CYBER: Privacy, Crime, & Security

By Michael Hartley CFP® | Dkeadvisorsolutions.com curated articles about data and Internet security and personal privacy related to technology use.

Allscripts recovering from ransomware attack that has kept key tools offline

Allscripts, the billion-dollar electronic health record (EHR) company headquartered in Chicago, IL said they were still working to recover from a …

Information Security

How to Rapidly Identify Assets at Risk to WannaCry Ransomware and ETERNALBLUE Exploit

In what may be the first public weaponizing of April’s Shadow Brokers dump of NSA exploits, a ransomware attack has crippled IT systems globally and …

How to delete all your voice data from Amazon Echo, Google Assistant, Cortana and Siri

Amazon Echo's Alexa, Google Assistant and Cortana are always listening to obey your commands. Utter the wake word – Alexa, Cortana or Hey Google, and …

Cortana

Donald Trump signs bill renewing NSA warrantless internet surveillance

(<i>Reuters</i>) — U.S. President Donald Trump on Friday said he signed into law a bill renewing the National Security Agency’s warrantless internet surveillance program, sealing a defeat for digital privacy advocates.<p>“Just signed 702 Bill to reauthorize foreign intelligence collection,” Trump wrote on …

National Security Agency (NSA)

How a Tiny Dot Lets Criminals Impersonate Most Banks Online

How to protect yourself as an unusual computer symbol becomes criminals' ticket into people's money and data.<p>A small, rarely used special character is potentially helping criminals trick people into falling prey to all sorts of online scams, and businesses - including some of the world's leading …

Security

What is Zero Trust? A model for more effective security

The <b>Zero Trust Network</b>, or <b>Zero Trust Architecture</b>, model was created in 2010 by John Kindervag, who at the time was a principal analyst at Forrester …

Security

One Of The 'Most Powerful' Android Spyware Tools Ever Was Just Uncovered

Italy is home to a remarkably bustling smartphone spyware industry. Hacking Team, infamously hacked itself in 2015, somehow remains one of the bigger players. But there are others: IPS, Area IT and RCS to name a few. On Tuesday, researchers from Russian firm Kaspersky Lab detailed a fresh Android …

Spyware

The Ethereum Scam Database helps you avoid cryptocurrency scammers

The exponential growth the cryptocurrency and blockchain markets are currently experiencing has made the space a breeding ground for all sorts of hacks, malicious activities, and phishing traps. But there is a nifty tool that can help you steer clear of this sort of trouble.<p>The Ethereum Scam …

Cryptocurrency

Cyber threats outpacing abilities of governments, companies: WEF

As cases of data breach and online fraud fox the authorities in India and abroad, the World Economic Forum (WEF) has warned that cybersecurity …

Cybersecurity

OnePlus might have a problem with securing credit card data

When you pay for something online with a credit card, you expect that transaction to be secure. Encryption and other security procedures are supposed …

Identity Theft

Responding to the Rise of Fileless Attacks

Fileless attacks, easier to conduct and more effective than traditional malware-based threats, pose a growing challenge to enterprise …

Cybersecurity

A dad-and-son cybersecurity firm impressed investors with its 'unique' software that plays a kind of hide-and-seek with hackers

• <b>CryptoMove, a cybersecurity startup led by a father-and-son team, just raised $6 million in a Series A funding round.</b>• <b><br>The round was led by Social Capital, a venture capital firm founded by ex-Facebook executive Chamath Palihapitiya.</b>• <b><br>Social Capital was intrigued by CryptoMove's approach to security,</b> …

Venture Capital

AI learns how to fool text-to-speech. That’s bad news for voice assistants

A pair of computer scientists at the University of California, Berkeley developed an AI-based attack that targets text-to-speech systems. With their method, no matter what an audio file sounds like, the text output will be whatever the attacker wants it to be.<p>This one is pretty cool, but it’s also …

Artificial Intelligence

What's Slack Doing With Your Data?

