2018/01/26

Babies’ personal data hawked on dark web | foodonia

The price puts the data records at a significant premium when compared to other stolen datasets. While, in general, many adverts in the dark recesses of the internet are fake, children’s personally identifiable information (PII) has for long been viewed as a particularly valuable commodity.

The post Babies’ personal data hawked on dark web appeared first on WeLiveSecurity



Brought by: http://foodonia.com

FriedEx: BitPaymer ransomware the work of Dridex authors | foodonia

In December 2017, we took a closer look at one of the FriedEx samples and almost instantly noticed the resemblance of the code to Dridex, thanks to our long-term research of its developments. Intrigued by the initial findings, we dug deep into the FriedEx samples.

The post FriedEx: BitPaymer ransomware the work of Dridex authors appeared first on WeLiveSecurity



Brought by: http://foodonia.com

Jail for man who hacked 1000 student email accounts in search for sexually explicit images | foodonia

A poorly-secured password reset utility allowed a man to access more than 1,000 email accounts at a New York City-area university in a hunt for sexually explicit photographs and videos.

The post Jail for man who hacked 1000 student email accounts in search for sexually explicit images appeared first on WeLiveSecurity



Brought by: http://foodonia.com

2018/01/25

How well can bug hunting pay? | foodonia

In some countries, the financial allure of looking for security vulnerabilities is (even) more striking, according to the findings of a survey released recently by bug bounty platform provider HackerOne.

The post How well can bug hunting pay? appeared first on WeLiveSecurity



Brought by: http://foodonia.com

Data Privacy vs. Data Protection: Reflections on Privacy Day and GDPR | foodonia

Data privacy is also a topic that can spark big debates, like the one between the US and the EU as to what protections should be accorded to data pertaining to people, specifically by those who collect, control, or process such data.

The post Data Privacy vs. Data Protection: Reflections on Privacy Day and GDPR appeared first on WeLiveSecurity



Brought by: http://foodonia.com

2018/01/24

10 Linux distributions recommended for 2018 | foodonia

The new features included all the patches, fixes, and updates to the tools and Kernel that were released over the preceding period, which is no small matter, especially if you use Maltego or SET.

The post 10 Linux distributions recommended for 2018 appeared first on WeLiveSecurity



Brought by: http://foodonia.com

2018/01/23

ESET’s guide makes it possible to peek into FinFisher | foodonia

To help malware analysts and security researchers overcome FinFisher’s advanced anti-disassembly obfuscation and virtualization features, ESET researchers have framed some clever tricks into a whitepaper, “ESET’s guide to deobfuscating and devirtualizing FinFisher”.

The post ESET’s guide makes it possible to peek into FinFisher appeared first on WeLiveSecurity



Brought by: http://foodonia.com

South Korea moves to ban anonymous cryptocurrency trading | foodonia

As part of the policy, underage individuals and foreigners without local bank accounts will be barred from trading in virtual currencies. Banks will be required to share information about cryptocurrency exchanges with each other.

The post South Korea moves to ban anonymous cryptocurrency trading appeared first on WeLiveSecurity



Brought by: http://foodonia.com

Five ways to check if your router is configured securely | foodonia

In a dynamic environment where threats continually evolve and new vulnerabilities are identified almost daily, it is necessary to use the most up-to-date security tools, since they deal with protection measures for new and ever-shifting attack vectors.

The post Five ways to check if your router is configured securely appeared first on WeLiveSecurity



Brought by: http://foodonia.com

2018/01/22

Up to 40,000 OnePlus customers potentially hit by credit card hack | foodonia

The breach put at risk ‘only’ the customers who entered their payment data on oneplus.net between the middle of November 2017 and January 11, 2018. Those who paid with previously saved credit card details or via PayPal are believed to be out of harm's way.

The post Up to 40,000 OnePlus customers potentially hit by credit card hack appeared first on WeLiveSecurity



Brought by: http://foodonia.com

World Economic Forum: Cyberthreats rising in prominence in global risk landscape | foodonia

The latest survey marks a shift from optimism regarding technological risks in the previous years. The heightened levels of worry come on the back of an escalation in cybersecurity threats, which, as noted by the WEF, are growing in prevalence and in disruptive potential alike.

