Security News > 2020

Ireland's Privacy Watchdog Probing Google's Data Use
2020-02-05 18:03

Ireland's Data Protection Commission is launching an investigation into how Google uses customer data for its location services after the privacy watchdog received numerous complaints from consumer rights organizations across the European Union. The watchdog announced Tuesday that it has initiated an investigation into how Google's Ireland subsidiary, Google Ireland Limited, processes its customer location data and if the company is following rules and guidelines in accordance with the European Union's General Data Protection Regulation.

Oh ****... Sudo has a 'make anyone root' bug that needs to be patched – if you're unlucky enough to enable pwfeedback
2020-02-05 18:02

Sudo is included in macOS, but this option was not enabled when we tried it on our Catalina box. If sudo is installed and vulnerable, any user can trigger the vulnerability, even if not listed in the sudoers list of those with sudo privileges.

Coronavirus “safety measures” email is a phishing scam
2020-02-05 17:51

Sadly, cybercrooks love a crisis, because it gives them a believable reason to contact you with a phishing scam. Of course, if you put in your email address or your password and click through, you'll be submitting the filled-in web form to the crooks.

PayPal SMS scams – don’t fall for them!
2020-02-05 17:39

Crooks almost certainly can't get hold of a server name that ends with, say, paypal DOT com, but can create any number of subdomains that start with paypal DOT and end with some unrelated domain. The suspicious-looking right-hand end of a full domain name often ends up invisible on a mobile phone because it won't fit in the address bar.

WhatsApp Bug Allows Malicious Code-Injection, One-Click RCE
2020-02-05 16:50

Security researchers have identified a JavaScript vulnerability in the WhatsApp desktop platform that could allow cybercriminals to spread malware, phishing or ransomware campaigns through notification messages that appear completely normal to unsuspecting users. "Exploiting the vulnerability requires the victim to click a link preview from a specially crafted text message."

They can't collect your bins or fix your roads. They let Google stalk visitors to their websites. Yes, it's UK local government
2020-02-05 16:45

The study [PDF] shows that nearly all councils across the UK exposed data about visitors to their websites, which was then sold on to private companies. These elements enable users to be tracked around the web, scraping together whatever information it can, such as what websites and apps they're looking at, their location and their device.

Australian Delivery Firm Confirms Ransomware Attack
2020-02-05 16:33

Australian transportation and logistics firm Toll Group has confirmed that it sustained a ransomware attack earlier this month that forced to company to shut down several systems and led to delays in deliveries across the country. While Toll Group continues to recover from the ransomware attack that started Jan. 31, the firm has now deliberately shut down several systems, including customer-facing applications, as a precautionary measure to ensure that the malware does not spread, according to a statement released Tuesday.

Leidos Buys L3Harris Security and Automation Business for $1 Billion
2020-02-05 16:15

Reston, VA-based Leidos Holdings has announced a definitive agreement to buy the airport security and automation businesses from UK-based L3Harris for $1 billion in cash. "The agreement provides a stable path forward for the Security & Detection Systems and MacDonald Humfrey Automation businesses, while enabling L3Harris to focus its resources on core technologies," said William Brown, chairman and CEO at L3Harris.

Cisco Discovery Protocol Flaws Expose Tens of Millions of Devices to Attacks
2020-02-05 16:10

Tens of millions of Cisco devices deployed in enterprise environments are exposed to attacks due to vulnerabilities identified by researchers in a proprietary discovery protocol they all use. The problematic protocol is the Cisco Discovery Protocol, a Layer 2 network protocol used to obtain information about Cisco devices present on the local network.

Critical Cisco ‘CDPwn’ Protocol Flaws Explained: Podcast
2020-02-05 16:00

Researchers on Wednesday disclosed five critical vulnerabilities in Cisco Discovery Protocol, the Cisco Proprietary Layer 2 network protocol that is used to discover information about locally attached Cisco equipment. Every device, Cisco device, sends packets from time to time saying, 'Hi, my IP address is this, My name is this, my operating system is this' and all kinds of information and they collect the Cisco devices' information about one another, about their neighbors.