New Group of Hackers Targeting Businesses with Financially Motivated Cyber Attacks

Remote job: New Group of Hackers Targeting Businesses with Financially Motivated Cyber Attacks Security researchers have tracked down activities of a new group of financially-motivated hackers that are targeting several businesses and organizations in Germany, Italy, and the United States in an attempt to infect them with backdoor, banking Trojan, or ransomware malware. Though the new malware campaigns are not customized for each organization, the threat actors appear to be more Source: Hackernews Link: New Group of Hackers Targeting Businesses with Financially Motivated Cyber Attacks Continue reading New Group of Hackers Targeting Businesses with Financially Motivated Cyber Attacks

Qualcomm Chip Flaws Let Hackers Steal Private Data From Android Devices

Remote job: Qualcomm Chip Flaws Let Hackers Steal Private Data From Android Devices Hundreds of millions of devices, especially Android smartphones and tablets, using Qualcomm chipsets, are vulnerable to a new set of potentially serious vulnerabilities. According to a report cybersecurity firm CheckPoint shared with The Hacker News, the flaws could allow attackers to steal sensitive data stored in a secure area that is otherwise supposed to be the most protected part of a Source: Hackernews Link: Qualcomm Chip Flaws Let Hackers Steal Private Data From Android Devices Continue reading Qualcomm Chip Flaws Let Hackers Steal Private Data From Android Devices

Company Detected Years-Long Breach Only After Hacker Maxed Out Servers' Storage

Remote job: Company Detected Years-Long Breach Only After Hacker Maxed Out Servers' Storage What could be even worse than getting hacked? It’s the “failure to detect intrusions” that always results in huge losses to the organizations. Utah-based technology company InfoTrax Systems is the latest example of such a security blunder, as the company was breached more than 20 times from May 2014 until March 2016. What’s ironic is that the company detected the breach only after it received Source: Hackernews Link: Company Detected Years-Long Breach Only After Hacker Maxed Out Servers' Storage Continue reading Company Detected Years-Long Breach Only After Hacker Maxed Out Servers' Storage

4 Best Free Online Security Tools for SMEs in 2020

Remote job: 4 Best Free Online Security Tools for SMEs in 2020 Cyberattacks on small and midsized companies in 2019 cost $200,000 per company on average, mercilessly putting many of them out of business, says CNBC in its analysis of a recent Accenture report. In light of the global cybersecurity skills shortage, the number is set to soar in 2020. Solely in the UK, over 50,000 British SMEs could collapse next year following a cyberattack. This article Source: Hackernews Link: 4 Best Free Online Security Tools for SMEs in 2020 Continue reading 4 Best Free Online Security Tools for SMEs in 2020

New ZombieLoad v2 Attack Affects Intel's Latest Cascade Lake CPUs

Remote job: New ZombieLoad v2 Attack Affects Intel's Latest Cascade Lake CPUs Zombieload is back. This time a new variant (v2) of the data-leaking side-channel vulnerability also affects the most recent Intel CPUs, including the latest Cascade Lake, which are otherwise resistant against attacks like Meltdown, Foreshadow and other MDS variants (RIDL and Fallout). Initially discovered in May this year, ZombieLoad is one of the three novel types of microarchitectural data Source: Hackernews Link: New ZombieLoad v2 Attack Affects Intel's Latest Cascade Lake CPUs Continue reading New ZombieLoad v2 Attack Affects Intel's Latest Cascade Lake CPUs

The Comprehensive Compliance Guide (Get Assessment Templates)

Remote job: The Comprehensive Compliance Guide (Get Assessment Templates) Complying with cyber regulations forms a significant portion of the CISO’s responsibility. Compliance is, in fact, one of the major drivers in the purchase and implementation of new security products. But regulations come in multiple different colors and shapes – some are tailored to a specific vertical, while others are industry-agnostic. Some bare explicit consequences for failing to comply Source: Hackernews Link: The Comprehensive Compliance Guide (Get Assessment Templates) Continue reading The Comprehensive Compliance Guide (Get Assessment Templates)

Researchers Discover TPM-Fail Vulnerabilities Affecting Billions of Devices

Remote job: Researchers Discover TPM-Fail Vulnerabilities Affecting Billions of Devices A team of cybersecurity researchers today disclosed details of two new potentially serious CPU vulnerabilities that could allow attackers to retrieve cryptographic keys protected inside TPM chips manufactured by STMicroelectronics or firmware-based Intel TPMs. Trusted Platform Module (TPM) is a specialized hardware or firmware-based security solution that has been designed to store and protect Source: Hackernews Link: Researchers Discover TPM-Fail Vulnerabilities Affecting Billions of Devices Continue reading Researchers Discover TPM-Fail Vulnerabilities Affecting Billions of Devices

Is Facebook Secretly Accessing Your iPhone's Camera? Some Users Claimed

Remote job: Is Facebook Secretly Accessing Your iPhone's Camera? Some Users Claimed It appears that Facebook at the center of yet another issue involving privacy. Reportedly, multiple iPhone users have come forward on social media complaining that the Facebook app secretly activates their smartphone’s camera in the background while they scroll through their Facebook feeds or looking at the photos on the social network. As shown in the Twitter videos below, when users click Source: Hackernews Link: Is Facebook Secretly Accessing Your iPhone's Camera? Some Users Claimed Continue reading Is Facebook Secretly Accessing Your iPhone's Camera? Some Users Claimed

Hackers Breach ZoneAlarm's Forum Site — Outdated vBulletin to Blame

Remote job: Hackers Breach ZoneAlarm's Forum Site — Outdated vBulletin to Blame ZoneAlarm, an internet security software company owned by Israeli cybersecurity firm Check Point Technologies, has suffered a data breach exposing data of its discussion forum users, the company confirmed The Hacker News. With nearly 100 million downloads, ZoneAlarm offers antivirus software, firewall, and additional virus protection solutions to home PC users, small businesses, and mobile Source: Hackernews Link: Hackers Breach ZoneAlarm's Forum Site — Outdated vBulletin to Blame Continue reading Hackers Breach ZoneAlarm's Forum Site — Outdated vBulletin to Blame