NIST tests methods of recovering data from smashed smartphones

Credit to Author: John E Dunn| Date: Tue, 04 Feb 2020 12:54:30 +0000

Criminals have found to their cost that reducing a device to a pile of rubble means nothing if the internal chips are still in working order.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/DhhD2UVxfZU” height=”1″ width=”1″ alt=””/>

Read more

Come on, NSA, it’s time to join the fight against Windows hacking

Credit to Author: Preston Gralla| Date: Tue, 04 Feb 2020 03:00:00 -0800

It’s no secret that hackers the world over target Windows vulnerabilities in order to wreak havoc, hold up data and networks for ransom, pull off money-making scams, and disrupt elections and the workings of democracy. They target Windows for a simple reason: volume. The operating system is on the vast majority of desktop and laptop computers worldwide.

Over the years, the U.S. National Security Agency (NSA) has unwittingly helped hackers in some of the world’s most dangerous and notoriously successful attacks by developing tools to exploit Windows security holes, rather than alert Microsoft to those vulnerabilities. Some of the tools have been leaked to hackers and used in massive attacks, including the EternalBlue cyber-exploit, which was used in the WannaCry global ransomware attack that affected computers in more than 150 countries and is estimated to have caused billions of dollars in damage.

To read this article in full, please click here

Read more

Google’s Super Bowl ad will make you cry. Or wince.

Credit to Author: Lisa Vaas| Date: Tue, 04 Feb 2020 10:44:29 +0000

Google’s Super Bowl ad featured an elderly man’s voice as he asked Google Assistant to help him remember details about his late wife.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/a63Ljbmk14I” height=”1″ width=”1″ alt=””/>

Read more

A week in security (January 27 – February 2)

Credit to Author: Malwarebytes Labs| Date: Mon, 03 Feb 2020 19:00:50 +0000

A roundup of the previous week’s most interesting security news

Categories:

Tags:

(Read more…)

The post A week in security (January 27 – February 2) appeared first on Malwarebytes Labs.

Read more

Apple proposes simple security upgrade for SMS 2FA codes

Credit to Author: John E Dunn| Date: Mon, 03 Feb 2020 12:54:31 +0000

Apple thinks it’s come up with a simple way to make SMS two-factor authentication (2FA) one-time codes less susceptible to phishing attacks.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/EmuD8lIFjiU” height=”1″ width=”1″ alt=””/>

Read more

FTC warns VoIP providers that help robocallers: we can and will sue

Credit to Author: Lisa Vaas| Date: Mon, 03 Feb 2020 12:21:32 +0000

It put 19 internet-calling companies on notice that helping illegal robocalls is illegal. It has sued before, and it can do it again.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/WgDkr2jGNg4″ height=”1″ width=”1″ alt=””/>

Read more

Fraudsters posed as art dealer, bilked museum for millions

Credit to Author: Lisa Vaas| Date: Mon, 03 Feb 2020 11:26:24 +0000

Scammers got away with a $3.1m BEC heist, art dealer and museum blame each other, and ownership of a valuable landscape is up in the air.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/vWiUkpnODiM” height=”1″ width=”1″ alt=””/>

Read more

Google launches open-source security key project, OpenSK

Credit to Author: Danny Bradbury| Date: Mon, 03 Feb 2020 11:02:06 +0000

OpenSK is a piece of firmware that you can install on a USB dongle of your own, turning it into a usable FIDO or U2F key.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/ku-9LnVkKCo” height=”1″ width=”1″ alt=””/>

Read more

A sloppy click can exfiltrate your important data!

Credit to Author: Anant Pulgam| Date: Mon, 03 Feb 2020 09:17:12 +0000

Phishing email still remains one of the top malware propagation medium. Recently, we came across an interesting phishing email containing couple of Jumpshare links pointing to malicious components. Jumpshare is an online file sharing service and often cyber criminals abuse these kind of file sharing services. Upon clicking on one of the links in…

Read more