News in brief: Berners-Lee warns on privacy; drone complaints up sharply; space researchers seek volunteers
Your daily round-up of some of the other stories in the news more…Code.org Hacked, Emails and Locations Data of Volunteers Compromised 33
An anonymous reader allegedly quoting an email from Code.org, claims that the database of the non-profit organization has been breached: Tags: Security more…Adware program Vonteera blocks security products with simple Windows UAC trick
A well-known adware program is preventing users from installing antivirus products by leveraging a Windows feature that was designed for security. The program, known as Vonteera, abuses the digital signature check performed by the Windows User Access Control (UAC) for executable files. UAC prompts users for confirmation whenever a program wants to make a system change […] more…Doing more with less: Steering a quantum path to improved internet security
New research may lead to greatly improved security of information transfer over the internet. Physicists have demonstrated the potential for ‘quantum steering’ to be used to enhance data security over long distances, discourage hackers and eavesdroppers and resolve issues of trust with communication devices. more…IBM to acquire endpoint security company Trusteer
IBM has signed an agreement to acquire security company Trusteer, and plans to set up a cybersecurity software lab in Israel. read more more…Helping Mom & Dad: Family Video Chats
Editor’s Note: This is the third in a series of articles about how we can help our elder parents get the most out of digital life—the ways we can help them look after their finances and health online, along with how they can use the internet to keep connected with friends and family, all safely […] more…The IRS “Dirty Dozen” – Top Tax Season Scams to Steer Clear of This Year
Who loves tax season besides accountants? Scammers. Emotions can run high during tax time. Even if you’re pretty sure you did everything right, you may still have a few doubts kicking around. Did I file correctly? Did I claim the right deductions? Will I get audited? As it turns out, these are the very same […] more…Helping Mom & Dad: Online Banking
Editor’s Note: This is the first in a series of articles about how we can help our elder parents get the most out of digital life—the ways we can help them look after their finances and health online, along with how they can use the internet to keep connected with friends and family, all safely […] more…Great R packages for data import, wrangling, and visualization
The table below shows my favorite go-to R packages for data import, wrangling, visualization and analysis — plus a few miscellaneous tasks tossed in. The package names in the table are clickable if you want more information. To find out more about a package once you’ve installed it, type help(package = "packagename") in your R […] more…SD-WAN Product Vulnerabilities Allow Hackers to Steer Traffic, Shut Down Networks
Researchers at cybersecurity consulting firm Realmode Labs have identified vulnerabilities in SD-WAN products from Silver Peak, Cisco, Citrix and VMware, including potentially serious flaws that can be exploited to steer traffic or completely shut down an organization’s network. read more more…Online Banking—Simple Steps to Protect Yourself from Bank Fraud
Online Banking—Simple Steps to Protect Yourself from Bank Fraud Even if you’re not big on online banking, online banking is big on you. Online banking is well on its way to becoming a cornerstone of the banking experience overall. More and more transactions occur over the internet rather than at a teller’s window, and nearly […] more…Legions of cybersecurity volunteers rally to protect hospitals during COVID-19 crisis
Last month, some of the usual cast of online scammers and malware miscreants promised to refrain from attacking healthcare organizations or exploiting them during the COVID-19 crisis, showing a sense of honor unexpected from ransomware attackers and cryptocurrency thieves. However, this ceasefire turned out to be a head-fake. Within a week of those vows, malware […] more…Less is More: 5 Ways to Jumpstart a ‘Digital Minimalist’ Mindset
Editor’s Note: This is part II of a series on Digital Minimalism in 2020. Is this the year you rethink and rebuild your relationship with technology? If so, embracing digital minimalism may be the most powerful way to achieve that goal. We learned last week in our first post on this series tht digital minimalism […] more…FIN6 Compromised E-commerce Platform via Magecart to Inject Credit Card Skimmers Into Thousands of Online Shops
We discovered that the online credit card skimming attack known as Magecart or E-Skimming was actively operating on 3,126 online shops. Our data shows that the attack started on September 7, 2019. All of the impacted online shops are hosted on the cloud platform of the e-commerce service provider “Volusion,” one of the top e-commerce […] more…Assessing the impact of protection from web miners
Brief summary: We present the results of evaluating the positive economic and environmental impact of blocking web miners with Kaspersky products. The total power saving can be calculated with known accuracy using the formula <w>·N, where <w> is the average value of the increase in power consumption of the user device during web mining, and […] more…How Visiting a Trusted Site Could Infect Your Employees
The Artful and Dangerous Dynamics of Watering Hole Attacks A group of researchers recently published findings of an exploitation of multiple iPhone vulnerabilities using websites to infect final targets. The key concept behind this type of attack is the use of trusted websites as an intermediate platform to attack others, and it’s defined as a watering hole […] more…More information
- US court rules warrant required for GPS tracking of vehicles
- Microsoft Windows Win32k Graphics CVE-2019-1468 Remote Code Execution Vulnerability
- Apple slams Justice Dept’s latest filing as "cheap shot"
- Racist "McDonald’s" notice posted on Facebook is designed to generate calls of complaint to KFC
- Today’s Connected Cars Vulnerable to Hacking, Malware
- Irish Regulator Probes Google, Tinder Over Data Processing
- Hackers target Windows Update in phishing attack
- Routers turned into zombie cryptojackers – is yours one of them?
- Cyber Insurance Firm Coalition Raises $205 Million at $3.5 Billion Valuation
- Lenovo admits to Superfish SNAFU, plans to release clean-up tool