Russia’s ‘Sandworm’ Hackers Also Targeted Android Phones

Credit to Author: Andy Greenberg| Date: Thu, 21 Nov 2019 15:05:00 +0000
The Kremlin’s uniquely dangerous hacker group has been trying new tricks.
Read MoreRSS Reader for Computer Security Articles

Credit to Author: Andy Greenberg| Date: Thu, 21 Nov 2019 15:05:00 +0000
The Kremlin’s uniquely dangerous hacker group has been trying new tricks.
Read More
Credit to Author: Elham Khatami| Date: Wed, 20 Nov 2019 22:11:45 +0000
As Iran’s countrywide internet shutdown approaches a full week, Iranian Americans are increasingly desperate to connect with friends and relatives.
Read More
Credit to Author: Brian Barrett| Date: Wed, 20 Nov 2019 20:02:13 +0000
Credential stuffing, where names and passwords leaked in previous breaches are reused, strikes again.
Read More
Credit to Author: Lucas Mearian| Date: Thu, 21 Nov 2019 10:17:00 -0800
BlackBerry has unveiled several updates to its enterprise mobility security platform, offering three new UEM peoducts aimed at enabling secure access to tools, applications and files based on a zero-trust architecture.
The trio of new suites are add-ons to BlackBerry’s flagship Enterprise Mobility Suite, aimed at enhancing productivity, collaboration and workforce agility.

Credit to Author: JR Raphael| Date: Thu, 21 Nov 2019 09:21:00 -0800
I don’t know if you’ve read much news this week, but it seems the sky is falling and we’re all terribly doomed.
No, I’m not talking about that news — as usual, that’s another column for another publication — but rather the news that a security flaw in some Android camera apps could turn our phones into privacy-plundering spy portals and bring an end to human life as we know it.
I mean, have you seen some of these headlines?!
Holy hibiscus, Henry! Even I’m trembling from all of that, and I know it’s a bunch of misguided, sensationalized hooey.

Credit to Author: Sharky| Date: Thu, 21 Nov 2019 06:00:00 -0800
It’s several years ago during a major virus outbreak — if you know your history of computer viruses, you can narrow it down — and a user at a remote site calls this pilot fish to complain that her computer won’t let her get any work done.
“I asked her if she had called the local technician — who worked for me — and she replied that she had called him numerous times but he had not picked up his phone,” says fish. “I told her I would take care of it.”
Fish calls his tech, who says he has spoken to the user each time she called and explained to her that he’ll help her as soon as he can, but he’s finishing work in another area.
That satisfies fish, who goes back to his own work. And soon he gets a message from his tech, sent from the irate user’s email account, reporting that the tech checked the user’s PC, found a virus and removed it, and updated the PC’s virus definitions. Case closed.
-Recovered.jpg)
Credit to Author: Timothy B. Lee, Ars Technica| Date: Wed, 20 Nov 2019 14:00:00 +0000
The Supreme Court ruled that cops need a warrant to attach a GPS device to your car. But if you find one, can you remove it?
Read More
Credit to Author: Andy Greenberg| Date: Wed, 20 Nov 2019 12:00:00 +0000
The recent focus on ICS raises the possibility that Iran’s APT33 is exploring physically disruptive cyberattacks.
Read More