Chris Linzy

56 Flips | 1 Magazine | 13 Likes | 2 Followers | @ChrisLinzy | Keep up with Chris Linzy on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Chris Linzy”

Point-of-Sale Malware Declined 93% Since 2014

SonicWall study highlights alarming growth in ransomware incidents.

Information Security

A nasty vulnerability in Steam profiles potentially lets hackers spread malware (Update: It's fixed)

Cross-site scripting (XSS) is common vulnerability found in web applications. The way it works is pretty easy to grasp. A website will take a text input – this could be anything from a post on a guestbook, to a Facebook update. The user will then pass the website a payload written in HTML and …

Information Security

Ron Deibert’s Lab Is the 'Robin Hood' of Cybersecurity

How one man built a unique lab whose mission is to document how the free internet is slipping into surveillance and censorship.<p>Last year, a well-known human rights activist from Dubai received a suspicious text on his iPhone. The message promised to reveal secrets about how the government tortured …

Vulnerabilities Hit High Water Mark in 2016

The good news is that coordinated disclosure keeps getting better.

Information Security

How Companies Use Your Data Even When You’re Not Logged In

It’s not news that companies mine and sell your data, but the ins and outs of how it works aren’t always clear. The Federal Trade Commission recently …

Zero-Day Security Flaw makes Windows PC vulnerable to Denial of Service Attacks

The CERT Team has revealed that an existing vulnerability in Microsoft’s Windows Operating Systems including Windows 10 that may allow a remote, …

Information Security

Chasing cyber-leads: An ethical hacker explains how to track down the bad guys

Sometimes the hacker is a country, and pointing fingers between world superpowers is always a dangerous game<p>When a cyberattack occurs, ethical hackers are called in to be digital detectives. In a certain sense, they are like regular police detectives on television. They have to search computer …

Metasploit security kit now hacks IoT devices, hardware

The popular hacking tool kit can now be linked to everything from fridges to cars in the search for vulnerabilities.<p>The popular Metasploit hacking …

Egyptian Human Rights Activists Are Being Targeted in 'Dangerous' Hacking Campaign

Since last November, hackers have been relentlessly trying to break into the online accounts of dozens of Egyptian human rights and civil liberties activists.<p>On Dec. 7, 2016, a well-known Egyptian women's rights activist was arrested at her home by police forces. A few hours later, while she was …

Why criminals are using this old technique to take cyberattacks back to the future

Why employ advanced techniques to target victims when spam emails are once again so successful?<p>In all walks of life, there are those who believe that …

Flaws in popular printers can let hackers easily steal printed documents

Thousands of internet-connected printers could allow an attacker to steal sensitive data, as well as passwords that could allow further compromise of …

Cisco Warns of Critical Flaw in Teleconferencing Gear

Cisco Systems is warning customers of a critical vulnerability affecting three of its TelePresence MCU platform models.

Information Security

US no longer has geography as defense, ally in cybercombat

WASHINGTON (AP) — The United States has long relied on its borders and superior military might to protect against and deter foreign aggressors. But a …

Cybersecurity

Police Are Warning Against This New Phone Scam

Whatever you do, don't say "yes."<p>Earlier this month security experts warned of a highly effective phishing email that fooled many Gmail customers …

Data Privacy Day: What is it and why we need to be more aware

Data protection needs priority in our lives right now.<p>In the digital age, it becomes imperative for us to protect our privacy, especially our …

Twitter reveals FBI national security requests that may have infringed on legal guidelines

Twitter's disclosures mark the first time the firm was permitted to publicly reveal the NSLs.<p>Twitter has for the first time disclosed that it …

You can install ransomware on a Samsung Galaxy by sending it an SMS

Researchers from Context Security have identified a vulnerability in Samsung Galaxy phones: by embedding commands in the obsolete, 17-year-old WAP …

RansomWhere Monitors Your Mac for Sneaky Ransomware Attacks

Mac: Ransomwhere is a free tool that monitors your Mac for ransomware attacks and attempts to stop them before they encrypt all your data. It does …

Thousands of credit card details exposed as US marketing firm leaks 400,000 audio calls

MacKeeper researchers said they downloaded a 28GB-sized copy of the leaked database.<p>Roughly 400,000 recorded customer phonecalls stored by at least …

Hackers launch major attack against PayPal users

Hackers have launched a major attack against PayPal users that’s meant to trick the company’s customers into providing information that could end up …

Bookish hacker finds holes in Amazon, Apple, Google epub services

50 shades of spankworthy securityBug hunter Craig Arendt has reported vulnerabilities in major eBook readers including those from Apple, Google, and …

Google Play

New FTC Chair Has Warned Against Stricter Privacy Rules

President Donald Trump has named Republican Maureen Ohlhausen, a Republican who has opposed net neutrality and neutrality and warned against …

Personal Privacy Assistant uses AI to learn users’ app preferences

If you’ve been really paying attention to the world of mobile devices over the past decade, you may possibly have noticed that users have a habit of …

Machine behaviors that threaten enterprise security

Machine learning has moved enterprise security forward, allowing for visibility inside the network in order to better understand user behavior. …

Security

Mozilla Firefox 51 warns you when visiting insecure data-grabbing websites

The latest update encourages developers to use HTTPS by letting users know when data is collected, but not protected.<p>The Mozilla Foundation has …

Sophos Rolls Out Phishing Security Test And Training Program

Security company Sophos now offers a testing and training platform to address the threat of phishing scams.<p>The news, announced Wednesday, details how …

Advertising Industry

New ransomware app found on Google Play Store steals user's contacts and SMS messages

The infected app demanded 0.2 Bitcoins, worth about $180, researchers noted.<p>Security researchers have detected a new zero-day mobile ransomware …

Researchers warn of vast problems with Android VPN apps

There’s a misnomer about VPN networks and what they really do. Claims that they can make you “completely anonymous” online are almost always inaccurate, even if they may increase your privacy to some degree. Unfortunately, the Commonwealth Scientific and Industrial Research Organisation (CSIRO), in …

Apps

Could You Go to Prison for Not Reporting a Cybersecurity Breach? | Inc.com

The SEC has apparently launched an inquiry into whether Yahoo and its employees violated federal laws requiring public companies to report cyber-incidents as soon as they are likely to impact shareholders. Yahoo suffered at least two major breaches in recent years - one in 2013 and one in 2014 - …

Employment

Android malware source code used to hijack banking details leaks online

'BankBot' is able to stealthily hide on a victims' phone and hijack personal details.<p>Security experts are warning that Android users should brace for …