Browsed by
Author: Greg Swiecicki

New Malware Jumps Air-Gapped Devices by Turning Power-Supplies into Speakers

New Malware Jumps Air-Gapped Devices by Turning Power-Supplies into Speakers

An Israeli researcher has demonstrated a new type of malware that can secretly steal sensitive data from systems. Studies show that electromagnetic channels, innovative acoustic quirks, hidden optical channels, even power cords can lead to data extraction from computers not connected to the network.

https://thehackernews.com/2020/05/air-gap-malware-power-speaker.html

Researchers Found Linking Biometrics and Device Identifiers Allows User Profiling

Researchers Found Linking Biometrics and Device Identifiers Allows User Profiling

It has long been said that biometric data and device identifiers are easily used to track users. Both parameters pose a threat to the privacy of users, but their combination becomes even more dangerous. Researchers provided detailed research on how combining physical biometric data, and device identifiers enable profiling. An identity leak between modes allows the opponent to collect user data and information.

https://latesthackingnews.com/2020/05/04/researchers-found-linking-biometrics-and-device-identifiers-allows-user-profiling/

What Are the Biggest Privacy Issues Associated with Big Data?

What Are the Biggest Privacy Issues Associated with Big Data?

Nowadays, new technological possibilities in the field of information technology and telecommunications greatly affect business models as well as by public administration. In particular, this applies to the development of mass data processing applications, usually referred to as big data. The collection and processing of personal data are some of the primary applications of such methods. It has significant social consequences when it comes to changing the view on privacy.

https://www.cybersecurity-insiders.com/what-are-the-biggest-privacy-issues-associated-with-big-data/

Targeted Phishing Attacks Successfully Hacked Top Executives At 150+ Companies

Targeted Phishing Attacks Successfully Hacked Top Executives At 150+ Companies

Many criminal groups have very effectively taken over many email accounts, at least 156 high-ranking officers in various companies in Germany, Great Britain, the Netherlands, Hong Kong, and Singapore. A new cyberattack campaign called ‘PerSwaysion,’ which used shared Microsoft files – Sway, SharePoint, and OneNote to conduct phishing attacks.

https://thehackernews.com/2020/04/targeted-phishing-attacks-successfully.html

Xiaomi is collecting browser data even in incognito mode, researchers say

Xiaomi is collecting browser data even in incognito mode, researchers say

Xiaomi browsers compromise our privacy. Researchers have found that two applications have accumulated over 15 million downloads from Google Play. It turns out that vast amounts of data from users visiting various sites were captured, even in incognito mode.

https://thenextweb.com/security/2020/05/01/xiaomi-is-collecting-browser-data-even-in-incognito-mode-researchers-say/

Marble Machine

Marble Machine

A fantastic instrument that fascinated me is the work of Swedish musician Martin Mol. The sound that comes out of the machine, thanks to two thousand steel balls, gives a remarkable effect. The sound coming out of the vibraphone, bass, drums, cymbals, and many other instruments included in it was enclosed in one machine. The steel balls set in motion allow you to play all of these instruments at the same time.

Zaha Hadid Architects Suffers a Ransomware Attack

Zaha Hadid Architects Suffers a Ransomware Attack

The British company Zaha Hadid Architects suffered a ransomware attack. The company’s internal data has been hacked and encrypted. Unfortunately, cybercriminals will be asking the ransom to disclose the data. The company has notified the police and will use internet forensics for data breaches.

https://www.cisomag.com/zaha-hadid-architects-suffers-a-ransomware-attack/

Salt peppered with holes? Automation tool vulnerable to auth bypass: Patch now

Salt peppered with holes? Automation tool vulnerable to auth bypass: Patch now

The Salt configuration tool patched two vulnerabilities, through which it was easy to expose the Salt installation to the full control of the attacker. The patch has been released, but unfortunately the systems are not automatic updates so they may still be vulnerable.

https://www.theregister.co.uk/2020/04/30/salt_automation_tool_vulnerable_to/

Evolution of Laptops

Evolution of Laptops

Today, for the most part, we are creating a portable computer, not to mention similar devices in a desktop version, as something that has always accompanied us. Some even consider them to be obsolete, more and more often using mainly or even only tablets or smartphones. Let’s go back over the decades and see what the beginnings of the history of laptops looked like.