One misstep from developers at Starbucks left exposed an API key that could be used by an attacker to access internal systems and manipulate the list of authorized users. The severity rating of the vulnerability was set to critical as…
Watch out, sextortion scammers are using a new tactic
Sextortion cybercrimes continue to threaten Internet users, scammers are using new tactics to bypass spam filters and secure email gateways. Sextortion scams continue to evolve to bypass security measures such as spam filters and secure email gateways. Sextortion messages threaten…
Imagination Technologies Announces New Licensing Agreement With Apple
Imagination Technologies announced on Tuesday that Apple has replaced a licensing agreement with the British chipmaker for access to its intellectual property in exchange for license fees. In a brief statement on the its website, the U.K. firm said that…
AI More Accurate Than Doctors For Detecting Breast Cancer – Report
AI system from Google is more accurate than doctors in diagnosing breast cancer from mammograms, study from UK and US finds Advertise on IT Security News. Read the complete article: AI More Accurate Than Doctors For Detecting Breast Cancer…
Tale of the Tape: The NSA’s Neal Ziring on the Slow Death of Punched Tape Crypto Keys
“We’ve been working with our military partners to get them off key tape for, oh jeez, well over a decade; probably longer” The post Tale of the Tape: The NSA’s Neal Ziring on the Slow Death of Punched Tape Crypto…
IoT Company Wyze Suffered a Leak of 2.4m Emails and Device Data
An exposed Elasticsearch database, owned by Internet of Things (IoT) company Wyze, was discovered leaking connected device information and emails of millions of customers. Wyze makes smart home cameras and connected devices like connected bulbs and plugs, which can be…
US Coast Guard Sounds Alarm After Ransomware Attack
Unnamed facility was out of action for over 30 hours following Ryuk attack Advertise on IT Security News. Read the complete article: US Coast Guard Sounds Alarm After Ransomware Attack
Hackers Impersonate Canadian Banks In Two-year Long Phishing Attack
It has been reported that Canadian banks are being impersonated in a phishing campaign targeting both individuals and businesses via a large-scale infrastructure shared with previous attacks going back to 2017 and pointing to the same attackers. The infrastructure behind these Canadian focused attacks includes hundreds of…
New Tesla Fatal Accident To Be Investigated
Tesla vehicle allegedly may have been on autopilot when it ran a red light at the weekend and killed two people in a Los Angeles suburb Advertise on IT Security News. Read the complete article: New Tesla Fatal Accident…
Shitcoin Wallet Chrome extension steals crypto-wallet private keys and passwords
Security expert discovered a Google Chrome extension named Shitcoin Wallet that steals passwords and wallet private keys. Harry Denley, director of security at the MyCrypto, discovered that the Google Chrome extension named Shitcoin Wallet is stealing passwords and wallet private keys.…
Network Operators Must Automate Their Way to 5G
Artificial intelligence (AI) has crept into many aspects of our lives, from Google Maps to Alexa to our cars. At the same time, we rely more and more on internet of things (IoT) devices such as smart locks and dishwashers.…
Ransomware in Node.js, (Thu, Jan 2nd)
Happy new year to all! I hope that you enjoyed the switch to 2020! From a security point of view, nothing changed and malicious code never stops trying to abuse our resources even during the holiday season. Here is a…
Deepfakes Pose New Security Challenges
Expect to hear a lot about deepfakes in 2020. It’s not that manipulating images is anything new, but with technology advantages and the increasing use of biometrics as an authentication tool, deepfakes will impact cybersecurity efforts. For example, cybercriminals are…
Seoul to install AI cameras for crime detection
System will detect what passersby are wearing. Advertise on IT Security News. Read the complete article: Seoul to install AI cameras for crime detection
U.S. Military Banned World’s Most Popular Video-Sharing App TilTok on Soldiers Work Mobile Phones
The U.S. Army announced bans, soldiers from using the most popular iOS, and Android 15-second video app TikTok. Earlier on Dec. 16, the defense system agency recommended all the employees of the defense department not to use the TikTok app.…
Half of the global 815 Million Smart Speakers are putting users privacy at risk
Almost half of the 815 million smart speakers operating across the world are reported to be putting their user’s privacy at risk- says a survey conducted by IDC. Yes, this is what was discovered when the International Data Corporation (IDC)…
State-sponsored Chinese cyberattack was much worse than reported earlier
Last year, a report emerged in the media that China bagged hacking group named APT10 launched a cyber-attack campaign known as “Cloud Hopper” on 8 of the global renowned Managed Service Providers (MSPs). It was revealed the hackers spied on…
China’s TikTok banned by US Army amid security concerns: Report
It comes as the social media video app releases its first transparency report. Advertise on IT Security News. Read the complete article: China’s TikTok banned by US Army amid security concerns: Report
Facebook Wants You To Share Your Personal Healthcare Data
The post Facebook Wants You To Share Your Personal Healthcare Data appeared first on Facecrooks. Last fall, Facebook announced that it was making a push into the healthcare industry, allowing users to opt into checkup reminders and personalized preventative healthcare…
Apple Will Keep Throttling iPhones With Old Batteries. Here’s How to Stop It
Apple Will Keep Throttling iPhones With Old Batteries. Here’s How to Stop It l33tdawg Thu, 01/02/2020 – 00:52 Advertise on IT Security News. Read the complete article: Apple Will Keep Throttling iPhones With Old Batteries. Here’s How to Stop…
California’s Privacy Law Goes Into Effect Today. Now What?
California’s Privacy Law Goes Into Effect Today. Now What? l33tdawg Thu, 01/02/2020 – 00:52 Advertise on IT Security News. Read the complete article: California’s Privacy Law Goes Into Effect Today. Now What?
Two months later: AirPods Pro versus Powerbeats Pro
Two months later: AirPods Pro versus Powerbeats Pro l33tdawg Thu, 01/02/2020 – 00:52 Advertise on IT Security News. Read the complete article: Two months later: AirPods Pro versus Powerbeats Pro
IT Security News Daily Summary 2020-01-01
Yeast-raised Apple Cider Doughnuts
Offspring #4 eats pretty healthy, normally, but likes to indulge in sugary confections on occasion. He was a big help clearing away the massive amount of snow that accumulated in the last winter storm of 2019 so I decided to…
“Nim httpclient/1.0.4”, (Wed, Jan 1st)
“Nim httpclient/1.0.4” is the default User Agent string of the httpClient module of the Nim programming language (stable release). Advertise on IT Security News. Read the complete article: “Nim httpclient/1.0.4”, (Wed, Jan 1st)
The Law and Consequences of the Recent Airstrikes in Iraq
The Law and Consequences of the Recent Airstrikes in Iraq Advertise on IT Security News. Read the complete article: The Law and Consequences of the Recent Airstrikes in Iraq
Mariah Carey ‘s Twitter Hacked on New Year’s Eve
Another celebrity was the victim of the hackers, Mariah Carey ‘s Twitter account appears to have been hacked on New Year’s Eve. The Twitter account of Mariah Carey was hacked on New Year’s Eve, attackers posted a series of offensive,…