As the United States deals with widespread civil unrest across dozens of cities, "hacktivist" group Anonymous has returned from the shadows.They're ba-ack! Or are they?
The hacker collective was once a regular fixture in the news, targeting those it accused of injustice with cyber-attacks.
After years of relative quiet, it appears to have re-emerged in the wake of violent protests in Minneapolis over the death of George Floyd, promising to expose the "many crimes" of the city's police to the world.
However, it's not easy to pin down what, if anything, is genuinely the mysterious group's work.
Microsoft has issued an alert to users concerning a new widespread Covid-19 themed phishing campaign.TLDR: If you get an email from the John Hopkins Center, don't open the spreadsheet attachment.
The threat installs the NetSupport Manager remote administration tool to completely take over a user's system and even execute commands on it remotely.
iOS 13.5 dropped Wednesday, introducing a slew of upgrades — including, most notably, the API for Apple’s coronavirus contact-tracing tool, developed in conjunction with Google.#technology #tech #security #privacy #hacking #Apple #Covid-19 #CoronaVirus #ContactTracking
But, despite what you might hear online, this is neither an “app” or an update that means downloaders are being tracked without their knowledge. Let’s correct a few popular misconceptions.
Secure instant messaging app Signal launched this week a new feature called "Signal PINs" which the company says will help users migrate account data between devices.About time, too!
Signal says that in the long run, this new feature is the base and the first step towards moving away from using phone numbers as profile IDs.
An anonymous hacker has released code that allowed anyone to automatically submit junk data to Ohio’s controversial COVID-19 Fraud website, which prompts employers to report workers who refuse to work during the deadly pandemic so they won’t receive unemployment benefits.DOWNLOAD THE TOOLKIT HERE
Despite these risks, many large companies have continued business as usual while failing to provide employees with masks, gloves, and other personal protective equipment. Meanwhile, several states including Georgia have begun prematurely reopening business against the advice of health experts, forcing more people to return to work or face termination.
the hacker said. “What I’m hoping is that, whether people use this exact code or not, they see it’s possible for people to take direct action against these sort of snitch programs, and that making and spreading small tools like this amongst ourselves can help.”
Researchers have found various flaws in popular VPN applications that may have exposed users to the hackers allowing them to install malicious updates and ransomware remotely.#technology #tech #security #privacy #hacking
According to the experts, top VPN apps including PrivateVPN and Betternet were found to be able to download fake software updates forcing users to install malware, keyloggers, etc. eventually helping in stealing private data.
Other VPN applications like Torguard, CyberGhost, Hotspot Shield and Hide Me were also found to be vulnerable and allowed the researchers to intercept the communication.
A hacking group known as ShinyHunters has put up a huge cache of stolen user details online.#technology #tech #security #privacy #hacking
According to reports, the hackers were able to steal the data of over 73 million users from various websites, which is now up for sale for approximately $18,000 on the underground marketplaces.
Among the sites that have fallen victim to the attack are the likes of Zoosk, Chatbooks, Star Tribune newspaper, Chronicle of Higher Education and various South Korean fashion and furniture websites.
Security researchers are sounding the alarm over a newly discovered Android malware that targets banking apps and cryptocurrency wallets.#technology #tech #Google #Android #malware #hacking #privacy #security
The National Cyber Security Centre, a branch of the intelligence agency, has launched the suspicious email reporting service with a simple request of the public: forward any dubious emails to [email protected], and the NCSC’s automated scanning system will check for scam emails and immediately remove criminal sites.#UK #technology #tech #phishing #security #hacking
WhatsApp is one of the best messaging services you can use. It’s been around for more than 10 years, and people all around the world use it every day. Unfortunately, WhatsApp’s popularity makes it a prime target for attackers. That’s exactly what’s happening right now as a current WhatsApp hack is putting users’ accounts at risk.#internet #messaging #WhatsApp #privacy #security #hacking
We’ve seen loads of coronavirus apps pop up on mobile app stores in recent months, as the pandemic continues to sweep around the world. Google has taken steps to remove the more questionable apps from the Play Store, but it looks like one Android app on the web is actually ransomware.#technology #tech #Google #Android #ransomeware #hacking #security
Cybercriminals constantly latch on to news items that captivate the public’s attention, but usually they do so by sensationalizing the topic or spreading misinformation about it. Recently, however, cybercrooks have started disseminating real-time, accurate information about global infection rates tied to the Coronavirus/COVID-19 pandemic in a bid to infect computers with malicious software.Aren't people wonderful?!
Security researchers have discovered a way to covertly hijack Siri and other smartphone digital assistants using ultrasonic waves, sounds that cannot be normally heard by humans.You can use Siri without using voice activation. Just pull down on the middle of your home screen (iPhone or iPad) to start a Search. Type in whatever you like then scroll down to the bottom and tap on 'Ask Siri'.