The post World Economic Forum: Cyberthreats rising in prominence in global risk landscape appeared first on WeLiveSecurity



Brought by: http://foodonia.com

2018/01/19

Are mobile devices insecure by nature? | foodonia

It is no easy feat to recall going through life without the vast variety of mobile devices that are now part of our day-to-day. What is more, it is downright impossible to imagine a future without these devices. Recent times have been marked by a diversity of trends that revolve around flexibility and that have

The post Are mobile devices insecure by nature? appeared first on WeLiveSecurity



Brought by: http://foodonia.com

2018/01/18

CES 2018 cybersecurity: Now in every single ‘whatchamacallit’ | foodonia

Not content anymore to just have a bed made of soft plushy stuff, now you can adjust everything about the bed, from electronically sitting up in bed to the lighting surrounding your nap: connected digital technology everywhere.

The post CES 2018 cybersecurity: Now in every single ‘whatchamacallit’ appeared first on WeLiveSecurity



Brought by: http://foodonia.com

Trends 2018: Personal data in the new age of technology and legislation | foodonia

The depth of data collected from our online habits could easily allow profiles to be constructed, showing what may be considered extremely personal interests, drawing on information that we don’t realize someone is collecting.

The post Trends 2018: Personal data in the new age of technology and legislation appeared first on WeLiveSecurity



Brought by: http://foodonia.com

2018/01/17

Carphone Warehouse faces hefty fine for 2015 breach | foodonia

The attackers gained access to a range of customer data such as names, addresses, phone numbers, dates of birth, and marital status. Making matters worse, the historical payment card details of some 18,000 customers were also compromised.

The post Carphone Warehouse faces hefty fine for 2015 breach appeared first on WeLiveSecurity



Brought by: http://foodonia.com

CES 2018: Blockchain will solve everything | foodonia

The first obvious candidate was banking, a sector that has been hard at work trying to implement blockchain to secure the vast troves of digital transactions that happen every microsecond of every day.

The post CES 2018: Blockchain will solve everything appeared first on WeLiveSecurity



Brought by: http://foodonia.com

2018/01/15

CES: Why doesn’t everyone use VR already? | foodonia

One side effect of slower than expected uptake of VR is that virtual reality application developers have been slow to invest in creating content. In this sort of chicken-and-egg cycle, growth tends to be slow, not explosive.

The post CES: Why doesn’t everyone use VR already? appeared first on WeLiveSecurity



Brought by: http://foodonia.com

2018/01/10

Tank-traps versus trappings in virtual currencies: A cybersecurity minefield | foodonia

Bitcoin, the progenitor of the entire cryptocurrency boom and still the most popular virtual currency, experienced a truly heady run-up in value. Its price surge was punctuated with a crescendo midway through December, when a single bitcoin approached $20,000.

The post Tank-traps versus trappings in virtual currencies: A cybersecurity minefield appeared first on WeLiveSecurity



Brought by: http://foodonia.com

2018/01/08

MADIoT – The nightmare after XMAS (and Meltdown, and Spectre) | foodonia

It is not feasible, in fact not even possible, to replace all CPUs in all devices. It would be too costly, besides the success rate for unsoldering and resoldering pin-throughs in multi-layer boards will never be 100%.

The post MADIoT – The nightmare after XMAS (and Meltdown, and Spectre) appeared first on WeLiveSecurity



Brought by: http://foodonia.com

2018/01/05

Meltdown and Spectre CPU Vulnerabilities: What You Need to Know | foodonia

The first few days of 2018 have been filled with anxious discussions concerning a widespread and wide-ranging vulnerability in the architecture of processors based on Intel's Core architecture used in PCs for many years, and also affecting ARM processors commonly used in tablets and smartphones.

The post Meltdown and Spectre CPU Vulnerabilities: What You Need to Know appeared first on WeLiveSecurity



Brought by: http://foodonia.com

2018/01/03

Now is the best time to craft your breach response | foodonia

Taking time to think logically and deliberately about your assets can help you determine what needs to be secured. Preparing for the worst can help you see the best course of action to prevent those emergencies in the present.

The post Now is the best time to craft your breach response appeared first on WeLiveSecurity



Brought by: http://foodonia.com