CYBER: Privacy, Crime, & Security

By Michael Hartley CFP® | Dkeadvisorsolutions.com curated articles about data and Internet security and personal privacy related to technology use.

Apple reassures customers after teenager hacked its servers

Apple has reassured customers that none of their private data was compromised after a 16-year-old teenager plead guilty to hacking into the company’s servers.<p>An Apple spokesperson said that, “[We] want to assure our customers that at no point during this incident was their personal data …

Customers

Body scanners to screen LA subway riders

<b>Body scanners will be used on the Los Angeles subway to screen passengers for explosives and weapons, the local transport authority has announced.</b><p>It is the first mass transport system in the US to adopt the technology.<p>Portable scanners will be used to screen passengers as they enter stations, …

Scanners

Send confidential emails that self destruct with Gmail on mobile

Android and iOS users are now able to use the new Gmail Confidential Mode. This means that if you want to send sensitive information via e-mail, …

Information Systems

Google clarifies how it still tracks you when Location History is turned off

Unless you’ve been living under a rock, you’ve probably seen some headlines this week talking about how Google is tracking users even when they have Location History turned off. In all reality, that’s been going on for quite some time, but the way Google explained everything made it seem like users …

Google

Twitch streamers’ private messages may have been exposed in recent glitch

‘Small percentage of user messages’ affected<p>Twitch is alerting broadcasters that some of their messages may have been exposed following a glitch that affected the system in May.<p>A number of streamers received emails from the company concerning private messages sent in Twitch’s old “Messages” …

Internet

New 'Foreshadow' Flaw Exploits Intel Chips To Steal Protected Data

The new vulnerability builds on research related to the Meltdown and Spectre flaws. Foreshadow can be exploited to read data from Intel's SGX …

Information Security

Russian hackers stole hundreds of Instagram accounts this month

If you’ve discovered that you can no longer log into your Instagram account, and trying to reset your credential leads nowhere because the account is …

Social Media

Intel discloses another set of processor vulnerabilities

Intel disclosed another set of processor flaws today that could let attackers steal information stored on computers or third party clouds. Discovered by a number of researchers and reported to Intel in January, the vulnerability includes three varieties. The company said in a blog post that when …

Information Security

VPNs make browsing safer. Why don’t more people use them?

<i>This post is presented by HideMy.name VPN.</i><p>For all the regulations and constraints creeping onto the internet, it remains a pretty wild place. You can still find almost any information you want (unless you’re in a blocked country). And if you’re not careful, someone else can access your personal …

Information Systems

Ex-NSA staffer demonstrates malware bypassing security checks in High Sierra

Security research and former NSA staffer Patrick Wardle says that he will demonstrate on Sunday a set of automated attacks against macOS High Sierra, in which he is able to bypass security checks.<p>The checks are ones that ask the user to confirm that an app should be granted permission to do things …

High Sierra

Hacker Unlocks 'God Mode' and Shares the 'Key'

At Black Hat USA and DEF CON, researcher Christopher Domas showed how he found backdoors that may exist in many different CPUs.<p>When a room filled …

Information Security

Instagram users are reporting the same bizarre hack

Krista, an Instagram user with more than 4,500 followers on her fitness account, noticed something strange on Saturday evening: she had been logged …

Social Media

FBI warns of massive ATM scam that could affect banks worldwide

The Federal Bureau of Investigation (FBI) recently warned banks that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike …

ATMs

Police expose SIM card hijacking ring

There's a good chance you've had to ask your carrier for a SIM swap, whether it's to replace a faulty card or to switch to another size (say, from micro SIM to nano SIM). Crooks, however, are increasingly abusing those swaps to steal from unsuspecting cellphone users. Florida police have arrested …

Hijacking

Hackers can seize practically all your online accounts, and it's your voicemail's fault

Who would have thought that, in the end, it would be the humble voicemail that would do us all in?<p>Your Google, Microsoft, Apple, WhatsApp, and even …

