Infosecurity News
Fuze Fixes Recordings Privacy Bug
A vulnerability in the Fuze communications platform did not have sufficient controls to ensure that the recordings were kept private
ICO Fines E-Commerce Firm After SQLi Flaw
Building supplies vendor slapped with £55,000 fine
NSA Ends Upstream “About” Data Collection
Agency claims failure to comply with FISC rules was “inadvertent”
Intel Fixes Critical Nine-Year-Old Bug
Vulnerability affects AMT, SBT and ISM firmware
UK Plans to Scan All Attendees at the Champions League Final
Police in Britain will use facial recognition to run real-time comparisons with the mugshots of 500,000 “persons of interest."
IBM Ships Trojanized USBs to Storage Customers
The malware is a trojan dropper that can be used to fetch an array of secondary malware, including ransomware and espionage worms.
ShadowWali Malware Discovered, Attacking Japan Since 2015
ShadowWali gathers information about the compromised machines and their networks, in addition to stealing sensitive information and credentials.
"Orange is the New Black" Leaked, "New Girl", Others Could Follow
Netflix's "Orange is the New Black" was leaked due to a security breach at the streaming giant’s post-production studio.
Google and Facebook Confess to Being Corporate Scam Victims
Google and Facebook Confess to Being $100 million Corporate Scam Victims.
Bitcoin Value Rises to Over $1300
As the Bitcoin Value Rises to Over $1300, will this pay more to ransomware wielding cybercrminals?
Nomx Researchers Defend Work, Dispute Unfair Test Claims
Helme and Woodward defend research on nomx, as Donaldson claims testing was unfair and on old technology
Nearly Three-Quarters of UK Unis Are Phishing Victims
Duo Security stats reveal dangers of unsolicited emails
Hajime Botnet is Now 300,000-Strong
Researchers still bemused as to its purpose
Winners Crowned in DCMS Cyber Security Innovation Competition
On Thursday March 27, 20 small cybersecurity companies went head-to-head in the Cyber Security Innovation Competition, each pitching themselves for the opportunity to win one of 14 places to feature in the DCMS UK Cyber Innovation Zone at Infosecurity Europe 2017
Shadow Brokers Attack Tools Light Up Chinese and Russian Darknet
Hackers keen to exploit this treasure trove of data
NoTrove Threat Actor Emerges with Millions of Scam Ads
Ad scams can be used to download potentially unwanted programs and can redirect users to unwanted places.
Hyundai Mobile App Flaw Allows Bad Guys to Unlock and Start the Car
Bad actors can also access personal information, including the user's username, password, PIN and historical GPS data about the vehicle's location.
Orgs Leave Thousands of Sensitive Files Open to Employees
47% of organizations were found to have at least 1,000 sensitive files accessible to every employee.
Chipotle Reports Suspicious Activity on POS System
Chipotle has detected “unauthorized activity” on a network that supports its payment processing for purchases made at its restaurants
DNC Hacking Group Aims Sights at Macron
French presidential hopeful and German political groups targeted by Pawn Storm