Items tagged with security breach

The number of ways hackers can exploit security flaws seems endless these days. The Cybersecurity and Infrastructure Security Agency (CISA) expanded on one of those this week when it encouraged vendors, manufacturers, and developers to fast-track updating vulnerable Bluetooth SoC applications in regard to... Read more...
In the past 24 hours, security camera company Eufy had a massive lapse in privacy when customers began to report that they had access to other peoples’ devices live and recorded feeds. Though this could be a one-off situation, it begs the discussion about cloud-based camera solutions and how secure your IoT devices... Read more...
The never-ending parade of security vulnerabilities continues. Just as quickly as software vendors can tackle and resolve one set of exploitable issues -- i.e. the troubles at SolarWinds -- attackers find other vectors to break into networks and steal data. This time, it appears that tens of thousands of firms have... Read more...
Facebook must once again deal with the repercussions of a major security blunder. An exposed server recently published more than 419 million phone numbers and Facebook IDs. At least 133 million of those phone numbers were based in the United States. Anyone could have accessed the information before the server was... Read more...
Did you attend E3 this past June? Your data may have been leaked. The data of over 2,000 journalists and content creators was at risk thanks to a website security breach. The Electronic Software Association (ESA) grants E3 press badges to thousands of journalists, content creators, and other industry experts each... Read more...
Another day, another report on vulnerabilities in the software that many of us use on a daily basis. This time around, researchers from Check Point and CyberInt rallied together to detail a number of exploits that they discovered in the Origin client used to deliver games to consumers. Origin is an Electronic Arts... Read more...
Facebook just can’t seem to keep its nose clean with respect to security and user privacy. The latest blunder was first reported on by KrebsonSecurity, which discovered that the social networking giant was storing user account passwords in plain text instead of hashing them. What’s more troubling about this discovery... Read more...
Rumor has it that the new Google Home Hub may have a few security vulnerabilities. A hacker recently demonstrated that a Google Home Hub could potentially be forced to reveal information about its owner, but Google has now refuted this claim and contends that user information is not at risk. Security researcher... Read more...
A cryptocurrency exchange in Asia called Coincheck has announced that it was the victim of a massive hack that saw hundreds of millions of dollars worth of cryptocurrency stolen in what is the largest heist of its kind in history. Coincheck doesn't call the heist a hack, it says that the coins were sent illicitly... Read more...
It seems as though hackers are having a field day when it comes to infiltrating both private and government computer networks. The latest victim is Carphone Warehouse, which just so happens to be the United Kingdom’s largest independent phone retailer. According to various reports, Carphone Warehouse has revealed... Read more...
Data security research player CrowdStrike is reporting a security flaw that could allow hackers to exploit and take over data centers from within. Given the nasty moniker "VENOM" (for "Virtualized Environment Neglected Operations Manipulation"), the vulnerability CrowdStrike uncovered is present in a common component... Read more...
Uber announced that it suffered a database breach at the hands of hackers last year. The company admitted that about 50,000 drivers may have been affected by the breach and announced that a lawsuit has already been filed by Uber against the as-yet unidentified hackers. “A small percentage of current and former Uber... Read more...
Conventional wisdom in years past was that hackers didn’t bother to exploit Apple’s OS X operating system because its relatively insignificant market share didn’t warrant wasting resources to exploit it. The reasoning was, why bother with OS X when Windows was pushing over 90 percent of the worldwide OS... Read more...
Since the massive security breach at Sony Pictures has occurred, speculation has been that North Korea was behind it. Sony, with the help of cybersecurity firm Mandiant and the FBI, has been investigating the perpetrators behind the breach. However, a senior FBI official stated has stated that government agency has not confirmed that North Read more...
Sony Pictures Entertainment is not getting a break from the security break it experienced last month that resulted in Sony shutting down its computers. In the aftermath of the attack, the hackers, called Guardians of Peace, released a set of documents that included around 47,000 Social Security numbers for actors as... Read more...
Government agencies are prime targets for many hackers (particularly those funded by other governments), so it’s not surprising that the State Department was recently attacked. What makes the attack unusual is that it appears to have been successful, with unclassified systems being compromised, including... Read more...
After a 10-month cyber espionage investigation, researchers have found 1,295 computers in 103 countries with software that is capable of stealing information from high-profile targets such as the Dalai Lama and government agencies around the world. In the report published today by Information Warfare Monitor, a Toronto-based organization,... Read more...