IAmI Authentications

1,240 Added | 1 Magazine | 399 Likes | 7 Following | 52 Followers | @Use_IAmI | IAmI's set a new standard for Two-Factor Authentications (2FA) and IAM. Visit http://www.useiami.com for more info.

Data firm leaks 48 million user profiles it scraped from Facebook, LinkedIn, others

Exclusive: Profile data was scraped without user consent or knowledge to "build a three-dimensional picture" on millions of people.<p><i>Video: Scraped and</i> …

Security

Europe tries to force cloud providers to give up offshore data

Technology companies such as Google, Microsoft and Facebook will be forced to hand over users' data to European law enforcement officials even when …

Privacy

Hackers once stole a casino's high-roller database through a thermometer in the lobby fish tank

LONDON — Hackers are increasingly targeting "internet of things" devices to access corporate systems, using things like CCTV cameras or air-conditioning units, according to the CEO of a cybersecurity firm.<p>The internet of things refers to devices hooked up to the internet, and it has expanded to …

Internet of Things

Uber Breach Exposed Names, Emails of More Than 20 Million Users

A data breach exposed the names, phone numbers and email addresses of more than 20 million users of the Uber Technologies Inc. online ride-hailing …

Personal Information

Hackers Found Using A New Code Injection Technique to Evade Detection

While performing in-depth analysis of various malware samples, security researchers at Cyberbit found a new code injection technique, dubbed Early …

Online

Hacker Can Steal Data from Air-Gapped Computers through Power Lines

Do you think it is possible to extract data from a computer using its power cables?<p>If no, then you should definitely read about this …

James Bond

Forget Facebook – it’s the tech-illiterate politicians we should be worrying about

Watching Mark Zuckerberg testify in front of senators and members of Congress about Cambridge Analytica and wider concerns around Facebook’s …

Social Media

Awkwardness ensues as top Democratic senator asks Mark Zuckerberg if he'll reveal what hotel he stayed at last night

WASHINGTON — Facebook CEO Mark Zuckerberg got into an awkward exchange with a top Democratic senator on Tuesday when the lawmaker began asking him personal questions.<p>During the blockbuster hearing on Capitol Hill, Sen. Dick Durbin asked Zuckerberg, "Would you be comfortable sharing with us the name …

Mark Zuckerberg

Word Attachment Delivers FormBook Malware, No Macros Required

A new wave of document attacks targeting inboxes do not require enabling macros in order for adversaries to trigger an infection chain that …

Cybersecurity

HTTP Injector Steals Mobile Internet Access

Users aren't shy about sharing the technique and payload in a new attack.<p>A new attack in the wild leans not on email nor ransom, but on YouTube, …

Information Security

200,000 Cisco Network Switches Reportedly Hacked

sponsored by<p>What Remediation Steps Should Be Taken? Geetha Nandikotkur (AsiaSecEditor) • April 9, 2018<p>Over 200,000 Cisco network switches worldwide …

Information Security

You can unscramble the hashes of humanity's 5 billion email addresses in ten milliseconds for $0.0069

Marketing companies frequently "anonymize" their dossiers on internet users using hashes of their email addresses -- rather than the email addresses …

Personal Information

Breach report confirms: People suck

Even in the wake of high-profile malware campaigns such as the WannaCry and NotPetya ransomware waves, businesses are still failing to get the …

Cybersecurity

If your computer has slowed, you might be mining crypto coins for someone else — here's how to stop it

Good news: Virtually all traditional types of malware declined in the past few months. Not so good: mainly because hackers are more interested in using your computer to help them mine cryptocurrencies.<p>It's likely you, or your employer, aren't even aware it's happening. Malware miners latch onto …

Android Phones

Google Finds 800,000 Websites Breached Worldwide

In the past year, the search engine giant has detected close to 800,000 sites infected with drive-by download malware and other malicious content …

Cybersecurity

‘Big Brother’ in India Requires Fingerprint Scans for Food, Phones and Finances

NEW DELHI — Seeking to build an identification system of unprecedented scope, India is scanning the fingerprints, eyes and faces of its 1.3 billion residents and connecting the data to everything from welfare benefits to mobile phones.<p>Civil libertarians are horrified, viewing the program, called …

India

Iranian & Russian Networks Attacked Using Cisco's CVE-2018-0171 Vulnerability

Last night, a hacker group going under the name "JHT" attacked foreign network infrastructure, including Russian and Iranian networks, using the …

Information Security

100% of web applications vulnerable to attack, despite billions spent on security efforts

Vulnerabilities and attacks on networked devices have surged in the past decade, while spam emails have dropped, according to a Trustwave …

Cybersecurity

Chrome Is Scanning Files on Your Computer, and People Are Freaking Out

Some cybersecurity experts and regular users were surprised to learn about a Chrome tool that scans Windows computers for malware. But there’s no reason to freak out about it.<p>The browser you likely use to read this article scans practically all files on your Windows computer. And you probably had …

Malware

Are your phone camera and microphone spying on you?

Taping over the lens is just the first step in keeping online snoopers out of your business<p>Here is what the former FBI director James Comey said when he was asked back in September 2016 if he covered his laptop’s webcam with tape.<p>“Heck yeah, heck yeah. Also, I get mocked for a lot of things, and I …

James Comey

How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack

While Wi-Fi networks can be set up by smart IT people, that doesn't mean the users of the network are similarly tech-savvy. We'll demonstrate how an …

White Hat

Cracking Passwords up to 256 Characters with Hashcat

Think your 12 character passwords are still strong enough? One of the top password cracking programs can now crack password up to 256 characters!The …

Information Security

How to change your DNS to see if Cloudflare can speed up your internet

A couple days ago, Cloudflare launched its own DNS service at 1.1.1.1, promising that consumers would enjoy greater privacy and potentially faster internet if they switched over from their ISP’s default. Now, those speed differences might not be significant or noticeable enough to the point of …

Information Security

Opinion: Bitcoin’s Biggest Problem Isn’t Child Porn, It’s GDPR

This week, a barrage of articles came out proclaiming bitcoin’s demise. They had titles like “Bitcoin Could Become Illegal Almost Everywhere, After …

Bitcoin

Hacking Windows 10: How to Steal & Decrypt Passwords Stored in Chrome & Firefox Remotely

Passwords stored in web browsers like Google Chrome and Mozilla Firefox are a gold mine for hackers. An attacker with backdoor access to a …

Information Systems

Security Experts Weigh In On Massive Data Breach Of 150 Million MyFitnessPal Accounts

Another day, another data breach. Actually, all data breaches aren’t created equally. I should say, another massive data breach. Under Armour shared that on March 25 it discovered unauthorized access that exposed or compromised 150 million MyFitnessPal accounts.<p>MyFitnessPal is a popular fitness …

Under Armour

Facebook has been collecting call history and SMS data from Android devices

iOS devices appear to be unaffected<p>Facebook has been collecting call records and SMS data from Android devices for years. Several Twitter users have reported finding months or years of call history data in their downloadable Facebook data file. A number of Facebook users have been spooked by the …

Privacy

Facebook was warned about app permissions in 2011

Who’s to blame for the leaking of 50 million Facebook users’ data? Facebook founder and CEO Mark Zuckerberg broke several days of silence in the face of a raging privacy storm to go on CNN this week to say he was sorry. He also admitted the company had made mistakes; said it had breached the trust …

Privacy

CLOUD Act becomes law, increases government access to online info

The federal spending bill includes provisions that lower barriers to law enforcement requests for your emails, documents and other internet communications.<p>The federal spending bill signed by US President Donald Trump on Friday does more than fund the budget. It also makes it easier for law …

Privacy