Data Security: Hot Stories

Search Result in All Fields - Top 20 Stories

 Search Stories
Hot Words
Key Words
In Field



 Search Result in All Fields - Top 20 Stories
Facebook Confirms Hackers Steal Data of Millions of Users
Facebook said that 50 million users were affected in recent hacking at first time, but now shrink to 30 million as the final number. Is it a good news? I don't think so. The positive point is Facebook has now confirmed that actually over 29 million users were in hackers' hands. What we can is to expect Facebook, the great company can do right things to protect our privacy, if our data aren't in that 30 millions in luck. There is a list showing what your information may be stolen...
By Anmol  View Source  
Staffer Accused of Sneaking Into Computers of Senator Office
A Democratic staffer was accused to enter Republican senators' office and tried to use one of their computers, police said in an affidavit made public Thursday. This guy stands accused of a number of federal and local crimes for posted personal information of senators, like addresses and telephone, to their Wikipedia pages over the last couple of weeks. This privacy leak wasn't done high technology hackers, but a junior staff. A simper password or screen protection may stop the leaking...
By Stephen Dinan  View Source  
UK Conservative Party conference App Leaks MP Personal Details
Some phone numbers and email addresses for high-profile British MPs were shared on Twitter, and a few of them even received prank calls and messages. This data lead was due to a mobile conferencing app for the UK's Conservative Party. When things is related to security, you must get qualified guys to do, otherwise you take a risk of privacy sharing on Twitter or Facebook, especially your privacy is interesting in public...
By Catalin Cimpanu  View Source  
White House Confirmed Attack On Office of Personnel Management
White House confirmed this week that China carried out the cyber attack on the OPM (Office of Personnel Management) and risk more than 22 million sensitive records on American government officials. Bolton disclosed the Chinese hacking in unveiling the Trump's new cyber strategy, which focuses on security efforts to a aggressive stance against cyber attacks. China has been the most aggressive part in cyber espionage and is also the main source to hack personal privacy...
By Bill Gertz  View Source  
US State Department Reveals Data Breach Employee Information Exposed
Trump once said he wrote important things on papers. He seems distrust modern information technology to protect privacy. The new accident in the US State Department, which has confirmed a data breach through its email system, lets the president win again. The latest new revealed that a compromised email system leaked, and 1% employees' personally identifiable information(PII) have been exposed. Because, these are sort of personal data, the security notice was marked "Sensitive but Unclassified." The hacker may want to get more ...
By Charlie Osborne  View Source  
Mac App Store Apps Caught Stealing and Uploading Browser History
A distributor called Trend Micro, which is linked to a solid information security brand, published some apps, e.g. Dr. Cleaner, are found collect and upload browser history form your mac by multiple research groups. Although the malware have been gotten rid of the App Store, and industry are discussing how the Apple exposes users that trust the store fully to the risk, common consumers must learn from the story: no brand deserves our full trust and the free stuffs probably equal to baits...
By Guilherme Rambo  View Source  
Fortnite Installer May Lead Malware To Android Devices
Download game possibly opens a door for malware, which may be a root of tons of troubles. Fortnite Installer may risk your device's Android by malware attacking. That's because Fortnite isn't available through Google's Play Store, instead it chose an unorthodox route for the game's fans. It means fans have to face more dangers in nature. Google Play Store should be more helpful to popularize an online game, it a right place for Fortnite, Android, and fans. This security issue may cause something changed in future...
By ALFRED NG  View Source  
Cambodia Strongman Extends 33-Year Rule in Boycotted Election
An election described as neither free nor fair in Cambodia is discussing widely. Some international factors are uncovered to impact the small country's election. Hackers from China is one of them. This month, U.S. cyber security firm FireEye said it found evidence of hackers sourced from Hainan infiltrating computer systems belonging to Cambodia’s opposition leaders and the media. Private emails and documents were stolen and fake news were targeted to particular audience...
By Philip Heijmans  View Source  
Guessing Who is Stealing Your Data
Alaskan Governor Bill Walker and come companies are confused by their cybersecurity vendor Recorded Future, which reported that computers of Tsinghua University were targeting some systems of Alaskan. Can you imagine a top university wet its feet in such a dirt business? Tsinghua University possibly is victim too, or say hackers use its computers or IPs to attack third parties. However, up to now this university didn't give a positive answer, pretended nothing happened. How is stealing data? Hopefully not professors...
By Reuters  View Source  
Foreshadow attack affects Intel chips
This is third time this year Intel chips are discovered security flaw, code as Foreshadow. Researchers from at least 3 organisations reported a crucial risk that was proved by Intel quickly. To avoid possible attack, Intel did a hot fix to key consumers, like the biggest cloud services companies - Amazon, Google and Microsoft. Personal users are advised to download and install any software updates available...
