Heimdal Security - Must-read cyber security news

By Heimdal Security | The most important cyber security news of the week, hand-picked and summed up so you can stay on top of things at all times.

Canada Just Ruled to Uphold Net Neutrality - Motherboard

On Thursday afternoon, the Canadian Radio-television and Telecommunications Commission (CRTC), the country's federal telecom regulator, dropped a bombshell ruling on the status of net neutrality—the principle that all web services should be treated equally by providers. And, blessedly, it's good …

Net Neutrality

Is Google is tracking you? Find out here

With location reporting, Google can track your whereabouts, which you may find useful, interesting or invasive. Learn how to check if Google is tracking you and how to stop it if it is.<p>I had location history enabled for Google Maps and didn't know it. I found it interesting to see which spots …

Google Maps

Nuh-uh, Google, you WILL hand over emails stored on foreign servers, says US judge

Google has been ordered by a US court to cough up people's private Gmail messages stored overseas – because if that information can be viewed …

Google

Android Spyware App Went Undetected for Years, Had Millions of Installs

<b>One thing that Android users should know about their devices is that system updates come automatically and do not require downloading and installing</b> …

Anatomy of Cybercriminal Communications: Why do crooks prefer Skype

Security firm Flashpoint published an interesting paper titled, ‘Cybercrime Economy: An Analysis of Cybercriminal Communication Strategies‘ about …

Bose faces privacy lawsuit over headphones that share listening habits with third parties

When it comes to privacy concerns, the mind naturally drifts to the likes of Facebook, Microsoft and Google. But in reality, there is the potential …

Security Pros: People Are the Biggest Problem

People are the biggest challenge in cybersecurity, according to over 80% of IT security professionals.<p>The Institute of Information Security …

Robot crime raises thorny legal issues that need addressing now

A legal expert warns that current laws are woefully inadequate to handle crimes committed by robots.<p>What happens when criminals figure out how to use …

The Stuxnet vulnerability is still one of the most exploited flaws in the wild by hackers

A new report published by Kaspersky confirms that Stuxnet exploits targeting a Windows Shell Vulnerability is still widely adopted by threat …

This Is How the NSA Infiltrated a Huge Banking Network in the Middle East - Motherboard

Last week, the mysterious hacking group The Shadow Brokers dumped a large cache of files allegedly stolen from the NSA. Among the data there were exploits for Windows, as well as alleged documents that showed the NSA had hacked into the networks of a large Dubai-based banking system called EastNets.<p>…

Cybercrime

Researchers find commercial banking apps contain swarms of open-source bugs

While many developers rely on open-source components, they may not be keeping ahead of the game when bugs are discovered.<p>Open-source projects have …

Cybersecurity

Revealed: Scammers plaster Google Maps with pins to lure punters from honest traders

Research shows how web mapping service can be abusedComputer scientists at the University of California, San Diego, and Google, are clamping down on …

Vigilante botnet infects IoT devices before blackhats can hijack them

Hajime battles with Mirai for control over the Internet of poorly secured things.<p>Mirai, the botnet that threatened the Internet as we knew it last …

Information Security

Been to one of these 1170 IHG hotels? Your credit card details may...

When a company starts a statement to customers with words describing how it “understands the important of protecting payment card data” you know that …

Data Breach

I'm a Victim of Tax Season Cybercrime - Motherboard

It started out as a mild inconvenience—when I tried to file my taxes via Turbotax, I got an error instead.<p>Turbotax told me that the IRS already had a return with my social security number on it, and would not accept an e-filing. That didn't seem right. So I tried again. And again. And again. …

Identity Theft

Homeland Security warns of 'BrickerBot' malware that destroys unsecured internet-connected devices

Reminiscent of the Mirai botnet that brought down large swathes of the US internet last year, this new malware targets poorly secured Internet of …

Internet of Things

Half of millennials stream pirate content -- and see nothing wrong with it

Most people alive today have seen the evolution of the internet over the course of a couple of decades, and can remember life before it was so …

Hackers can steal PINs and Passwords capturing data from smartphone sensors

Unfortunately, mobile phones don’t restrict websites and apps from accessing sensors’ data.<p><i>“Most smartphones, tablets and other wearables are now</i> …

Ransomware: Why one version of this file-encrypting nightmare now dominates

​Move over Locky; there's a new king of ransomware...<p>Ransomware boomed last year, with the malicious file-encrypting software rising to become …

Ransomware

Why Scammers Want Your Tax Returns (and how to stop them)

It’s almost here – April 18, tax day in the U.S. As businesses and employees prepare their tax returns, cybercriminals are once again ramping up …

Cybersecurity

Here's How Hacker Activated All Dallas Emergency Sirens On Friday Night

Last weekend when outdoor emergency sirens in Dallas cried loudly for over 90 minutes, many researchers concluded that some hackers hijacked the …

Google Blocks Burger King Advert That Tried To Hijack Google Home

Whopper mistake: Smart home audio hack gets a smack from Google

Black Market

Is a VPN illegal or legal? Is a VPN safe to use? What you need to know

Is using a VPN legal or illegal? Is a VPN safe to use? Here’s what you need to know<p>Published by Sam Cook on April 13, 2017 in VPN & Privacy<p>Virtual …

VPNs

Simply App-alling! Users Pay a High Price to Use Free eHealth Apps!

They count the number of elapsed kilometers, ingested calories and fertile days. They record high blood pressure, depressions and diet deficiencies. …

Apps

How Secure Are You with Your Smartphones?

Take a moment to think about apps used daily on your smartphone. Facebook? Twitter? Email? Web browser? No one wants to be stalked or let anyone see …

Security

Hundreds of thousands Magento e-shops are exploited to hack due to an unpatched flaw

<b>An unpatched vulnerability in Magento platform could be exploited by hackers to compromise fully web servers that host the e-commerce sites.</b><p>An …

Wells Fargo's Rob Zerby Says Consumers Want to be 'Inconvenienced'

<b>Getting Consumers Involved in Fraud Prevention, Detection</b><br>Consumers are willing to be inconvenienced to help their banking institutions reduce fraud …

Banking

Cerber Takes Ransomware Crown from Locky

<b>In its second quarterly Cybercrime Tactics & Techniques report, Malwarebytes noted huge shifts in ransomware power dynamics: Over the past three</b> …

Bitcoin