What is your personal info worth to criminals? There’s a dark web market price index for that

Your entire online identity could be worth little more than £800, according to brand new research into the illicit sale of stolen personal info on the dark web (or just $1,200 if you are in the United States, according to the US edition of the index). While it may be no surprise to learn that Read more about What is your personal info worth to criminals? There’s a dark web market price index for that[…]

Hardcoded Password Found in Cisco Software

The hardcoded password issue affects Cisco’s Prime Collaboration Provisioning (PCP), a software application that can be used for the remote installation and maintenance of other Cisco voice and video products. Cisco PCP is often installed on Linux servers. Cisco says that an attacker could exploit this vulnerability (CVE-2018-0141) by connecting to the affected system via Read more about Hardcoded Password Found in Cisco Software[…]

Sandvine’s PacketLogic Devices Used to Deploy Government Spyware in Turkey and Redirect Egyptian Users to Affiliate Ads when trying to download popular software

This report describes our investigation into the apparent use of Sandvine/Procera Networks Deep Packet Inspection (DPI) devices to deliver nation-state malware in Turkey and indirectly into Syria, and to covertly raise money through affiliate ads and cryptocurrency mining in Egypt. Key Findings Through Internet scanning, we found deep packet inspection (DPI) middleboxes on Türk Telekom’s Read more about Sandvine’s PacketLogic Devices Used to Deploy Government Spyware in Turkey and Redirect Egyptian Users to Affiliate Ads when trying to download popular software[…]

Artificial intelligence: Commission kicks off work on marrying cutting-edge technology and ethical standards

The Commission is setting up a group on artificial intelligence to gather expert input and rally a broad alliance of diverse stakeholders. The expert group will also draw up a proposal for guidelines on AI ethics, building on today’s statement by the European Group on Ethics in Science and New Technologies. From better healthcare to Read more about Artificial intelligence: Commission kicks off work on marrying cutting-edge technology and ethical standards[…]

Phishing and Attempted Stealing Incident on Binance VIA / BTC coins not only stopped, but costs hackers money

On Mar 7, UTC 14:58-14:59, within this 2 minute period, the VIA/BTC market experienced abnormal trading activity. Our automatic risk management system was triggered, and all withdrawals were halted immediately. This was part of a large scale phishing and stealing attempt. So far: All funds are safe and no funds have been stolen. The hackers Read more about Phishing and Attempted Stealing Incident on Binance VIA / BTC coins not only stopped, but costs hackers money[…]

Retina X ‘Stalkerware’ Shuts Down Apps ‘Indefinitely’ After Getting Hacked Again

A company that sells spyware to regular consumers is “immediately and indefinitely halting” all of its services, just a couple of weeks after a new damaging hack. Retina-X Studios, which sells several products marketed to parents and employers to keep tabs on their children and employees—but also used by jealous partners to spy on their Read more about Retina X ‘Stalkerware’ Shuts Down Apps ‘Indefinitely’ After Getting Hacked Again[…]

Researchers Bypassed Windows Password Locks With Cortana Voice Commands

Tal Be’ery and Amichai Shulman found that the always-listening Cortana agent responds to some voice commands even when computers are asleep and locked, allowing someone with physical access to plug a USB with a network adapter into the computer, then verbally instruct Cortana to launch the computer’s browser and go to a web address that Read more about Researchers Bypassed Windows Password Locks With Cortana Voice Commands[…]

Leaked Files Show How the NSA Tracks Other Countries’ Hackers

When the mysterious entity known as the “Shadow Brokers” released a tranche of stolen NSA hacking tools to the internet a year ago, most experts who studied the material homed in on the most potent tools, so-called zero-day exploits that could be used to install malware and take over machines. But a group of Hungarian Read more about Leaked Files Show How the NSA Tracks Other Countries’ Hackers[…]