ghaith itbega

317 Added | 6 Magazines | 9 Likes | 2 Following | 38 Followers | @libya1964 | Keep up with ghaith itbega on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “ghaith itbega”

Facebook Uses Machine Learning To Spot At-Risk Users

This week Facebook announced that it has deployed AI-driven technology to identify users at risk of self-harm, and offer them support.<p>Algorithms, trained on report data from the network’s close to two billion users, are constantly on the lookout for warning signs in content that users post, as well …

Social Media

Router Vulnerabilities Disclosed in July Remain Unpatched

Command injection vulnerabilities and accessible default admin credentials in home routers distributed by Thailand’s largest broadband provider …

Information Security

Japan Denies Report of ‘State-Backed’ Cyber Attack on Military

To continue reading this article you must be a Bloomberg Professional Service Subscriber.<p>If you believe that you may have received this message in …

Japan

Apple Has an SSD Data Recovery Tool for Touch Bar MacBook Pros That Refuse to Boot

Since it's been revealed that Apple chose to use a soldered down, non-removable SSD in its 13-inch and 15-inch Touch Bar MacBook Pros, it's natural for users to wonder about the fate of their data in the event of a fault that requires a logic board replacement.<p>Fortunately it appears as if Apple has …

MacBook Pro

We’re Winning The Crypto Wars

While the FBI and some governments are still fighting the Crypto Wars in courts and with laws, the spread of encryption appears unstoppable.<p>This year has been filled with bad news. The world of cybersecurity has been no different, with zombie armies of hacked internet-connected devices taking down …

Privacy

The FBI likely ran nearly half the child porn sites on the dark web in 2016

Earlier this year we brought you an in-depth exposé of how, for 12 days in February and March, the Federal Bureau of Investigation (FBI) ran the world’s largest child porn site, Playpen. According to newly unsealed documents, Playpen wasn’t the only site containing child pornography on FBI …

Privacy

Malware variants and spam rates skyrocket in October

Fueled by the Mirai botnet Symantec's October 2016 intelligence report saw the number of unique malware variants experience a massive uptick, while …

Google shows the web is a lot more secure than it was a year ago

As we spend more time online, the need for secure browsing and communications has become more and more important. Messaging apps now incorporate encryption as standard and many of your favorite websites (including this one) are moving to HTTPS to protect their visitors. For the longest time, Google …

Car hackers found a way to trigger a Tesla's brakes from miles away

The Chinese research team, from the Keen Security Lab at Tencent, first privately disclosed their findings to Tesla, and are only publishing the details now it has been patched.<p>There's no evidence that anyone ever maliciously used this vulnerability to target Tesla cars — but it's still a …

Tesla Model S

Cybersecurity is threatening America’s military supremacy

The sparsely populated Spratly Islands, a collection of hundreds of islands and reefs spread over roughly 165,000 square miles in the South China Sea, are very quickly becoming the center of one of the most contentious international disputes between world powers since the fall of the Soviet …

Australia scrapes fourth on APAC cyber maturity scale

Australia has jumped Singapore to come fourth on the Australian Strategic Policy Institute's annual cyber maturity metric, but the country needs to …

TalkTalk hack: Teen in court on hacking and blackmail charges

19-year-old from Wales alleged to have demanded 596 bitcoinsThe fifth suspect to be arrested in connection with the megahack of TalkTalk last year …

Crime

London cops charge ATM malware hacker

Raiders bagged and taggedLondon Police have continued to bag and tag criminals who installed malware in ATMs across the city, with the extradition of …

ATMs

New York will use facial recognition to catch terrorists

New York governor Andrew Cuomo wants to give the state's bridges and tunnels a high-tech makeover, starting with the installation of cameras, sensors and facial recognition equipment. Under his initiative, crossings, airports and other strategic locations will be equipped with facial recognition …

Members of Hacker Group Behind 2014 Holiday Attack on PSN/Xbox Live Arrested

Two teenagers belonging to the hacker group Lizard Squad, which was responsible for the downtime suffered by both Xbox Live and PlayStation Network in late 2014, were charged with cyber crimes this week.<p>The news was announced in a press release (via Polygon) from the Department of Justice, …

Xbox

Twitter, Facebook and Instagram cut off police tool used to spy on you

Twitter has revoked the rights of Geofeedia after the firm discovered law enforcement was paying big bucks to track users.<p>Twitter has revoked …

UK’s new cyber security centre to debunk scare tactics and lead by example

The UK government has had enough of clichéd cyber dementor imagery, scary-sounding industry rhetoric and impossible security advice that the average consumer has no hope of following.<p>And it’s hoping that by taking a less hyperbolic, data-driven approach to tackling cyber security it can encourage …

India experiences catastrophic cyberattack, 3.2 million debit card account details stolen

In one of the country's worst data breaches to date, 3.2 million debit cards have reportedly become compromised.<p>India is dealing with one of the …

Why hackers hack: Is it all about the money?

A simple question with a complex answer, according to HackerOne research.<p>You get what you pay for in the cybersecurity industry, but bug bounty …

Cybersecurity predictions for 2016: How are they doing?

We examine the frequency and scale of cyberattacks in the first half of 2016, and see whether security experts' predictions were on the money at the …

Hackers Hit ‘Some’ Cisco Customers With Leaked NSA Hacking Tools

A month after the leak of some NSA hacking tools, Cisco found the first real world attack using the leaked exploits.<p>Unknown hackers have used NSA hacking tools released online last month to breach some targets using firewalls, switches and routers made by Cisco Systems, according to the tech …

Digital Forensics

Car hackers demonstrate wireless attack on Tesla Model S

A remote vulnerability for Tesla’s Model S has been demonstrated by researchers from Keen Security Lab, a division of the Chinese internet giant Tencent. The vulnerability was confirmed by Tesla’s product security team and has already been patched via an over-the-air software update, as Keen worked …

Information Security

Hacking the election? Feds step in as states fret cyber threats

<b>Washington (CNN) —</b> A series of high-profile breaches and warnings from national intelligence leaders has elections directors in critical battleground states seeking federal help against possible cyberattacks.<p>Officials in Pennsylvania and Ohio tell CNN they are working closely with the Department of …

CNN

We're told data breaches cost millions on average - but this security study disagrees

New research suggests that the average cost of data breaches is lower than many estimates and too low to drive greater investment in …

Here’s a Live Map of the Mirai Malware Infecting the World

On Monday, the security researcher known as MalwareTech released a map showing, in real-time, infections of Mirai across the world.<p>Last weekend, a hacker publicly released the code of "Mirai", the piece of Internet of Things malware that was used to create some of the most powerful botnets ever. …

Cybersecurity

How DNS can be used to unmask Tor users

Researchers have found a way to use DNS traffic monitoring to deanonymize Tor users based on Tor exit relay usage.<p>DNS traffic monitoring can be used …

Information Security

Stealing login credentials from a locked PC or Mac just got easier | Ars Technica

20 seconds of physical access with a $50 device is all it takes.<p>Snatching the login credentials of a locked computer just got easier and faster, …

Why Is Google Trying To Murder HTTP Connection Used By Websites

<i>Short Bytes: Google is working to make users more aware of security risks posed by websites using an HTTP (Hyper Text Transfer Protocol) connection</i> …

Brutus: The Password Cracker

Brutus is one of the most powerful, fastest and...<br>[[ This is a content summary only. Visit my website for full links, other content, and more! ]]

10 Best Methods to Hack/Crack WiFi Password in PC and Mobile

10 Ways to Hack WiFi Password in PC and Mobile<p>Here we collect 10 Best working methods for hacking/cracking a wifi password in android mobile, Windows …