Don Berlin

953 Added | 1 Magazine | 3 Following | 227 Followers | @DonBerlin | Keep up with Don Berlin on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Don Berlin”

How Email Open Tracking Quietly Took Over the Web

"I just came across this email," began the message, a long overdue reply. But I knew the sender was lying. He’d opened my email nearly six months …


Iranian Hackers Have Been Infiltrating Critical Infrastructure Companies

The international intelligence agency always has a keen interest in Iran's hacking activity. And new research published by the security firm FireEye …


New Ransomware Tactics Are ‘Unstoppable’

Government Technology

Hackers are now using the exploit behind WannaCry to snoop on hotel Wi-Fi

Researchers say the APT28 hacking group has scraped the EternalBlue exploit from Shadow Brokers' public dump and is using it to steal data from hotel …

Information Security

US military data reportedly left on unsecured Amazon server

Defense contractor Booz Allen Hamilton is linked to an account that contained login credentials for other data repositories.<p>Highly sensitive military data about a US intelligence agency project has been discovered on a publicly accessible server without password protection, according to a new …


Post-FCC Privacy Rules, Should You VPN?

Many readers are understandably concerned about recent moves by the U.S. Congress that would roll back privacy rules barring broadband Internet …

Identity Theft

Building an AI Chip Saved Google From Building a Dozen New Data Centers

Google operates what is surely the largest computer network on Earth, a system that comprises custom-built, warehouse-sized data centers spanning 15 …

Computer Science
Identity Theft

Microsoft's URL detonation: Now Office 365 can zap key spear-phishing tactic

Microsoft has rolled out a new security feature for Office 365, designed to neutralize common tactics used by advanced hackers.<p>Microsoft has rolled …

CryptoSearch Finds Files Encrypted by Ransomware, Moves Them to New Location

Security researcher Michael Gillespie has developed a new Windows app to help victims of ransomware infections.<p>Named CryptoSearch, this tool …

This low-cost device may be the world’s best hope against account takeovers | Ars Technica

Privacy-preserving “cryptographic assertions” are impossible to guess or phish.<p>The past five years have witnessed a seemingly unending series of …

Identity Theft
Information Security
Voter Registration

Nuclear Power Plant Disrupted by Cyber Attack

The head of an international nuclear energy consortium said this week that a cyber attack caused a “disruption” at a nuclear power plant at some …

Information Security

Malware hidden in digitally signed executables can bypass AV protection

Researchers have shown that it’s possible to hide malicious code in digitally signed executables without invalidating the certificate, and execute …

Identity Theft

Software flaw puts mobile phones and networks at risk of complete takeover | Ars Technica

Code-execution vuln resides in code used in cell towers, radios, and basebands.<p>A newly disclosed vulnerability could allow attackers to seize control …

Question: What Can I Learn from Password Spraying a 2FA Microsoft Web App Portal? - Black Hills Information Security

<b>Answer: Enough to make it worth it!</b><p>Penetration testers love to perform password spraying attacks against publicly available email portals as …

New ransomware strain coded entirely in Javascript

<b>Security researchers have discovered a new strain of ransomware coded entirely in Javascript, which could increase its chances of being activated.</b><p>Unlike executable program files, Javascript documents do not always trigger a security warning on Windows or require administrator access to run.<p>Named …

Citrix's GoToMyPC user passwords compromised after hack attack

The remote PC service is requiring all users to change their passwords following a recent hack.<p>Those of you who use Citrix's GoToMyPC are going to have to reset your passwords.<p>The service, which lets users remotely access PCs over the internet, was hit by a "very sophisticated password attack," …

Personal Information
Information Security

GCHQ infosec group disclosed kernel privilege exploit to Apple

Communications and Electronics Security Group (CESG), the information security arm of GCHQ, was credited with the discovery of two vulnerabilities …