Hacker breach Tesla public cloud environment, Make away with ‘non-public’ company data

Hackers broke into Tesla’s public cloud environment, gaining access to non-public Tesla data and stealing compute resources within the company’s Amazon Web Services (AWS) environment for cryptojacking, according to a new report from security firm RedLock. RedLock researchers immediately informed Tesla of the hack, and the vulnerabilities have been addressed, the report noted. The cybercriminals …

Kaspersky Lab: Spam and Phishing in 2017 Lists Bitcoin and FIFA 2018 as top new scams

According to a report by software security company, Kaspersky Lab “Bitcoin” and “FIFA 2018” were the top spam and phishing topics used to scam online users in 2017. The company’s “Spam and phishing in 2017” report revealed that cybercriminals have, over the past 12 months, been following the global agenda and used hot topics to …

Thousands of websites hijacked by cryptocurrency mining kits

Many government and other websites were hijacked to mine the cryptocurrency Monero on Sunday. A list of affected websites can be viewed here: Texthelp Browsealoud security issue The malicious code was first spotted by UK-based infosec consultant Scott Helme, and confirmed by The Register. He recommended webmasters try a technique called SRI – Subresource Integrity – …

Talk on Government’s role in securing IoTs to be hosted by AEI at Capitol Hill

Next week, American Enterprise Institute (AEI) will host an event on Capitol Hill about consumer security and the Internet of Things (IoT) with Sen. Edward Markey (D-MA) and Rep. Ted Lieu (D-CA). These lawmakers have drafted legislation that would create a “cyber shield” mark aimed at helping consumers identify IoT devices that “meet industry-leading cybersecurity …

Source code for iBoot a critical iOS programs anonymously leaked on GitHub

Someone just posted what experts say is the source code for a core component of the iPhone’s operating system on GitHub, which could pave the way for hackers and security researchers to find vulnerabilities in iOS and make iPhone jailbreaks easier to achieve. The GitHub code is labeled “iBoot,” which is the part of iOS …

Warning of Chrome Extensions that are Malware infested

For long users have been warned of third-party Android apps might be hiding some malware as well. But your hyper-vigilant download habits should extend beyond your smartphone. You need to keep an eye on your desktop Chrome extensions as well. As with Android apps, though, Chrome extensions can sometimes hide malware or other scourges, even …

Did China spy on the African Union’s Headquarters computers?

A new report states that China built and paid for the African Union’s computer network – but yet inserted a backdoor allowing it access to the continental organisation’s confidential information According to an in-depth and a stunning investigation by French newspaper Le Monde, in January 2017, the information technology unit at the African Union’s headquarters in Addis …