Security News > 2020 > August

As the world descends into madness, it's good to see some things never change: Monthly Android patches
2020-08-04 20:15

Google has emitted the August edition of its Android software security updates. Three such vulnerabilities were patched in the Media Framework, two in the Android System files and two in Framework.

Why multi-factor authentication should be set up for all your services and devices
2020-08-04 19:56

More than ever, now is the time to make absolutely sure that your services and devices are using the best protection available to keep data secured and away from unauthorized hands. There are too many services to possibly list, but some of the most commonly targeted ones include email, banking, and shopping sites.

GreyNoise Raises $4.8 Million in Seed Funding to Combat Alert Fatigue
2020-08-04 18:35

GreyNoise Intelligence, a startup focused on helping security teams reduce alert fatigue, has raised nearly $5 million in seed investment to help the company expand its intelligence service that helps teams "Prioritize alerts that matter by quieting ones that don't." Using hundreds of nodes around the internet, the company collects, analyzes and labels mass internet scan and attack activity into a feed of what it calls "Anti-Threat Intelligence".

Tampa Teenager Accused in Twitter Hack Pleads Not Guilty
2020-08-04 18:35

A Florida teen identified as the mastermind of a scheme that gained control of Twitter accounts of prominent politicians, celebrities and technology moguls pleaded not guilty on Tuesday to multiple counts of fraud. Graham Ivan Clark, 17, is accused of using the hijacked Twitter accounts to scam people around the world out of more than $100,000 in Bitcoin.

Google Patches Over 50 Vulnerabilities in Android With August 2020 Updates
2020-08-04 18:24

Google on Monday announced the August 2020 security updates for the Android operating system, with patches for a total of more than 50 vulnerabilities. The 2020-08-01 security patch level addresses 14 high-severity vulnerabilities in the Framework, Media Framework, and System components.

Newsletter WordPress Plugin Opens Door to Site Takeover
2020-08-04 18:11

Newsletter, a WordPress plugin with more than 300,000 installations, has a pair of vulnerabilities that could lead to code-execution and even site takeover. The Newsletter plugin offers site admins a visual editor that can be used to create newsletters and email campaigns from within WordPress.

They say the tooth will set you free... so Brit dentist trade union tells members: 'Bad news – we've been hacked'
2020-08-04 16:32

The trade union's servers were breached at the end of July, knocking out its website on the 30th as BDA personnel scratched their heads. Trade news site Dentistry Online reported BDA chief exec Martin Woodrow as saying: "As we attempted to restore services, it became clear hackers had accessed our systems."

Google and Amazon most impersonated brands in phishing attacks
2020-08-04 16:30

Phishing attacks typically try to lure in victims by impersonating well-known companies, brands, and products. Released on Tuesday, Check Point's "Brand Phishing Report for Q2 2020" found that Google and Amazon were the most impersonated brands last quarter, each accounting for 13% of the brand phishing campaigns analyzed.

Microsoft Paid Out Nearly $14 Million via Bug Bounty Programs in Past Year
2020-08-04 16:08

Microsoft reported on Tuesday that it paid out roughly $13.7 million through its bug bounty programs between July 1, 2019, and June 30, 2020. The tech giant runs 15 bug bounty programs, which 327 researchers used in the past year to report 1,226 eligible vulnerabilities.

Twitter Could Face $250M FTC Fine Over Improper Data Use
2020-08-04 14:46

Twitter may be facing a Federal Trade Commission fine of up to $250 million, after the social media giant last year revealed the improper use of users' email addresses and phone numbers. In its October 2019 notice about the improper data use, Twitter explained that it had matched its users to advertisers' marketing lists based on the email or phone number the Twitter account holder provided during two-factor authentication.