Hackers broke into Tesla’s public cloud environment, gaining access to non-public Tesla data and stealing compute resources within the company’s Amazon Web Services (AWS) environment for cryptojacking, according to a new report from security firm RedLock. RedLock researchers immediately informed Tesla of the hack, and the vulnerabilities have been addressed, the report noted. The cybercriminals …
According to a report by software security company, Kaspersky Lab “Bitcoin” and “FIFA 2018” were the top spam and phishing topics used to scam online users in 2017. The company’s “Spam and phishing in 2017” report revealed that cybercriminals have, over the past 12 months, been following the global agenda and used hot topics to …
Through out the globe, companies are making preparations to comply with new European privacy regulations that take effect come May 2018, However security experts are worried that the changes being ushered in by the rush to adhere to the law may make it more difficult to track down cybercriminals and less likely that organizations will …
The official Winter Olympics website was taken offline after being hit by a cyber-attack, officials have confirmed. The site was affected just before the beginning of the opening ceremony in Pyeongchang, South Korea. TV and internet systems at the Games were also disrupted, though operations were restored about 12 hours later. However, a spokesman said …
Many government and other websites were hijacked to mine the cryptocurrency Monero on Sunday. A list of affected websites can be viewed here: Texthelp Browsealoud security issue The malicious code was first spotted by UK-based infosec consultant Scott Helme, and confirmed by The Register. He recommended webmasters try a technique called SRI – Subresource Integrity – …
A new strain of point-of-sale (PoS) malware is disguising itself as a LogMeIn service pack to hide the theft of customer data. On Thursday, Forcepoint researchers Robert Neumann and Luke Somerville said in a blog post that a new malware family, dubbed UDPoS, attempts to disguise itself as legitimate services to avoid detection while transferring …
Next week, American Enterprise Institute (AEI) will host an event on Capitol Hill about consumer security and the Internet of Things (IoT) with Sen. Edward Markey (D-MA) and Rep. Ted Lieu (D-CA). These lawmakers have drafted legislation that would create a “cyber shield” mark aimed at helping consumers identify IoT devices that “meet industry-leading cybersecurity …
Someone just posted what experts say is the source code for a core component of the iPhone’s operating system on GitHub, which could pave the way for hackers and security researchers to find vulnerabilities in iOS and make iPhone jailbreaks easier to achieve. The GitHub code is labeled “iBoot,” which is the part of iOS …
For long users have been warned of third-party Android apps might be hiding some malware as well. But your hyper-vigilant download habits should extend beyond your smartphone. You need to keep an eye on your desktop Chrome extensions as well. As with Android apps, though, Chrome extensions can sometimes hide malware or other scourges, even …
A new report states that China built and paid for the African Union’s computer network – but yet inserted a backdoor allowing it access to the continental organisation’s confidential information According to an in-depth and a stunning investigation by French newspaper Le Monde, in January 2017, the information technology unit at the African Union’s headquarters in Addis …