data theft

  1. NEWS Google Play Store Apps That Stole Bank Credentials Were Downloaded 300,000 Times: Report

    Malicious Android apps that stole sensitive financial data were downloaded over 300,000 times from the Google Play store, according to a report published by researchers at ThreatFabric. They discovered that users had their banking details stolen by seemingly benign-looking apps. Link Removed
  2. AA21-055A: Exploitation of Accellion File Transfer Appliance

    Original release date: February 24, 2021 Summary This joint advisory is the result of a collaborative effort by the cybersecurity authorities of Australia,[Link Removed] New Zealand,[2] Singapore,[3] the United Kingdom,[4] and the United States.[Link Removed][6] These authorities are aware of...
  3. AA20-345A: Cyber Actors Target K-12 Distance Learning Education to Cause Disruptions and Steal Data

    Original release date: December 10, 2020<br/><h3>Summary</h3><p>This Joint Cybersecurity Advisory was coauthored by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC).</p>...
  4. AA20-302A: Ransomware Activity Targeting the Healthcare and Public Health Sector

    Original release date: October 28, 2020 Summary This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 7 framework. See the ATT&CK for Enterprise version 7 for all referenced threat actor tactics and techniques. This joint cybersecurity advisory...
  5. AA20-126A: APT Groups Target Healthcare and Essential Services

    Original release date: May 5, 2020 Summary This is a joint alert from the United States Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) and the United Kingdom’s National Cyber Security Centre (NCSC). CISA and NCSC continue to see indications that...
  6. AA20-006A: Potential for Iranian Cyber Response to U.S. Military Strike in Baghdad

    Original release date: January 6, 2020 Summary The Cybersecurity and Infrastructure Security Agency (CISA) is sharing the following information with the cybersecurity community as a primer for assisting in the protection of our Nation’s critical infrastructure in light of the current tensions...
  7. Why I have never nor will I ever purchase something from Huawei

    For one they are a Chinese company and Chinese and tech you're just asking for data theft and espionage . Indictment coverage https://www.cnn.com/2019/01/29/tech/us-indictment-huawei-takeaways/index.html Actual DOJ Indictment Link Removed
  8. Meltdown and Spectre: CPU vulnerabilities patched

    New vulnerabilities have recently been discovered with modern cpu's: It would seem Intel are more prone to attack than AMD: Meltdown and Spectre Microsoft have released patches which will be available via Windows update. If like me yours hasn't arrived then download the standalone...
  9. NEWS WiFi is broken – here's the companies that have already fixed it

    You might have heard some doom-and-gloom news this morning: a researcher has finally figured out how to compromise the WPA2 encryption algorithm, the world's most popular WiFi encryption and almost everyone is vulnerable. There is however, no reason to panic. It's patchable, the scripts to...
  10. TA16-336A: Avalanche (crimeware-as-a-service infrastructure)

    Original release date: December 01, 2016 | Last revised: December 14, 2016 Systems Affected Microsoft Windows Overview “Avalanche” refers to a large global network hosting infrastructure used by cyber criminals to conduct phishing and malware distribution campaigns and money mule schemes...
  11. zomato breached …

    to all you netizens out there who've used urbanspoon.com in the past and currently using zomato.com … change passwords. purportedly, somethin' like 17million pw's stolen. according to zomato's updated blog: not sure why this breach hasn't been listed on...
  12. TA16-336A: Avalanche (crimeware-as-a-service infrastructure)

    Original release date: December 01, 2016 Systems Affected Microsoft Windows Overview “Avalanche” refers to a large global network hosting infrastructure used by cyber criminals to conduct phishing and malware distribution campaigns and money mule schemes. The United States Department of...
  13. TA14-002A: Malware Targeting Point of Sale Systems

    Original release date: January 02, 2014 | Last revised: February 05, 2014 Systems Affected Point of Sale Systems Overview Point of Sale Systems When consumers purchase goods or services from a retailer, the transaction is processed through what are commonly referred to as Point of Sale...
  14. Windows 7 How to totally remove pirrit suggestor? (its killing me)

    How do i totally remove pirrit suggestor? I don't remember visiting malicious website or downloading maclicious software into my computer and i'm having this green icon that revealed that my computer is infected with the adware called pirrit suggestor. When i checked my task manager, i found out...
  15. J

    How safe is 'Auto fill' and 'Credit Card' details saved in Google Chrome

    Hi, Do u think that it is safe to save credit card info in Google Chrome browser? Any one knows any event where data is stolen from chrome wallet?
  16. Windows 7 Man infects college PCs to steal huge database

    A former college student has admitted taking part in a criminal scheme that used malware to steal and sell large databases of faculty and alumni, change grades, and siphon funds from other students' accounts. He used thumbdrives with malware he created to compromise the machines. At first, I...
  17. Microsoft latest security risk: "Cookiejacking

    BOSTON (Reuters) – A computer security researcher has found a flaw in Microsoft Corp's widely used Internet Explorer browser that he said could let hackers steal credentials to access FaceBook, Twitter and other websites. He calls the technique "cookiejacking." "Any website. Any cookie...
  18. Windows 7 Eidos and Deus Ex sites hacked, 80,000 users’ data stolen

    The Deus Ex site and Eidos.com were defaced and taken down yesterday when a splinter group of the hacker organisation Anonymous broke through Square Enix security to steal the personal data of more than 80,000 registered users. According to IRC chat logs of the hackers’ conversations...
  19. Apple's Safari updates fix auto-complete vulnerability

    The latest updates to Apple's Safari WebKit-based browser, versions 5.0.1 and 4.1.1, include several new features, such as enabling Safari Extensions and introducing the Safari Extensions Gallery,. They also address a number of security vulnerabilities. In total, the Safari updates close 15...
  20. Mac spyware infiltrates popular download sites

    A spyware application that surreptitiously scans chat logs and hard drives of unsuspecting Mac users has found its way onto three of the more popular download sites, security researchers said Tuesday. Dubbed OSX/OpinionSpy, the spyware is distributed through software available on sites...