CYBER: Privacy, Crime, & Security

By Michael Hartley CFP® | Dkeadvisorsolutions.com curated articles about data and Internet security and personal privacy related to technology use.

Intel discloses new variant on Spectre, Meltdown security flaws

Intel said it is releasing updates to fix new vulnerabilities it discovered over the coming weeks.<p>Intel has disclosed a new variant of its widespread Spectre and Meltdown security flaws, introducing a new vulnerability to watch out for.<p>Intel is calling the new strain "Variant 4," and it uses many …

Information Security

UK Hospital Fires Worker for Looking at Ed Sheeran's Health Records

Workers at a National Health Service hospital in the United Kingdom were reprimanded for their role in an extremely narrow data breach that exposed …

Health Records

UK to introduce internet safety laws within 'next couple of years'

The UK government is acting on its vow to make the internet safer... whether or not companies like the idea. In the wake of the Internet Safety Green Paper, Digital Secretary Matt Hancock has unveiled plans for online safety laws that will tackle cyberbullying, child exploitation, extremism and …

Internet

App That Allows Parents to Spy on Teens Leaked Thousands of Passwords

TeenSafe, a service used by parents to monitor the online behaviors and phone activity of their children, allowed tens of thousands of accounts to …

Information Systems

Banks Adopt Military-Style Tactics to Fight Cybercrime

O’FALLON, Mo. — In a windowless bunker here, a wall of monitors tracked incoming attacks — 267,322 in the last 24 hours, according to one hovering dial, or about three every second — as a dozen analysts stared at screens filled with snippets of computer code.<p>Pacing around, overseeing the stream of …

Cybersecurity

HTC is launching a blockchain-powered phone

HTC is developing a new Android phone that will be powered by blockchain technology.<p>The phone, named Exodus, will feature a universal wallet and a built-in secure hardware enclave to support cryptocurrencies and decentralized applications.<p>HTC has roped back the creator of its virtual reality …

Blockchain

IBM warns of instant breaking of encryption by quantum computers: 'Move your data today'

Welcome to the future transparency of today as quantum computers reveal all currently encrypted secrets -- a viable scenario within just a few …

Quantum Computing

The Seven Phases of a Cyber Attack

In the cyber security industry, we are seeing a change in the way that hacks are being performed.<p>A recent set of attacks against critical …

Cybersecurity

Hacker Breaches Securus, the Company That Helps Cops Track Phones Across the US

A hacker has provided Motherboard with the login details for a company that buys phone location data from major telecom companies and then sells it to law enforcement.<p>A hacker has broken into the servers of Securus, a company that allows law enforcement to easily track nearly any phone across the …

Privacy

World’s Largest ID Database Exposed by Indian Government Errors

India’s government counts on high-tech encryption, multi-layered authentication, and even 13-feet high walls to protect the world’s largest biometric …

India

Email Encryption With PGP May Have a Serious Flaw

A team of researchers in Europe uncovered a way to pull the plain text from emails secured with PGP and S/MIME encryption. But not everyone agrees on …

Information Systems

Critical PGP and S/MIME bugs can reveal encrypted emails—uninstall now [Updated]

The flaws can expose emails sent in the past and "pose an immediate threat."<p><i>The research for this post is now public. See this post for details. A</i> …

Information Security

Ring's Smart Doorbell Let a Man Spy on His Ex-Boyfriend—Even After the Password Was Changed

After breaking up with his boyfriend, Jesus Echezarreta changed the password on his Ring smart doorbell—twice. Still, his ex-boyfriend was able to …

Smart Homes

Bipartisan bill would make it illegal for the government to demand backdoor access to devices

A bipartisan bill being put before Congress would eliminate the possibility of any future battles between Apple and the government over backdoor access to iPhones. Apple famously fought the FBI when it demanded the firm create a compromised version of iOS to access a work iPhone used by one of the …

Privacy

Microsoft's Latest Excel Update Has Security Pros Anxious

On Monday at its Build conference in Seattle, Microsoft announced a host of software products and updates related to buzzy technologies like machine …

