One of the things that I miss in these Covid times is the ability to travel regularly to Israel, where my daughter and her family have been living for many years. Often on these visits I would take the opportunity to check in with several security rese…
Security researchers found this week that a core software component in hundreds of millions of IoT devices has 19 hackable vulnerabilities in its code. The buggy code, its actual function to enable the device to connect with any network or the internet…
Researchers have discovered a phishing campaign targeting over a hundred executives at an international company that is part of a German task force creating coronavirus protective equipment. The malicious emails in the campaign redirect users to a phon…
ATMs have long been targets for thieves; several years ago there was the Tyupkin malware, which could control their cash drawers. But a more popular form of attack is carried out via ATM and gas pump card skimmers, which are typically overlays attached…
Last week, Google and the Cybercrime Support Network launched a public service site called Scam Spotter that aims to bring scam awareness and fraud protection to all users, including the least tech-savvy. The site uses an easy-to-read large font and ve…
Rumors that a massive LiveJournal hack occurred several years ago were proven true this week as 26 million stolen credentials from the popular online journaling platform went up for sale on the dark web. ZDNet reported that rumors of the hack have been…
Every week brings more security news and this week is about an interesting piece of Javascript that can run in your browser if you happen to use eBay under a particular set of circumstances. The code can scan your computer and send information ba…
British budget airline easyJet told the BBC that it is in the process of alerting 9 million customers about a data breach that occurred in January, exposing their email addresses and travel details. EasyJet reported that about 2,200 customers also had …
Today Verizon published the latest 2020 Data Breach Investigations Report (DBIR). What sets the DBIR apart is that it combines breach data from multiple sources using the common industry collection, VERIS, a third-party repository where threat data is …
Björn Ruytenbe, a Dutch security researcher at Eindhoven University of Technology, revealed details this week of a new attack he discovered that exploits a vulnerability in the common Intel Thunderbolt port found in millions of PCs around the world. Th…