Security camera company Ring has been plagued with privacy concerns in recent months, following a high-profile data breach and fears that criminals could hack their devices – and now the brand finally seems to be doing something about it.#technology #tech #security #privacy #hacking #Ring
If you have a Ring security camera or video doorbell, you'll now need to enable two-factor authentication when you sign in; this is mandatory for all users, and you won't be able to access your account without it.
The UK's National Crime Agency (NCA) has publicly said it has nothing to do with a misleading poster designed to put fear into the hearts of parents and urge them to call the police if their children are using Kali Linux.What fresh idiocy is this?
The poster, made public by Twitter user @G_IW, has reportedly been distributed by local authorities on behalf of the West Midlands Regional Organised Crime Unit (WMROCU).
The United Nations was the victim of a massive, likely state-sponsored hacker attack this past summer, according to reports from The New Humanitarian and Associated Press. To make the matters worse, the organization didn't disclose the details and severity of the hack until those publications obtained an internal document on the situation.#technology #tech #hacking #security #privacy #UN
For the third time in less than a year, Intel has disclosed a new set of vulnerabilities related to the speculative functionality of its processors. On Monday, the company said it will issue a software update "in the coming weeks" that will fix two more microarchitectural data sampling (MDS) or Zombieload flaws. This latest update comes after the company released two separate patches in May and November of last year.#technology #tech #security #hacking
Serious vulnerabilities have recently come to light in three WordPress plugins that have been installed on a combined 400,000 websites, researchers said. InfiniteWP, WP Time Capsule, and WP Database Reset are all affected.#technology #tech #security #privacy #hacking #WordPress
A vulnerability in millions of fully patched Android phones is being actively exploited by malware that's designed to drain the bank accounts of infected users, researchers said on Monday.#technology #security #hacking #Android #malware
The vulnerability allows malicious apps to masquerade as legitimate apps that targets have already installed and come to trust, researchers from security firm Promon reported in a post. Running under the guise of trusted apps already installed, the malicious apps can then request permissions to carry out sensitive tasks, such as recording audio or video, taking photos, reading text messages or phishing login credentials. Targets who click yes to the request are then compromised.
A security firm has discovered a major Android exploit that would allow hackers to take control of your smartphone’s camera in the background and use it to take pictures or record video while the phone is locked. The security report reveals that the exploit affects Google and Samsung smartphones, bringing the tally of affected users into the “hundreds of millions.”#technology #smartphone #Android #hacking #security #privacy
After making the rounds in Europe, a new phishing campaign has arrived in the US and the attackers behind it are impersonating the US postal system with the aim of infecting users' computers with a banking trojan according to new research from Proofpoint.#technology #hacking #phishing #security
Scammers are actively exploiting a bug in Firefox that causes the browser to lock up after displaying a message warning the computer is running a pirated version of Windows that has been hacked.#technology #security #hacking #Firefox
She was the first person to get a detailed look at Facebook's new dating feature before the designs were released to the public.#technology #computing #hacking #WhiteHat
She discovered that Airbnb was testing a new flight integration feature that alerted hosts on the website when their guests' planes landed safely.
And she sounded the horn when Instagram began experimenting with augmented reality profile pictures.
Silicon Valley's tech firms like to make a splash when they unveil new features. But half a world away, a Hong Kong-based software engineer has made it her ambition to spoil their scoops.
Chinese researchers have found no less than nine zero-day vulnerabilities in how Android handles VoIP in its more recent versions.#technology #Android #VOIP #hacking #security
The researchers stated that most security investigations focus on network infrastructure and apps, whereas they decided to look at Android’s VoIP integration.
Attackers are exploiting a zero-day vulnerability in Google’s Android mobile operating system that can give them full control of at least 18 different phone models, including four different Pixel models, a member of Google’s Project Zero research group said on Thursday night.#technology #mobile #smartphone #Google #Android #Pixel #hacking #security
Last week's iPhone hack may have been wider than first thought to also affect Android and Windows devices, according to reports.#technology #iPhone #hacking #security
Sources speaking to Forbes have claimed that the attacks, which used malicious websites to install surveillance software onto victim devices, may have been part of a long-running campaign originating from China.
New hacking methods would allow criminals to work out passwords by listening to the sounds made when typing, experts have warned.#technology #computing #security #hacking
Reports have claimed that hackers listening into typing habits using a smartphone would be able to decode passwords with high levels of accuracy.
From 2015 to 2018, a strain of ransomware known as SamSam paralyzed computer networks across North America and the UK. It caused more than $30m in damages to at least 200 entities, including the cities of Atlanta and Newark, the port of San Diego and Hollywood Presbyterian medical center in Los Angeles. It knocked out Atlanta’s water service requests and online billing systems, prompted the Colorado Department of Transportation to call in the national guard, and delayed medical appointments and treatments for patients nationwide whose electronic records couldn’t be retrieved. In return for restoring access to the files, the cyberattackers collected at least $6m in ransom.Warning: A long read.