fbpx

Download free GDPR compliance checklist!

Tag Archives for " hacking "

Chinese researchers reveal method to bypass biometric fingerprint scanners in smartphones

Chinese security researchers from X-Lab security at Tencent challenged fingerprint security in a presentation at the GeekPwn 2019 conference in Shanghai, writes Forbes. The team claims it can hack into almost any Android or iOS device in just about 20 minutes by using what appears to be a fairly simple fingerprint hacking method.

Without giving too many details about the actual technical approach to the audience, researchers used a smartphone to take a photo of fingerprints left on a glass and ran the photo through an app they developed. They were then able to gain access into three different phones equipped with different scanning technologies, one each with capacitive, optical, and ultrasonic sensors.

Source: Chinese researchers reveal method to bypass biometric fingerprint scanners in smartphones | Biometric Update

Study reveals 2019’s darkest cyber-threats

Webroot has released its third annual Nastiest Malware list, shedding light on 2019’s worst cybersecurity threats.

From ransomware strains and crypto-mining campaigns that delivered the most attack payloads to phishing attacks that wreaked the most havoc, it’s clear that cyber threats across the board are becoming more advanced and difficult to detect.

Full article: #Privacy: Study reveals 2019’s darkest cyber-threats

China Sharpens Hacking to Hound Its Minorities, Far and Wide

New, more sophisticated attacks are targeting Uighurs’ phones — even iPhones and even abroad, security researchers say. They warn that foreigners could be next.

“The Chinese use their best tools against their own people first because that is who they’re most afraid of,” said James A. Lewis, a former United States government official who writes on cybersecurity and espionage for the Center for Strategic Studies in Washington. “Then they turn those tools on foreign targets.”

Source: China Sharpens Hacking to Hound Its Minorities, Far and Wide – The New York Times

Cyberattacks cost small companies $200K, putting many out of business

About 43% of cyberattacks are aimed at small businesses. On average, these cost $200,000, putting 60% of these companies out of business in six months.

At the same time, though, 66% of senior decision-makers at small businesses still believe they’re unlikely to be targeted by online criminals. Similarly, 6 in 10 have no digital defense plan in place whatsoever, underscoring the need for heightened industry awareness and education across the board.

Source: Cyberattacks cost small companies $200K, putting many out of business

Remote Simjacking campaigns could disrupt SIM cards in 29 countries

Adaptive Mobile Security has published a new report detailing SimJacker attacks and the number of countries affected. The report identified 29 countries across five continents to which mobile operators ship SIM cards vulnerable to Simjacker attacks.

The countries include Mexico, Dominican Republic, Brazil, Peru, Saudi Arabia, Iraq, Italy, Bulgaria, Nigeria, Ivory Coast and more. Of the 29 countries, customers of a total of 61 mobile operators are currently using vulnerable SIMs with S@T Browser toolkit.

Source: #Privacy: Remote Simjacking campaigns could disrupt SIM cards in 29 countries

Former Yahoo! engineer hacked user emails for smutty snaps

Former Yahoo! software engineer has pleaded guilty in a California federal court to one count of computer intrusion after breaking into customers’ Yahoo! emails and accounts at other service providers to obtain private data, mainly sexual images and videos of account holders.

He abused his internal access at Yahoo! to hack into about 6,000 accounts in May and June last year. He then used the information he obtained to compromise other online services used by Yahoo! customers, such as Dropbox, Facebook, Gmail, and iCloud.

Source: Former! Yahoo! engineer! admits! to! hacking! user! emails! for! smutty! snaps! • The Register

Healthcare data hacking could lead to identity thefts

When a healthcare company is hacked, criminals gain access not only to health information, but also to demographic and financial data that could compromise patients’ privacy and financial security, researchers from the Michigan State and Johns Hopkins report.

Theft of medical data may not affect patients much because there isn’t a big market for it, said the study’s lead author, Xuefeng Jiang, a professor of accounting and information systems at the Eli Broad College of Business at Michigan State University.

Full article: Healthcare data hacking could lead to identity thefts – Reuters

Mysterious iOS Attack Changes Everything We Know About iPhone Hacking

For two years, a handful of websites have indiscriminately hacked thousands of iPhones.

The rare and intricate chains of code took advantage of a total of 14 security flaws, targeting everything from the browser’s “sandbox” isolation mechanism to the core of the operating system known as the kernel, ultimately gaining complete control over the phone.

Source: Mysterious iOS Attack Changes Everything We Know About iPhone Hacking | WIRED

UK hacker must pay back £922k after cyber-attack spree

An English cyber-criminal who carried out targeted computer attacks on more than 100 firms from his UK base has been forced to pay back a stolen cryptocurrency haul worth £922.978.14, news reports reveal.

Argos, Uber and Sainsbury’s were among the victims of Mr Grant West, who was jailed for fraud for an elaborate hacking spree which duped company insiders into exposing huge swathes of confidential data.

Source: #privacy: UK hacker must pay back £922k after cyber-attack spree

Malware that can record computer screens discovered

A new malware has been discovered that is able to record the screen of an infected machine and identify a user who is viewing porn.

Researchers at IT security company ESET, first observed the malware dubbed “Varenyky” in May 2019. A month later, researchers saw the first malicious document infecting a victim’s computer which had been attached to an email message.

Source: #privacy: Malware that can record computer screens discovered

1 2 3 20
>