By Dave Lee  View Source  
You Know Who’s Cyber Hacking Getting Ugly
This was a report of 5 years ago. Today we even cannot list its original title. It's not a concern of copyright, instead, it will add risk to be targeted as victim of cyber attack. In fact, the report is quit fair, not just point a finger to particular country or countries. It shows that America is not an innocent in the world of cyber-spying. It hints the real threat is most of victims give up fighting with dark forces so that cyber hacking is a low risk and high profit industry. 5 years passed, thing is even worse, we have to use "you know who" ...
By The Economist  View Source  
Destructive Ransomware Has Made Crooks 6M
This destructive ransomware, called as SamSam, has made crooks $6m by encrypting data. The attackers who run the ransomware show no signs of giving up. These guys are taking $300,000 a month in ransom from victims, the total is more than 6 millions since late 2015. The malware encrypts your files for ransom similar as other ransomware to make profit. The difference is while other variants are spammed out to potential victims by email, SamSam attacks are thought to begin with a remote desktop protocol...
By Danny Palmer  View Source  
2018 Data Breach Investigations Report
In reality, nearly 81% of data breaches are facilitated by weak, reused or stolen passwords. When we talk about data secure, the key point should be how to make a strong password and how to keep it safe. This report uncover some new investigation 2018. If you once doubted the importance of password, the key role of data secure. The report may be deserved to have a look. If you leave a password on a sticky note, it gives attackers the chance to take keys and it’s an entirely avoidable risk with devastating cost.
By Verizon Enterprise  View Source  
Did You Update Twitter Password That May Be Leaked
Twitter masks passwords through a process called hashing using a function known as bcrypt, which replaces the actual password with a random set of numbers and letters that are stored in Twitter’s system. Due to a bug, passwords were written to an internal log before completing the hashing process. Twitter itself found this error, removed the passwords & are implementing plans to prevent this bug from happening again. In the meantime, Twitter is asking 300+ Million users to change their passwords. Did you do it?
By Chaim Gartenberg  View Source  
Malware Brick Wi-Fi Routers To Hit 500K Devices
The FBI recommends that everyone with a small office and home office router or NAS device reboot them immediately.Wi-Fi Routers are new object of hackers, but the victim isn't limited to router. More than 5ook devices are infected by a router-bricking malware. Reboot devices will temporarily eliminate the second stage malware and lead the first stage malware to call out for instructions. Labs of FBI and the Justice Department disclose more details regrading to the malware...
By Michael Kan  View Source  
Lastpass - The Best Way to Manage Online Passwords
As a leading password manager, its first priority is safeguarding your data. It relies on strong encryption algorithms, AES-256 bit encryption with PBKDF2 SHA-256, to ensure complete security in the cloud. You create an account with an email address and a strong master password to locally-generate a unique encryption key. Your data is encrypted and decrypted at the device level. In other words your master password and the keys are never sent to LastPass’ servers. It also offers Two-factor authentication ...
By Anne Yang  View Source  
Step by Step for TWO-FACTOR AUTHENTICATION
Traditional, but not so secure way to login to your bank accounts: enter your username and familiar password for most of your online accounts. Not so fast! If you're one of the folks, who use five or fewer passwords online, you are in hacker's dish because they easily take down multiple accounts just by cracking one password. There's a new and handy way to better protect you data with multi-factor authentication (MFA). You can view step-by-step instructions for enabling it for all your accounts...
By Kim Trump  View Source  
7 Clear-Cut Signs Tell You Hackers in Your Computer
Smart hackers isn't easy to be uncovered, who enter your device, steal everything they want, and leave without trace. However every walk has to leave footprint, even if it's very light, but not nothing. Ordinary people usually haven't strong idea to detect hackers. Computers, phones, mobiles, and down to the innocent webcam are all weak to cyber-criminals. So what if they've already broken in, here are 7 clear-cut signs that you've been hacked. Never miss them...
By Kim Komando  View Source  
Two Hackers Have Found How to Break into Hotel-Room Locks
When you read a story talking about security vulnerability that may risk millions of hotel rooms, never think it's just a story. Your and your family's privacy may leak from these rooms if only you have chance to stop hotels. A ridiculous case was as early as 2003, 15 years ago, an guy in a a hacking conference in Berlin found his laptop was stolen and there was no evidence of force entry. Yes, his room's keycard-operated lock got hacked. As a matter of fact, hacker are much stronger than that age, no hotel room is safe now...
By Gulliver  View Source  
Artificial Intelligence is Helping Bosses Spy You
You may not read every word of your employment contact before signing. At AI era, the file probably includes new articles related to your privacy. When you get the job, it means you consents to sort of surveillance by modern IT or AI technology. For example, Amazon has patented a wristband that tracks the hand movements of workers; Workday, a software firm, crunches around 60 factors to predict which employees will leave. Your boss can know you more than yourself...
By The Economist  View Source