Top

LATEST PUBLICATIONS



Android App Developers Required by Google to Share More Info on Data Handling

May 7, 2021

Planned as a safety section in Google Play, the change is expected to “help people understand the data an app collects or shares, if that data is secured, and additional details that impact privacy and security.” Google is already asking […]


3.2 Billion Leaked Passwords Contain 1.5 Million Records with Government Emails

April 26, 2021

A staggering number of 3.28 billion passwords linked to 2.18 billion unique email addresses were exposed in what’s one of the largest data dumps of breached usernames and passwords. In addition, the leak includes 1,502,909 passwords associated with email addresses […]


FCC to Focus Efforts on 5G, Software and Cloud Service Vulnerabilities

April 19, 2021

Last Thursday (April 15th), Rosenworcel made a statement on future priorities by reestablishing the Communications, Security, Reliability, and Interoperability Council (CSRIC) with a focus on 5g networks and software and cloud services vulnerabilities. “I am committed to working with our […]


Threats & Malware, Virus & Malware

Healthcare CIOs fear (and fend off) ransomware threats amid pandemic

May 6, 2021

Via: CIO

Mt. San Rafael Hospital thwarted a ransomware attack on one of its sister facilities earlier this year before anything could be compromised. The organization is still working through the details of the hack, says CIO Michael Archuleta, whose hospital is […]


Cyber-crime, Phishing, Privacy protection, Security

New Study Warns of Security Threats Linked to Recycled Phone Numbers

May 5, 2021

Via: The Hacker News

A new academic study has highlighted a number of privacy and security pitfalls associated with recycling mobile phone numbers that could be abused to stage a variety of exploits, including account takeovers, conduct phishing and spam attacks, and even prevent […]


Cyber-crime, Malware

U.S. Organizations Targeted by New Cybercrime Group With Sophisticated Malware

May 5, 2021

Via: Security Week

The threat actor, which does not appear to be linked to other known groups, is tracked by the cybersecurity firm as UNC2529 (UNC stands for uncategorized). The phishing campaign conducted by UNC2529 targeted a wide range of organizations, and involved […]