Security News
Emerging technologies being adopted by cities - like facial recognition, smart-city technologies like smart lighting, and 5G-driven IoT - are opening up municipalities to even more security and privacy threats. Tara Seals: So I wanted to talk to you a little bit about smart cities and municipalities in general and some of the security threats that they're facing.
In a RSA 2020 simulation, the Red Team compromised email accounts, created deepfake videos and spread disinformation on Election Day in Adversaria. At RSA 2020, Cybereason assembled a group of journalists and other conference attendees to be the Red Team, in charge of creating just enough chaos to cause residents of the fictional city Adversaria to doubt the results of the election.
The FBI on Friday arrested a man linked to former U.S. Rep. Katie Hill's 2018 House campaign for allegedly orchestrating a series of cyberattacks on a rival candidate that shut down the campaign's website for 21 hours. The U.S. Attorney's Office in Los Angeles said Arthur Jan Dam, 32, of Santa Monica, California, surrendered and was taken into custody on a complaint that says his computer attacks in April and May 2018 cut off campaign donations for Democrat Bryan Caforio and contributed to his narrow loss to Hill in the primary election.
Following several recent reports of hackers gaining access to people's internet-connected Ring doorbell and security cameras, Amazon yesterday announced to make two-factor authentication security feature mandatory for all Ring users. Until now, enabling the two-factor authentication in Ring devices was optional, which definitely would have prevented most Ring hacks, but of course, many never bothered to enable it.
Following several recent reports of hackers gaining access to people's internet-connected Ring doorbell and security cameras, Amazon yesterday announced to make two-factor authentication security feature mandatory for all Ring users. Until now, enabling the two-factor authentication in Ring devices was optional, which definitely would have prevented most Ring hacks, but of course, many never bothered to enable it.
The new requirement comes after Ring faced a backlash in December following a rash of disturbing hacks and security issues tied to the smart doorbell. While Amazon-owned Ring offered 2FA as an option to customers before, now the second layer of verification will be mandatory to all users.
Obviously, these romance scams work obviously, but you know, whenever I see these types of messages in my Twitter inbox or even just on Facebook, because I see them a lot on social media. It's social engineering at its finest and I you know, never ceases to amaze me actually how good cyber criminals are sort of taking the pulse of what's going on out thereAnd definitely things like Valentine's Day where you know, people are going to be feeling a little vulnerable maybe or, or maybe they're you know, elated because they're in a new relationship or something and they're not paying as much attention as they should be.
Austria's foreign ministry has said a weeks-long cyber attack from a "State actor" against its systems has ended - amid local reports that pin the blame on a Russian hacking crew and its initial four-byte payload. The attack, which was announced to burghers of the state on a 4th January, was aimed at the ministry's IT infrastructure, according to local reports. Foreign minister Alexander Schallenberg said the attack had been ended, adding: "We managed to clean up our IT systems." He claimed that "No damage to the IT equipment could be detected".
The latest edition of the ISMG Security Report analyzes the indictments of four Chinese military officers in connection with the 2017 Equifax data breach. Also featured: Advice on implementing...
A trio of boffins at Singapore University this week disclosed 12 security vulnerabilities affecting the Bluetooth Low Energy SDKs offered by seven system-on-a-chip vendors. "SWEYNTOOTH potentially affects IoT products in appliances such as smart-homes, wearables and environmental tracking or sensing," explain Matheus E. Garbelini, Sudipta Chattopadhyay, and Chundong Wang, in a research paper [PDF] describing the BLE bugs.