Researchers discover a new Spectre-like ‘Spoiler’ Intel CPU Vulnerability

Summary: All of Intel’s Core CPUs are susceptible to cyber attacks exploiting flaws in their speculative execution capabilities, has revealed.  Intel processors are vulnerable to an attack, nicknamed Spoiler, to which AMD processors are immune according to new research paper [PDF] at the Worcester Polytechnic Institute and the University of Lübeck. Intel will not be able …

Watch out for your Un-Renewed domain, Scammers Might use it to Steal Credit Cards

KrebsOnSecurity is reporting on a new scam that used unrenewed domains to scam credit cards. If you own a domain name that gets decent traffic and you fail to pay its annual renewal fee, chances are this mistake will be costly for you and for others. Lately, neglected domains have been getting scooped up by …

Stolen private messages thousands of Facebook accounts are being sold

Hackers appear to have compromised and published private messages from at least 81,000 Facebook users’ accounts. In the latest report, the data trove was discovered by the BBC, who found an ad for the sale of details on 120million Facebook accounts. Hackers were selling access for $0.10 per account – that’s about 8p. The ad, …

Regulator implored to probe Android apps advertising to preschoolers

Several children’s apps on Google’s app store have been found to inappropriately lure youngsters to watch ads or make purchases, according to a pair of consumer groups that cited a new study in calling for an investigation by federal authorities. “Popular apps for preschoolers are rife with marketing,” Josh Golin, executive director of Campaign for …

Cryptomining Is Overtaking Ransomware as Most Popular Cybercrime Malware

Skybox® Security, a global leader in cybersecurity management, announced today the release of its mid-year update to the Vulnerability and Threat Trends Report which analyzes vulnerabilities, exploits and threats in play. The report, compiled by the team of security analysts at the Skybox® Research Lab, aims to help organizations align their security strategy with the reality …

It’s horrifically official, FCC repeal signals the death of Net Neutrality

It’s official. The Federal Communications Commission (FCC)’s repeal of net neutrality rules, which had required internet service providers to offer equal access to all web content, took effect on Monday. The rules which were enacted during the President Barack Obama era in 2015, prohibited internet providers from charging more for certain content or from giving …

Apple bans cryptocurrency mining on iPhone

Phone maker Apple has updated its developer guidelines to explicitly ban “mining” cryptocurrencies like bitcoin. The new rules restrict apps that drain battery, generate excessive heat, or put unnecessary strain on device resources — all of which take place in bitcoin mining. “Apps, including any third party advertisements displayed within them, may not run unrelated …

New iOS 11.4 may make it harder to extract data from stolen or seized iPhones

Digital forensics software firm Elcomsoft researchers have discovered an interesting security feature that’s slated to become available in the next version of iOS; and could make it harder to extract data from your stolen or seized iPhone. It’s called USB Restricted Mode, and it basically locks down the data connection over the Lightning port one …