Heimdal Security - Must-read cyber security news

By Heimdal Security | The most important cyber security news of the week, hand-picked and summed up so you can stay on top of things at all times.

The reasons why you should hide your IP address 5 - Page 5

Stop marketers<p>If you've ever wondered why adverts on Facebook suddenly appear related to your online searches, there is a reason. Advertisers follow …

Security

US Senate Just Voted to Let ISPs Sell Your Web Browsing Data Without Permission

The ISPs can now sell certain sensitive data like your browsing history without permission, thanks to the US Senate.<p>The US Senate on Wednesday voted, …

Instagram ups security with two-factor authentication

Just about every app and online service offer two-factor authentication (2FA) as a security measure these days, and Instagram is the latest to join …

Uncovering the cost and profitability of DDoS attacks

DDoS attacks are a popular cyber criminal technique, used either to cause a distraction for a different crime or demand a ransom for calling off or …

Cybersecurity

Navigating Smart Cities: A Q&A with RSA’s Peter Tran

In today’s connected world, smart cities are transforming the way people travel, communicate and engage with society. While the advancements in IoT …

Cities

How the dark web fuels fraud

The statistics continue to chill.<p>2.3M estimated fraud victims in the UK alone in 2015 according to the ONS. 173,000 confirmed reports of identity …

Data Breach

Apple iCloud ransom demands: The facts you need to know

Welcome to the wonderful world of security nuance.<p>Hackers are demanding Apple pay a ransom in bitcoin or they'll blow the lid off millions of iCloud …

Data Breach

Two major US technology firms 'tricked out of $100m'

<b>A Lithuanian man has been charged with tricking two US technology firms into wiring him $100m (£80.3m) through an email phishing scam.</b><p>Posing as an Asian-based manufacturer, Evaldas Rimasauskas tricked staff into transferring money into bank accounts under his control, US officials said.<p>The …

Fraud

Apple: iCloud is safe, but your passwords may not be

A group of hackers that goes by the name Turkish Crime Family, claims to have access to hundreds of millions of iCloud accounts, and it wants Apple …

Data Breach

Half of Android Devices Unpatched Last Year

Google said more than half of Android devices haven’t received a security update in the past year, and the percentage of potentially harmful apps …

Google News

New generation of cyber highwaymen could threaten parcel drones

Robbing the mail has a long and dishonorable history dating back to the days of the stagecoach. But UK-based online parcel broker ParcelHero is …

Drones

Here are the top 6 ways websites get hacked, according to Google

Google recently noted that it had seen a 32% rise in hacked website. Here are the most common tactics it found.<p>In 2016, the number of hacked websites …

LastPass extensions can be made to cough up passwords, deliver malware

LastPass Chrome and Firefox extensions contain flaws that could allow malicious websites to steal victims’ passwords or execute commands on their …

Network Security

Dark Web Vendor Selling Millions of "Decrypted" Gmail and Yahoo Accounts

Last week HackRead exclusively reported on a <b>Darb Web</b> vendor “SunTzu583” <b>selling millions of decrypted Gmail, Yahoo</b> and <b>PlayStation Network accounts</b>. …

6 of the most effective social engineering techniques

Social engineering is the strongest method of attack against the enterprise’s weakest vulnerability, its people. Criminal hackers recognize this …

Information Security

Star Trek-Themed Ransomware Demands New Crypto-Currency

3/20/2017<br>09:30 AM<p>50%<p>50%<p>Kirk ransomware comes in guise of stress-testing tool and demands 50 Monero ($1,100) to unlock.<p>A new kind of ransomware is …

Ransomware

Comparing the privacy policy of internet giants side-by-side

Comparing the privacy policy of internet giants side-by-side<p>Published by Paul Bischoff on March 20, 2017 in VPN & Privacy<p>Any company or organization …

Ip Address

Beware of the new and twisted Gmail phishing campaign

Spam emails [1] have long become an ordinary aspect of our daily email usage experience. Those of us who have been online for quite some time have no …

Consumers know apps are insecure, but they do little to protect themselves

Once again, an urban myth turns out to be true. People know mobile apps can be targeted by hackers, they fear the scenario, yet they’re doing very …

Cybersecurity

Why top ISPs don't think your web history or app usage is 'sensitive information'

AT&T, Verizon Wireless, T-Mobile USA, and Sprint want the federal government to eliminate broadband privacy rules. Here's what you need to …

Net Neutrality

Inside the Russian hack of Yahoo: How they did it

One mistaken click. That's all it took for hackers aligned with the Russian state security service to gain access to Yahoo's network and potentially …

Security

Wishbone hack leaks 2 million user records on the dark web, mostly...

An unprotected MongoDB database left a vulnerability in Wishbone, a popular quiz application for youngsters that led to a massive hack on March 14, …

Data Breach

3 overlooked endpoints for cyber attacks and how to protect them

You probably think you have endpoint security covered. After all, organizations have been securing end-user desktop and laptop computers for decades …

Sound Waves Used to Hack Common Data Sensors

Though the immediate threat to your smartphone or Fitbit is slight, University of Michigan researchers show command-and-control capability with …

What is public key cryptography, how does it work and what are its uses?

Public key cryptography: What is it, how it work and how to use it in email and file encryption<p>Published by Jon Watson on March 16, 2017 in VPN & …

Encryption

10 Biggest Cyber Crimes and Data Breaches...so far

The good folk at The Best VPN have put together an Infographic summarising ten of the worst "known" cyber attacks and data breaches to date, its a …

Bad bots attack 96% of websites with login pages

Almost every website with a login page is under attack from bad bots, the automated programs used to carry out a variety of nefarious activities, …

Web Design

Ask.com serves as a conduit for malware - again

Businesses that allow the Ask.com toolbar in their environments might want to rethink that after endpoints equipped with the browser add-on were …

Security

Pakistan risks privacy concerns by asking Facebook and Twitter to identify users suspected of blasphemy

Pakistan is seeking helps from Facebook and Twitter to help execute its incredibly strict blasphemy laws. Anyone found guilty of insulting the …

Pakistan