Software

Florida man behind 100 million robocalls hit with huge FCC fine

Issuing its largest fine to date, the Federal Communications Commission levied a $120 million fine on a massive robocall spoofing operation it deemed a threat to public safety.<p>The FCC announced Thursday morning that it would fine Adrian Abramovich, a Miami man who the commission said made almost …

Net Neutrality

6 States Hit Harder By Cyberattacks Than Previously Known, New Report Reveals

Two years after Russia's wave of cyberattacks against American democracy, a Senate committee investigating election interference says those hackers hit harder than previously thought in several states.<p>The committee also added that it still doesn't know with complete certainty exactly how much of …

Cybersecurity

NYPD Testing 'Skim Reaper' to Fight Credit Card Fraud

The New York Police Department is testing out a device called the “Skim Reaper” in an effort to hinder credit card fraud.<p>The technology, developed by …

Identity Theft

Malicious apps successfully return to Play Store after name change

• At least seven malicious apps are said to have reappeared in the Play Store after being previously removed.<br>• The apps apparently had different names and publishers, but the same code.<br>• The apps in question used trusted icons to request permissions, before pushing ads to the device.<p>At least seven …

Apps

PSA: Saving passwords in public Trello boards is a really, really bad idea

If you put something on a publicly-accessible webpage, you should assume that it can (and eventually will) be read by another person. By that, I mean don’t put things you’d want to keep secret — like passwords and API credentials — in places where someone might eventually find them.<p>Sounds obvious, …

Online

Getting a Call From Your Own Number? It's a Phone Scam

Have you just received a phone call that appears to be from your own number? If so, it’s likely a spoofed call that a scammer has set up in order to …

Identity Theft

IBM Employees Can't Use Removable Storage Anymore

USB sticks, SD cards, and portable hard drives are all very useful, but now banned at IBM.<p>PCMag reviews products independently, but we may earn …

Portable

Hacking macOS: How to Configure a Backdoor on Anyone's MacBook

The conversation of which operating system is most secure, macOS vs. Windows, is an ongoing debate. Most will say macOS is more secure, but I'd like …

Linux

Oracle CEO Mark Hurd: How To Instantly Prevent 95% Of Database Cyberattacks

<i>(Note: After an award-winning career in the media business covering the tech industry, Bob Evans was VP of Strategic Communications at SAP in 2011, and Chief Communications Officer at Oracle from 2012 to 2016. He now runs his own firm, Evans Strategic Communications LLC.)</i><p>CLOUD WARS — As Oracle …

Databases

Yes, It’s Bad. Robocalls, and Their Scams, Are Surging.

It’s not just you.<p>Those pesky robocalls — at best annoying disturbances and at worst costly financial scams — are getting worse.<p>In an age when cellphones have become extensions of our bodies, robocallers now follow people wherever they go, disrupting business meetings, church services and bedtime …

Identity Theft

Hackers Are Gearing Up for the World Cup in Russia, Analysts Say

Sergei Kiselyov / Moskva News Agency<p>Hacker attacks are becoming more frequent and complex ahead of the 2018 FIFA World Cup and the situation is only …

Russia

Cyber Security: The Emerging Threat to Passenger Safety

Not a day goes by where we do not hear of a company breach, cyber-attack or a company facing a virus or ransomware scenario. Although defenses can be …

Cybersecurity

Abbott recalls 350,000 implantable defibrillators to protect against hacks (correction)

The fix: A firmware update that takes just 3 minutes to install.<p>If you rely on a tiny gadget to help your heart function, you might have wondered: Could it be hacked?<p>Yes, it's theoretically possible. And that's why Abbott (formerly St. Jude Medical) is recalling some 350,000 implantable …

Hacking

NSA triples metadata collection numbers, sucking up over 500 million call records in 2017

The National Security Agency revealed a huge increase in the amount of call metadata collected, from about 151 million call records in 2016 to more than 530 million last year — despite having fewer targets. But officials say nothing is different about the year but the numbers.<p>A transparency report …

Surveillance