Browsed by
Category: News

Researchers Uncover “Agent Tesla” Malware Abusing MS Office Vulnerabilities

Researchers Uncover “Agent Tesla” Malware Abusing MS Office Vulnerabilities

Security provider Quick Heal Security Labs have discovered malware that steals passwords codenamed “Tesla Agent.” Quick Heal has reformulated that hackers use vulnerabilities in MS Office titled CVE-2017-11882 and CVE-2017-8570, as well as double-extension archives.

https://www.cisomag.com/researchers-uncover-agent-tesla-malware-abusing-ms-office-vulnerabilities/

New Malware Jumps Air-Gapped Devices by Turning Power-Supplies into Speakers

New Malware Jumps Air-Gapped Devices by Turning Power-Supplies into Speakers

An Israeli researcher has demonstrated a new type of malware that can secretly steal sensitive data from systems. Studies show that electromagnetic channels, innovative acoustic quirks, hidden optical channels, even power cords can lead to data extraction from computers not connected to the network.

https://thehackernews.com/2020/05/air-gap-malware-power-speaker.html

Researchers Found Linking Biometrics and Device Identifiers Allows User Profiling

Researchers Found Linking Biometrics and Device Identifiers Allows User Profiling

It has long been said that biometric data and device identifiers are easily used to track users. Both parameters pose a threat to the privacy of users, but their combination becomes even more dangerous. Researchers provided detailed research on how combining physical biometric data, and device identifiers enable profiling. An identity leak between modes allows the opponent to collect user data and information.

https://latesthackingnews.com/2020/05/04/researchers-found-linking-biometrics-and-device-identifiers-allows-user-profiling/

What Are the Biggest Privacy Issues Associated with Big Data?

What Are the Biggest Privacy Issues Associated with Big Data?

Nowadays, new technological possibilities in the field of information technology and telecommunications greatly affect business models as well as by public administration. In particular, this applies to the development of mass data processing applications, usually referred to as big data. The collection and processing of personal data are some of the primary applications of such methods. It has significant social consequences when it comes to changing the view on privacy.

https://www.cybersecurity-insiders.com/what-are-the-biggest-privacy-issues-associated-with-big-data/

Targeted Phishing Attacks Successfully Hacked Top Executives At 150+ Companies

Targeted Phishing Attacks Successfully Hacked Top Executives At 150+ Companies

Many criminal groups have very effectively taken over many email accounts, at least 156 high-ranking officers in various companies in Germany, Great Britain, the Netherlands, Hong Kong, and Singapore. A new cyberattack campaign called ‘PerSwaysion,’ which used shared Microsoft files – Sway, SharePoint, and OneNote to conduct phishing attacks.

https://thehackernews.com/2020/04/targeted-phishing-attacks-successfully.html

Xiaomi is collecting browser data even in incognito mode, researchers say

Xiaomi is collecting browser data even in incognito mode, researchers say

Xiaomi browsers compromise our privacy. Researchers have found that two applications have accumulated over 15 million downloads from Google Play. It turns out that vast amounts of data from users visiting various sites were captured, even in incognito mode.

https://thenextweb.com/security/2020/05/01/xiaomi-is-collecting-browser-data-even-in-incognito-mode-researchers-say/

Zaha Hadid Architects Suffers a Ransomware Attack

Zaha Hadid Architects Suffers a Ransomware Attack

The British company Zaha Hadid Architects suffered a ransomware attack. The company’s internal data has been hacked and encrypted. Unfortunately, cybercriminals will be asking the ransom to disclose the data. The company has notified the police and will use internet forensics for data breaches.

https://www.cisomag.com/zaha-hadid-architects-suffers-a-ransomware-attack/