Voice Mail

Yes, You Should Still Change Your DNS Settings for Better Internet

The DNS (Domain Name System) server settings on your laptop, phone, or router are your gateway to the web—converting easy-to-remember domain names …

Information Security

This Guy Hacked Hundreds Of Planes From The Ground

[id=0]<p>Throughout November and December last year, Ruben Santamarta sat in front of his computer peeking inside the technical bowels of hundreds of aircraft flying thousands of meters above him. That included commercial aircraft operated by some of the biggest airlines in the world. He believes it …

Atlantic Council

Phones sold by the four major US carriers could have a major security flaw

Customers using devices from four major cell phone carriers could unknowingly be exposing sensitive data to hackers, according to the Department of Homeland Security (DHS). <i>Fifth Domain</i> reports that DHS-funded researchers from mobile security firm Kryptowire have found vulnerabilities in phones used …

Mobile

New genre of artificial intelligence programs take computer hacking to another level

SAN FRANCISCO (Reuters) - The nightmare scenario for computer security - artificial intelligence programs that can learn how to evade even the best defenses - may already have arrived.<p>FILE PHOTO: Servers for data storage are seen at Advania's Thor Data Center in Hafnarfjordur, Iceland August 7, …

Artificial Intelligence

New Wi-Fi attack cracks WPA2 passwords with ease

The common Wi-Fi security standard is no longer as secure as you think.<p>A new way to compromise the WPA/WPA2 security protocols has been accidentally …

Information Systems

An Airline Scans Your Face. You Take Off. But Few Rules Govern Where Your Data Goes.

WASHINGTON — The program makes boarding an international flight a breeze: Passengers step up to the gate, get their photo taken and proceed onto the plane. There is no paper ticket or airline app. Thanks to facial recognition technology, their face becomes their boarding pass.<p>“I would find it …

Surveillance

Singapore explores virtual browsers following SingHealth data breach

Health Ministry is piloting the use of quarantined servers as part of efforts to "reduce the number of potential attack points", following last …

Cybersecurity

Apple chipmaker is back up and running after malware attack

After being knocked out of commission over the weekend by a computer virus, iPhone chipmaker Taiwan Semiconductor Manufacturing Co. (TSMC) was back up and running on Monday.<p>According to the manufacturer, the problem was caused by a ransomware attack from the infamous WannaCry ransomware cryptoworm. …

Fabrication

Panda: Understanding Cyber-Attacks

The frequency, sophistication and targeted nature of cyber-attacks has drastically changed the threat landscape. While most organizations have the …

Cybersecurity

Congress passes data security bill for small businesses

The US government doesn't have the strongest cybersecurity policy right now, but there's at least some progress on that front beyond what's happening at security agencies. The US Senate has passed its version of the NIST Small Business Cybersecurity Act, clearing the way for the bill to become law …

Small Business

Reddit was just hacked–here’s what you need to do right now

Reddit announced today that its systems had been hacked at some point earlier this summer.<p>In a post on its r/announcements section, the company said that sometime between June 14 and June 18 an attacker “broke into a few of Reddit’s systems and managed to access some user data, including some …

Security

The Ten Most Successful Phishing Email Subject Lines

Legitimate email marketers probably don’t need this intelligence. But for those who are curious, or want to avoid attacks, KnowBe4 has identified the …

Wells Fargo

U.S. warns of rising hacker threats to SAP, Oracle business software

LONDON (Reuters) - At least a dozen companies and government agencies have been targeted and thousands more are exposed to data breaches by hackers exploiting old security flaws in management software, two cyber security firms said in a study published on Wednesday.<p>The Department of Homeland …

Cybersecurity

Update Your iPhones And Androids Now If You Don't Want Your Bluetooth Hacked

There’s a potentially serious vulnerability affecting Bluetooth that could lead to leaks of private data from Apple, Google and Intel-based smartphones and PCs. Patches are being made available, so concerned users should update where they can. Millions, if not hundreds of millions or billions, of …

Information Security