Ransomware Attackers Use Your Cloud Backups Against You
Backups are one of the most critical defense against programming ransomware. However, the copies must be properly configured, so the attackers do not use it against us.
Backups are one of the most critical defense against programming ransomware. However, the copies must be properly configured, so the attackers do not use it against us.
In the United Kingdom, personal data leaked that used free internet at Harlow Mill, Chelmsford, Colchester, Waltham Cross, Burnham, Norwich, and London Bridge railway stations. The database was on an unprotected Amazon Web Services server.
https://www.itproportal.com/news/thousands-of-uk-rail-passengers-have-user-data-leaked/
The cybercriminal operation created the Nemta Ransomware site to punish victims for not paying the ransom. It is supposed to scare us, make us guilty. It is widely known that if the fraudster’s strategy does not work, he will look for new ones, and each time he loses his time, which is essential to him. We should be firm and cooperate as a team, defending ourselves against cheaters. Most annoying a criminal is the rejection of his proposal, and submission to him does not exclude other attacks, even the same companies or cooperation. You have no guarantee !!!
The issue of pedestrian safety sharing the way with scooters is prevalent. It is a matter of concern, but it turns out that this is not the only problem with these devices. Engineers at the University of Texas at San Antonio looked at other aspects of this equipment, namely cybersecurity. It turns out that cybercriminals can carry out attacks on electric scooters, and their users, via GPS spoofing, can track them. The attacker can fool GPS and lead the user to a different location than he would like. Many weaknesses have noticed in current transport systems. Cybercriminals can potentially use them for many different purposes, from the theft of private user data, causing losses in a company providing vehicles to remote control of vehicle behavior. According to the researchers, they warn that e.g., communication between the smartphone and the scooter may be intercepted. People using these services provide very confidential information, data analysis makes it possible to get to know the routes followed by a given person, their place of residence, work, interests, getting information when and where they are. Therefore, researchers believe that companies that offer short-term vehicle rental services should focus not only on physical security but also on the security their users.
Check Point Research has launched a new encyclopedia of malware avoidance that allows insight into various methods of detecting malware.
The Japanese cybersecurity company Trend Micro has signed a scientific and technical cooperation agreement with the Kazakh security company T&T Security to support the government’s “Cyber Security Concept” initiative. The partnership aims to implement local security projects.
https://www.cisomag.com/japans-trend-micro-to-help-boost-cybersecurity-in-kazakhstan/
Attacks on the phone are viral and are not something new. However, researchers have noted that the range of ultrasound wave susceptibility can spread to many lites of a surface to activate voice recognition. By adding a second device, an attacker can access the phone’s response.
https://www.nextgov.com/ideas/2020/02/surfing-attacks-could-let-hackers-read-your-texts/163413/
Clearview AI’s face recognition company has informed its clients about a bad actor, who has infiltrated the entire client list, including law enforcement in the United States.
https://www.welivesecurity.com/2020/02/27/facial-recognition-company-clearviewai-data-breach/
Researchers from Ruhr University Bochum and New York University Abu Dhabi have discovered a vulnerability in the 4G LTE and 5G networks, the problem is characterized by the fact that hackers impersonate users on the system, as well as registration of paid subscriptions on behalf of payers.
https://thehackernews.com/2020/02/lte-network-4g-vulnerability.html