fbpx

Free tools and resources for Data Protection Officers!

Tag Archives for " hacking "

Cyberattacks cost small companies $200K, putting many out of business

About 43% of cyberattacks are aimed at small businesses. On average, these cost $200,000, putting 60% of these companies out of business in six months.

At the same time, though, 66% of senior decision-makers at small businesses still believe they’re unlikely to be targeted by online criminals. Similarly, 6 in 10 have no digital defense plan in place whatsoever, underscoring the need for heightened industry awareness and education across the board.

Source: Cyberattacks cost small companies $200K, putting many out of business

Remote Simjacking campaigns could disrupt SIM cards in 29 countries

Adaptive Mobile Security has published a new report detailing SimJacker attacks and the number of countries affected. The report identified 29 countries across five continents to which mobile operators ship SIM cards vulnerable to Simjacker attacks.

The countries include Mexico, Dominican Republic, Brazil, Peru, Saudi Arabia, Iraq, Italy, Bulgaria, Nigeria, Ivory Coast and more. Of the 29 countries, customers of a total of 61 mobile operators are currently using vulnerable SIMs with S@T Browser toolkit.

Source: #Privacy: Remote Simjacking campaigns could disrupt SIM cards in 29 countries

Former Yahoo! engineer hacked user emails for smutty snaps

Former Yahoo! software engineer has pleaded guilty in a California federal court to one count of computer intrusion after breaking into customers’ Yahoo! emails and accounts at other service providers to obtain private data, mainly sexual images and videos of account holders.

He abused his internal access at Yahoo! to hack into about 6,000 accounts in May and June last year. He then used the information he obtained to compromise other online services used by Yahoo! customers, such as Dropbox, Facebook, Gmail, and iCloud.

Source: Former! Yahoo! engineer! admits! to! hacking! user! emails! for! smutty! snaps! • The Register

Healthcare data hacking could lead to identity thefts

When a healthcare company is hacked, criminals gain access not only to health information, but also to demographic and financial data that could compromise patients’ privacy and financial security, researchers from the Michigan State and Johns Hopkins report.

Theft of medical data may not affect patients much because there isn’t a big market for it, said the study’s lead author, Xuefeng Jiang, a professor of accounting and information systems at the Eli Broad College of Business at Michigan State University.

Full article: Healthcare data hacking could lead to identity thefts – Reuters

Mysterious iOS Attack Changes Everything We Know About iPhone Hacking

For two years, a handful of websites have indiscriminately hacked thousands of iPhones.

The rare and intricate chains of code took advantage of a total of 14 security flaws, targeting everything from the browser’s “sandbox” isolation mechanism to the core of the operating system known as the kernel, ultimately gaining complete control over the phone.

Source: Mysterious iOS Attack Changes Everything We Know About iPhone Hacking | WIRED

UK hacker must pay back £922k after cyber-attack spree

An English cyber-criminal who carried out targeted computer attacks on more than 100 firms from his UK base has been forced to pay back a stolen cryptocurrency haul worth £922.978.14, news reports reveal.

Argos, Uber and Sainsbury’s were among the victims of Mr Grant West, who was jailed for fraud for an elaborate hacking spree which duped company insiders into exposing huge swathes of confidential data.

Source: #privacy: UK hacker must pay back £922k after cyber-attack spree

Malware that can record computer screens discovered

A new malware has been discovered that is able to record the screen of an infected machine and identify a user who is viewing porn.

Researchers at IT security company ESET, first observed the malware dubbed “Varenyky” in May 2019. A month later, researchers saw the first malicious document infecting a victim’s computer which had been attached to an email message.

Source: #privacy: Malware that can record computer screens discovered

How hackers can use stolen fingerprints

Hackers could use a stolen fingerprint to break into a fairly rudimentary security system. A more advanced system might be possible, too, if they have lots of time and money at their disposal.

There are multiple ways to fool fingerprint readers. Stolen fingerprints are more helpful to hackers if they also have metadata – associated identities and login information, since two-factor security systems often require both conventional passwords and fingerprint scans.

Full article: How criminals might use stolen fingerprints.

Seattle woman detained for Capital One data breach

Authorities managed to detain an individual suspected of being behind the Capital One hack, which news reports reveal as a woman who used to work for Amazon Web Services.

According to the US Justice Department, the arrested woman is 33-year-old Paige Thompson from Seattle. Upon her arrest two days ago, the former technology software engineer was charged with IT fraud and computer abuse for allegedly breaking into Capital One systems and stealing data.

Source: Seattle woman detained for Capital One data breach

Russia’s Secret Intelligence Agency Hacked: ‘Largest Data Breach In Its History’

Hackers successfully targeted Russia’s state security agency last week through a major contractor, stealing and publishing details 7.5 terabytes of secret internet projects including social media scraping and Tor de-anonymization.

FSB is Russia’s primary security agency with parallels with the FBI and MI5, but its remit stretches beyond domestic intelligence to include electronic surveillance overseas and significant intelligence-gathering oversight.

Source: Russia’s Secret Intelligence Agency Hacked: ‘Largest Data Breach In Its History’

1 2 3 20
>