Computer / Cyber Security

By Josh Gahan | With privacy and computer security in the news everyday, it's important to keep upto date, so you don't become a victim yourself. For further reading visit technewsadvisory.com

Google drops new Edge zero-day as Microsoft misses 90-day deadline

Google’s Project Zero team has dropped a Microsoft Edge bug for the world to see.<p>Google originally shared details of the flaw with Microsoft on 17 …

Cybersecurity

Ajit Pai Is Reportedly Being Investigated by the FCC's Inspector General [UPDATED]

During his short tenure as chairman of the Federal Communications Commission, Ajit Pai has made so many destructive and controversial decisions it’s …

Net Neutrality

The Brits just publicly blamed Russia for the "NotPetya" cyberattack

The devastating NotPetya cyberattack that cost billions of dollars worldwide and delayed condom production for several weeks was carried out by the Kremlin, the U.K claimed Wednesday.<p>In making the remarkable accusation, the British government said Russia was “ripping up the rule book” and …

Cybersecurity

Hackers Are Trying to Use Your Phones and Computers to Mine a Cryptocurrency

There’s a chance your computer or phone is quietly producing a cryptocurrency called Monero.<p>Criminals looking to commandeer massive processing power …

Amazon.com Inc

This new text bomb crashes most Mac and iOS apps with a single Unicode symbol

TechCrunch has learned of a potentially serious new bug affecting a wide range of Apple devices.<p>During their development work on an international news feed, software engineers at Aloha Browser discovered two Unicode symbols in a non-English language that can crash any Apple device that uses Apple’s …

iOS

New Hack Can Steal Data From Devices in Faraday Cages

Last year Wikileaks released documents detailing how attackers can compromise offline computers. This new study goes one step further, exposing the fallibility of Faraday cages<p>Many methods have failed in the effort to secure digital communications, but one has remained relatively reliable: Faraday …

Security

Don’t use Huawei phones, say heads of FBI, CIA, and NSA

The US intelligence community is still worried about Chinese tech giants’ government ties<p>The heads of six major US intelligence agencies have warned that American citizens shouldn’t use products and services made by Chinese tech giants Huawei and ZTE. According to a report from <i>CNBC</i>, the …

Huawei

Smartphone data tracking is more than creepy: here's why you should be worried

File: Having information at our fingertips is the height of convenience. Photo: Pexels<p>LONDON - Smartphones rule our lives. Having information at our …

Russian Scientists Arrested for Crypto Mining at Nuclear Lab

Several scientists working at a Russian nuclear weapons research facility have been arrested for mining cryptocurrencies at the site.

Cryptography

Europe in the firing line of evolving DDoS attacks

Europe

Hospital Hit With Cryptocurrency Mining Malware

<b>Are More Healthcare Sector Entities at Risk?</b><br>Do healthcare entities face a growing risk of being hit with cryptocurrency mining attacks, which have …

Cybersecurity

You dopes! US state's pot dealer database pwned after security goes up in smoke

Don't mean to harsh your buzz: Hackers weed out access holeThe US state of Washington says a miscreant was able to access the system it uses to track …

Cyber-attacks

How To: Use Remote Port Forwarding to Slip Past Firewall Restrictions Unnoticed

Local port forwarding is good when you want to use SSH to pivot into a non-routable network. But if you want to access services on a network when you …

Linux

Cisco: Severe bug in our security appliances is now under attack

A proof-of-concept exploit for Cisco's 10-out-of-10 severity bug surfaces days after researcher details his attack.<p><i>Video: Top 10 malware threats in</i> …

Information Security

Hackers accessed more personal data from Equifax than previously disclosed

Data included tax identification numbers, e-mail addresses, and additional drivers license information<p>Last year, credit rating agency Equifax announced that hackers had stolen personal information for 143 million US consumers, including names, Social Security numbers, birthdates, addresses, drivers …

Identity Theft

NSA sent coded messages through Twitter

Spy agencies have a long history of using public outlets to deliver secret messages, such as numbers stations or cryptic classified ads. Now, however, they've adapted to the internet era. Both the <i>New York Times</i> and the <i>Intercept</i> have learned that the National Security Agency used Twitter to send …

Surveillance

Cisco: You need to patch our security devices again for dangerous ASA VPN bug

Cisco has warned that its original fix for the 10/10-severity ASA VPN flaw was "incomplete".<p><i>Video: Top 10 malware threats in 2017</i><p>on cnet<p>The CNET VPN …

Information Security

T-Mobile Is Sending a Mass Text Warning of ‘Industry-Wide’ Phone Hijacking Scam

Cybercriminals are increasingly targeting people’s phone numbers, hijacking and then using them to access people’s bank or social media accounts.<p><b>**If you're looking for ways to protect yourself from SIM hijacking and other hacks, read The Motherboard Guide to Not Getting Hacked**</b><p>If you’re a …

Identity Theft

Leaked Document Appears to Show NSA Infiltrated Cryptos, Tor, VPN

<b>A photograph posted on imageboard 4chan appears to show a leaked 21 August 2017 memorandum from the US Army Cyber Protection Brigade. The document</b> …

Security

Former Microsoft VP Explains Why Windows Vista Ended Up A Mess

The writing may have been on the wall when Windows Vista was released to the public, but it's only after many, many years we're starting to hear the …

Microsoft Windows

Security News This Week: 'AutoSploit' Tool Makes Unskilled Hacking Easier Than Ever

Another week, another death by a thousand leaks, from the operational security failure of fitness app Strava exposing the locations of military bases …

Security

Google Chrome: Beware these malicious extensions that record everything you do

Developers of malicious extensions are testing new session-replay technique to record and replay victims' online sessions.<p>Google has removed 89 …

Malware

Look Out: Chrome Extension Malware Has Evolved

You already know to be wary of third-party Android apps, and even to watch your back in the Google Play Store. A flashlight app with only 12 reviews …

Google

The Internet of OMG: Vulnerable factory and power grid controls on Internet | Ars Technica

Even some devices with patches available are connected to the naked Internet.<p>Yesterday, Siemens issued an update to a year-old product vulnerability …

Information Security

'Drive-by' cryptomining code was discovered in YouTube ads this week

"Cryptojacking" is nothing new but it has begun to pick up more steam in recent months. For the unaware, cryptojacking typically involves …

Internet

NonPetya ransomware forced Maersk to reinstall 4000 servers, 45000 PCs

The shipping giant has suffered millions of dollars in damage due to the ransomware attack.<p>Maersk has revealed that a devastating ransomware attack …

Cybersecurity

Exclusive: ICE is about to start tracking license plates across the US

The Immigration and Customs Enforcement (ICE) agency has officially gained agency-wide access to a nationwide license plate recognition database, according to a contract finalized earlier this month. The system gives the agency access to billions of license plate records and new powers of real-time …

Surveillance

How To: Use Kismet to Watch Wi-Fi User Activity Through Walls

Your home has walls for privacy, but Wi-Fi signals passing through them and can be detected up to a mile away with a directional Wi-Fi antenna and a …

Wi-Fi