
Microsoft Foils Russian Attack on GOP Think Tanks
August 22, 2018
Microsoft has torpedoed websites designed to steal credentials from visitors to two Republican Party think tanks. The malicious websites were among six the company took down last week. A group of hackers affiliated with the Russian military created the sites, according to Microsoft. It apparently was the same group that stole a cache of email from the DNC during the 2016 presidential campaign.
Def Con Voting Machine Hacks Ruffle Feathers
August 14, 2018
Hackers cracked into a wide array of voting equipment Def Con's Voting Village, an event held Friday at Caesar's Palace in Las Vegas, Nevada. Last year, conference goers hacked five machines and an e-poll book of registered voters. This year, in addition to voting machines, tabulators and smart card readers were available for hacking. Websites weren't off limits, either.
Homeland Security Unveils Center to Combat Cyberthreats
August 1, 2018
DHS has announced the National Risk Management Center, part of a new effort to combat cyberthreats to the U.S. The new agency's mission will be to defend the critical infrastructure through greater cooperation between the public and private sectors. The center will bring together government experts and industry partners to work out ways that the government can support the partners.
Russian Hackers Have Invaded Hundreds of US Utilities: Report
July 25, 2018
Hundreds of U.S. utilities were penetrated by Russian hackers who could have disrupted the nation's power grid. The attacks were launched last year by threat actors sponsored by the Russian government, according to a report. The hackers used Black Hat tools such as phishing and waterhole traps to obtain credentials from legitimate users and leverage them to gain access to the utilities.
The Dismal State of Healthcare IoT Security
June 25, 2018
The healthcare industry has been moving toward medical equipment connectivity to speed up data entry and recording, as well as improve data accuracy. At the same time, there has been a shift toward incorporating consumer mobile devices, including wearables. "The demand for connected devices has increased rapidly in recent years," noted Leon Lerman, CEO of Cynerio.
Can Hackers Crack the Ivory Towers?
June 19, 2018
Academics have been hard at work studying information security. Most fields aren't as replete with hackers as information security, though, and their contributions are felt much more strongly in the private sector than in academia. The differing motives and professional cultures of the two groups act as barriers to direct collaboration, noted CypherCon presenter Anita Nikolich.
Breach Litigation: A Growing Risk for E-Commerce Businesses
June 15, 2018
The expanding world of Internet commerce likely will generate a corresponding expansion of data breaches, resulting in more e-commerce businesses becoming the targets of consumer class action lawsuits. Breach litigation has become more prevalent as a result of a perceptible legal trend favoring consumers. Courts have tended to allow lawsuits based on a lower threshold for establishing injury.
The Cloud's Hazy Security
May 31, 2018
A significant percentage of IT systems are cloud-based, according to a recent survey. The cloud is a key enabler for emerging technology, suggests the CompTIA poll, which was conducted last month. Cloud computing was one of four trends respondents expected to feature heavily in IT conversations over the next 12 to 18 months, the survey found. Others were AI, the IoT and cybersecurity.
FBI Declaws Russian Fancy Bear Botnet
May 25, 2018
The FBI has disrupted a network of half a million routers compromised by the group of Russian hackers believed to have penetrated the DNC and the Hillary Clinton campaign during the 2016 elections, according to reports. The hacker group, known as "Fancy Bear," has been using a malware program called "VPN Filter" to compromise home and small office routers.
Researchers Create Hack to Unlock Millions of Hotel Room Doors
April 26, 2018
A flaw in certain electronic hotel door locks could allow hackers to access guest rooms and other secure locations at millions of properties around the world, F-Secure researchers have discovered. Software updates were issued to fix the flaw in the smart locks after F-Secure notified and worked with the manufacturer over the past year. The researchers had found a way to make a master key.
'Holy Grail' Exploit Puts Nintendo Switch Consoles at Risk
April 25, 2018
Devices built on Nvidia's Tegra X-1 mobile processor are at risk of attack from a flaw security researchers have revealed. The exploit chain discovered by Katherine Temkin and others affects any device running the chip, including the Nintendo Switch gaming console. Called "Fusée Gelée," the vulnerability allows anyone to run code on the chip by overloading a critical buffer when a system boots.
No Cure for Cyber Insecurity?
April 6, 2018
An alarming number of major U.S. retailers, industrial firms, government agencies and other organizations have been hit in a recent wave of cyberbreaches that may signal increasing vulnerability for consumers and businesses alike. The attacks have exposed millions of consumer payment cards to fraud. Cyberthieves have used a variety of methods to infiltrate corporate computer systems.
Researcher Cracks 'Hacker-Proof' Crypto Wallet
March 22, 2018
A virtual currency hardware wallet with millions of users has been compromised. Saleem Rashid explained how he cracked the firmware on the wallet produced by Ledger using what's known as a "supply chain" attack. That means a targeted device is compromised before any users get their hands on it. The attack on Ledger's $100 Nano S wallet creates a backdoor on the device.
Leak of Stale iOS Source Code Could Trigger Fresh Problems
February 9, 2018
Apple lawyers have sent a copyright violation notice to Github, following the publication of leaked iOS 9 source code on the site. Though iOS 9 is dated, it's possible that the leaked code could be used to jailbreak older devices or worse. Publication of the code violated Apple's rights under the DMCA, the attorneys wrote, demanding that the iBoot source code be removed.
US Fingers North Korea for WannaCry Epidemic
December 20, 2017
The United States on Tuesday accused North Korea of responsibility for a global ransomware attack that locked down more than 300,000 computers in 150 countries earlier this year. The U.S. now has enough evidence to support its assertion that Pyongyang was behind the WannaCry attack in May, Homeland Security Advisor Tom Bossert told reporters at a White House press briefing.
The Return of Industrial Espionage and the Building New Wave of Scandals
December 4, 2017
As powerful men drop like flies due to their inability to resist abusing their authority, it's clear that the problem is widespread. Similarly, it's likely that we'll find the problem of alleged industrial espionage is not limited to Uber. You see, when people misuse authority -- and the sexual harassment problem is a massive misuse of authority -- folks typically don't just misuse it in one area.
WPA2 Flaw Could Blow WiFi Systems Wide Open
October 17, 2017
A security flaw in WPA2, the security protocol for most modern WiFi systems, could allow an attacker to steal sensitive data including emails, credit card numbers and passwords, Researchers at Belgian university KU Leuven reported Monday. Depending on the network configuration, the flaw also could allow an attacker to inject or manipulate information in the system.
Small Companies Often in the Dark About Cyberattacks
October 10, 2017
Nearly 60 percent of small businesses have been the victims of a cyberattack over the past year, but the vast majority didn't realize that they had been attacked, according to Nationwide's third annual survey of 1,069 businesses with fewer than 299 employees. Initially, only 13 percent of the participating companies said they had been victims of a cyberattack.
See More Articles in Hacking Section >>
Rakuten Super Logistics
Is "too much screen time" really a problem?
Yes -- smartphone addiction is ruining relationships.
Yes -- but primarily due to parents' failure to regulate kids' use.
Possibly -- long-term effects on health are not yet known.
Not really -- lack of self-discipline and good judgement are the problems.
No -- angst over "screen time" is just the latest overreaction to technology.
No -- what matters is the quality of content, not the time spent viewing it.