More than six million people use Slack daily, spending on average more than two hours each day inside the chat app. For many employees, work life is …

Privacy

Ohio man indicted for using 'Fruitfly' malware to spy on Americans

WASHINGTON (Reuters) - An Ohio man was charged in a 16-count indictment on Wednesday for allegedly using malware known as "Fruitfly" to surreptitiously record people by secretly taking over their computer cameras and microphones, the U.S. Justice Department said.<p>The indictment said that from 2003 …

Security

Facebook bug let advertisers find your phone number

Facebook's advertising software was tricked into leaking account holder's phone numbers, according to security researchers.<p>The social media giant encourages users to share their phone number as an additional security measure, but promises that this data will remain anonymous. However, security …

Security

How cryptocurrency miners can hack your computer on public WiFi for big gains

As the hubbub around cryptocurrencies continues to grow, so, too do the ways that more nefarious folks can exploit clueless individuals. And one …

Wi-Fi

A Dog Walking App Accidentally Leaked People's Home Lock Codes

A popular app that connects dog owners and dog walkers accidentally revealed the lock box codes of at least 50 users, and the home addresses of at …

Security

Blocked by passwords, FBI can’t unlock over half of devices seized as evidence

WASHINGTON — The FBI was unable last year to get access to the contents of more than half the electronic devices seized for evidence — a problem that is getting worse, FBI Director Christopher Wray said Tuesday.<p>Despite having court orders allowing agents to examine the contents of the devices, the …

Privacy

Reddit admits its email provider was hacked to steal Bitcoin Cash tips

Following a brigade of spooked Redditors reporting hacked accounts and missing Bitcoin Cash tips, Reddit has now revealed the results of its internal investigation – and it doesn’t look good. A hacker purportedly breached the platform’s third-party password reset system, forcing access to the …

Security

The Biggest Cyber Threat We Face Personally -- and How to Protect Against It

While we are at the mercy of large companies to protect our privacy and data, this cyber threat requires vigilant personal responsibility.<p>With a new year comes new challenges, and few have become as problematic as online or cyber threats.<p>Martin Giles, San Francisco bureau chief for <i>MIT Technology</i> …

Security

LockPoS Malware Sneaks onto Kernel via new Injection Technique

"Alarming evolution" of Flokibot bypasses antivirus software and was likely built by a group of advanced attackers, researchers say.<p>A sneaky new …

Information Security

Florida hack exposed files of up to 30,000 Medicaid patients

TALLAHASSEE, Fla. (AP) — Florida officials say hackers may have accessed the personal information and medical records of up to 30,000 Medicaid recipients two months ago.<p>The state's Agency for Health Care Administration said in a Friday evening news release that one of its employees "was the victim …

Security

Why Your Web Browser May Be Most Vulnerable to Spectre and What to Do About It

Security researchers this week revealed details of Spectre and Meltdown, massive security vulnerabilities found in microprocessors made by Intel, …

Information Security

How to protect your PC against the major ‘Meltdown’ CPU security flaw

Everything we know so far<p>Details have emerged on two major processor security flaws this week, and the industry is scrambling to issue fixes and secure machines for customers. Dubbed “Meltdown” and “Spectre,” the flaws affect nearly every device made in the past 20 years. The Meltdown flaw …

Information Security

Strong holiday shopping season opens floodgates for cybercriminals

This holiday shopping season was expected to be one of the strongest in years, potentially gifting cybercriminals with extra opportunities to steal consumers’ sensitive information.<p>“With all the increased spending that takes place over the holidays, it is a good idea to be even more vigilant,” …

Identity Theft

Tax Scam Alert: The IRS Just Issued a New Cybersecurity Warning

Protect your personal information this tax season.<p>While cybersecurity should be a year-round concern for small business owners, income tax filing …

Identity Theft

Full Access to India's National Biometric Database Reportedly Sold Over WhatsApp for About $8

Aadhaar, India’s massive biometric database, is facing new allegations of compromise after local journalists reported paying the equivalent of $8 in …

Security

ARM security update suggests some iPhones, iPads, iPods and Apple TVs may be affected by CPU bug

Following clarification that what was initially reported as an Intel chip bug also affects AMD processors and ARM-based chips, Intel’s CEO has said that ‘phones and everything’ will be impacted.<p>A security update by ARM suggests that a number of iPhones, iPads, iPods and Apple TVs may be affected …

Brian Krzanich