Chinese Firms Leak More Than A Half Billion Resumes

Chinese companies were discovered leaking more than half a billion resumes on the web via poorly secured ElasticSearch and MongoDB databases. The leaks occurred solely at Chinese firms over the last...
Continue reading
  59 Hits
  0 Comments
59 Hits
0 Comments

Focus Falls On Crypto's Flaws As Puzzlement Over Bitcoin's Jump Reigns

image
LONDON (Reuters) - Collective puzzlement has reigned among cryptocurrency analysts and traders since bitcoin’s dramatic jump on Tuesday, with the mysterious spike shedding harsh light on flaws in a market the...
Continue reading
  57 Hits
  0 Comments
57 Hits
0 Comments

Pharma Firm Bayer Hit With WINNTI Malware

image

The German drug manufacturer Bayer reported it was hit witha cyberattack launched from China that used WINNTI malware that resided on itsnetwork for at least one year. The company told Reuters...
Continue reading
  56 Hits
  0 Comments
56 Hits
0 Comments

How Excess Speed, Hasty Commands, And Flawed Software Doomed An Ethiopian Airlines 737 Max

image
PARIS/SEATTLE/SINGAPORE (Reuters) - Minutes after take-off, the pilots of an Ethiopian Airlines 737 MAX were caught in a bad situation. FILE PHOTO: Engine parts are seen at the scene of the...
Continue reading
  57 Hits
  0 Comments
57 Hits
0 Comments

Serious Apache Server Bug Gives Root To Baddies In Shared Environments

image
The Apache HTTP Server, the Internet’s most widely used Web server, just fixed a serious vulnerability that makes it possible for untrusted users or software to gain unfettered control of the...
Continue reading
  53 Hits
  0 Comments
53 Hits
0 Comments

Hackers Broke Into University Networks In Just Two Hours


Phishing attacks are on the rise ZDNet's Danny Palmer sits down with TechRepublic's Karen Roby to discuss the rising number of phishing attacks and preventative measures you need to be taking....
Continue reading
  48 Hits
  0 Comments
48 Hits
0 Comments

Computer Virus Alters Cancer Scan Images

Brain scan
Image copyright Science Photo Library Image caption The experimental malware could add fake tumours and other signs of disease to scans A computer virus that can add fake tumours to medical...
Continue reading
  50 Hits
  0 Comments
50 Hits
0 Comments

Nvidia Fixes 8 High-Severity Flaws

Original link
Continue reading
  53 Hits
  0 Comments
53 Hits
0 Comments

App Developers Left 540 Million Facebook Users' Records On The Public Internet

For your regular reminder that developers across the world sometimes have real trouble putting any sort of protection on their databases, third party companies left Facebook user data exposed to the...
Continue reading
  49 Hits
  0 Comments
49 Hits
0 Comments

Georgia Tech Stung With 1.3 Million Person Data Breach


Georgia Tech is reporting that it suffered a data breach when a Georgia Institute of Technology web app exposed the information on 1.3 million current and former students, student applicants along...
Continue reading
  46 Hits
  0 Comments
46 Hits
0 Comments

Mystery Of The Chinese Woman Who Allegedly Tried To Sneak Into Trump's Mar-A-Lago With A USB Stick Of Malware

wray
A Chinese woman was caught sneaking into President Trump's Mar-a-Lago country club with a thumb drive of malware, it was claimed yesterday. Yujing Zhang, 32, was collared after possibly trying to...
Continue reading
  47 Hits
  0 Comments
47 Hits
0 Comments

Games Of Thrones Has The Most Malware Of Any Pirated TV Show

game-of-thrones-hbo-4b902f096e63229ea93544f3b3a7ca3eccb8a408e371c6758f09ff9154686d17
HBO If you're not worried about breaking the law when you pirate Game of Thrones , then at least worry about breaking your computer. Security company Kaspersky has released a new...
Continue reading
  48 Hits
  0 Comments
48 Hits
0 Comments

This New Malware Is Scanning The Internet For Targets


Five hacking tools attackers use to target your data Free - but powerful - tools are being used by everyone ranging from cyber criminals to nation-state operators, says a report by...
Continue reading
  50 Hits
  0 Comments
50 Hits
0 Comments

Researchers Trick Tesla Autopilot Into Steering Into Oncoming Traffic

image
Researchers have devised a simple attack that might cause a Tesla to automatically steer into oncoming traffic under certain conditions. The proof-of-concept exploit works not by hacking into the car's onboard...
Continue reading
  12 Hits
  0 Comments
12 Hits
0 Comments

Study Maps Extensive Russian GPS Spoofing

Vladimir Putin at the Kerch Strait Bridge
Image copyright Getty Images Image caption Spoofed GPS signals were used during Vladimir Putin's visit to Crimea's Kerch Strait Bridge, the study said Russian President Vladimir Putin has a bubble of...
Continue reading
  48 Hits
  0 Comments
48 Hits
0 Comments

White House Overruled Security Clearance Denials

The Trump administration compelled security clearances for25 individuals previously denied by career officials, a whistleblower has told theHouse Committee on Oversight and Reform. Personnel Security Office Adjudications Manager Tricia Newbold, an...
Continue reading
  49 Hits
  0 Comments
49 Hits
0 Comments

Financial Apps Are Ripe For Exploit Via Reverse Engineering

Original link
Continue reading
  52 Hits
  0 Comments
52 Hits
0 Comments

What Is A Honeypot? A Trap For Catching Hackers

Honeypot definition A honeypot is a trap that an IT pro lays for a malicious hacker, hoping that they'll interact with it in a way that provides useful intelligence. It's one...
Continue reading
  51 Hits
  0 Comments
51 Hits
0 Comments

What Sony's Robot Dog Teaches Us About Biometric Data Privacy

image-from-ios

I'm watching Aibo, Sony's robo-dog, scuttle around the office. Its mechanical joints make slow, noisy work of it on the concrete floor, but I can't help but be mildly heart-warmed. I'd...
Continue reading
  51 Hits
  0 Comments
51 Hits
0 Comments

Malware May Have Stolen 2 Million Diners' Credit Card Details

Planet Hollywood and other signs in Times Square.Planet

Planet Hollywood customers who used a credit or debit card between May 2018 and March 2019 may have had their details stolen, the parent company said. Roberto Machado Noa/LightRocket via Getty...
Continue reading
  46 Hits
  0 Comments
46 Hits
0 Comments