Last Thursday in the Northern District of California, Brittany Conditi filed a class-action complaint against Instagram and its parent company Facebook for invasion of privacy alleging that Instagram accessed users’ smartphone cameras when not using features that would require camera access, despite the defendants’ representations to the contrary. Specifically, the party who initiated the lawsuit […]
Düsseldorf University Hospital has become infected with ransomware through a known vulnerability in Citrix. The disrupted systems caused that the hospital could no longer receive ambulances, among other things. The Ministry of Justice of the German state of North Rhine-Westphalia released a message yesterday that a patient had died as a result of the ransomware […]
The encrypted email service Tutanota has been the target of DDOS attacks for over a month, preventing users from using the service for several days. The attacks began in mid-August and the attackers kept changing their attack vector, Tutanota said. Last weekend, the e-mail service came under fire again and this week it was busy […]
According to the Managed Service Providers based on a study from Altaro, with home workers in mind, they can shift their services to that domain, whereby more devices must be secured outside the company walls. This provides a way to partially offset the losses that MSPs have suffered from the COVID-19 pandemic. Cloud computing and […]
According to Dutch magazine Vrij Nederland (VN), in 2016 three ethical hackers known only as Edwin, Mattijs and Victor, scoured through the password database with the username of Donald Trump’s email address which had leaked out of LinkedIn a few years before. With the helpf of the program John the Ripper – a tool that […]
To protect accounts related to the US presidential election, Twitter will require a strong password for these accounts. These users are also recommended to set up two-factor authentication. The microblogging service has announced this on its own website. In this way, Twitter wants to protect so-called “high-profile accounts” during the upcoming presidential elections. These include […]
CISA and FBI are actively reporting vulnerabilities in F5, Pulse Secure, Citrix, BIG-IP and Exchange
Groups of attackers are actively exploiting known vulnerabilities in F5, Pulse Secure, Citrix, Exchange and BIG-IP to attack organizations, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) of the US Department of Homeland Security said in warnings. It would be groups operating from Iran and China. The group actively searches the Internet for […]
A new survey by research firm Vanson Bourne of 1,350 business IT decision-makers in the US and 13 other countries sought to identify current IoT security vulnerabilities and threats in corporate organizations. One of the questions was a question that asked respondents to identify the strangest IoT devices they found connected to their organization’s networks. […]
Did you ever check the strength of your password or if it was leaked on the Dark Web? How long it will it take to brute force your password or download it in file from the Dark Web? If you don’t want to think about that, please choose your subscription on https://idcontrol.pw!
Fortinet’s “2020 Remote Workforce Cybersecurity Report” conducted among organizations in 17 countries worldwide has some interesting conclusions after the introduction of home working:– 60% of all organizations faced an increase in the number of attack attempts. 34% reported a successful attack.– The biggest challenges surrounding the switch were secure connections, business continuity and access to […]