RAMBO steals secrets: RAM radiation can transmit data to attackers
Governments and other institutions often use systems without network access. But the RAMBO method allows you to send data from RAM to the outside.
«The most epic failure»: CrowdStrike wins ironic award for global IT failure
CrowdStrike President Michael Sentonas accepted the «Most Epic Failure» award at the Pwnie Awards.
Google advertised a fake Google Authenticator website with phishing
Google has faced a serious security problem with its advertising platform. Attackers are creating fake Google Authenticator ads that actually distribute DeerStealer malware that can steal users’ confidential information.
Google Chrome suddenly «forgot» passwords of 17 million Windows users — and didn’t want to share them anymore
The incident occurred last week and lasted almost 18 hours until the company fixed the problem on July 25.
American telecom company’s IT employee leaked data to China for 10 years — it was discovered only now
Beijing has been recruiting US residents for years to carry out various espionage activities.
An Israeli startup prevented the most expensive deal in Google’s history. What happened?
The agreement between Google and Wiz was estimated at $23 billion — and it was to become the most expensive in the history of the search giant.
Apple iPhone or Android? Documents from Cellebrite, which hacked Trump attacker’s phone, show which is safer
Internal documents of Cellebrite — an Israeli security company whose programs are used by intelligence agencies to hack Apple iPhones and Android have been leaked. The leak shows which smartphones it can (or cannot) unlock.
Trump’s shooter used a Samsung phone — FBI «hacked» it in 40 minutes
The FBI has gained access to the latest technology to unlock the phone of a man identified as the attacker on former US President Donald Trump.
The most expensive acquisition in Google’s history — how much will the Israeli startup cost the company?
If the deal goes through, it will become the «most expensive» in Google’s history.
Largest database of stolen passwords in history with 10 billion records appears on a hacker forum
The largest database of stolen passwords with almost 10 billion unique records has been leaked on a popular hacker forum. The Cybernews research group believes that the leak poses a serious danger to users who tend to reuse passwords.
Attack «evil twin»: attacker simulates airplane Wi-Fi and steals passenger data
The Australian Federal Police (AFP) has accused a suspect of launching a fake Wi-Fi network on an airplane and using it to harvest passenger email and social media credentials – the so-called «evil twin attack». Suspicion fell on the man after the airline reported a suspicious Wi-Fi network that its employees discovered during the flight.
US bans Kaspersky Lab software and business — some operations will be available until September 29
Bureau of Industry and Security (BIS) of the U.S. Department of Commerce announced to prohibit Kaspersky Lab, Inc. a US subsidiary of the Russian software manufacturer, from directly or indirectly providing anti-virus software and cybersecurity products or services in the United States or to US persons. The prohibition applies to branches,…
The European Union wants to scan all messages on the Internet, even encrypted ones — the law will be considered on June 20
The European Union is moving closer to adopting new rules that would require mass scanning of digital communications, including encrypted ones. On Thursday, EU governments will adopt a common position on a proposed draft law aimed at identifying child sexual abuse content. The vote will determine whether the proposal will have enough support to…
Destroyed 180 servers with scripts from Google — fired employee caused $600,000 in losses
Kandula Nagaraju, a 39-year-old Indian citizen who worked for NCS (National Computer Systems) in Singapore, was sentenced to two years and eight months in prison after a court found him guilty of unauthorized access to computers. As reported by CNAKandula accessed his former employer’s systems for several months after he was fired. He…
Elon Musk will ban Apple devices in his companies if there is something from OpenAI at the OS level — «They sell you for nothing»
Elon Musk said he would ban Apple devices in his companies if the iPhone manufacturer integrates OpenAI products at the operating system level. The billionaire said this wrote in a series of posts on X.
Can they track everyone? NABU found the suspect’s location via IP on the portal «Diia»
Law enforcement officers can find the whereabouts of Ukrainians using the Unified Portal of Public Services «Diia». According to «Telegraph»This follows from the text of the High Anti-Corruption Court’s ruling on the case of the group led by former head of the State Property Fund Dmytro Sennichenko.
Senior US Navy commander illegally installed Wi-Fi on a ship — she was fired and demoted
The U.S. Navy has shut down an illegal Wi-Fi network on a warship. The senior commander who ordered the installation was demoted. The now former senior commander, Grizel Marrero, was convicted in March, according to the Navy Times, which received documents on the trial.
«Disaster without legal consequences»: cybersecurity expert criticizes «Reserve+»
Cybersecurity expert Kostiantyn Korsun believes that the «Reserve+» app has a number of significant drawbacks in terms of personal data protection.
Ukraine launches educational campaign on personal cybersecurity for citizens
The Office of the U.S. Civilian Research and Development Foundation in Ukraine (CRDF Global in Ukraine), together with the National Coordination Center for Cybersecurity under the National Security and Defense Council of Ukraine, the Ministry of Education and Science of Ukraine, and other organizations, are launching an all-Ukrainian information…
Former CIA chief calls on Ukrainian IT to spend 10% or more on cybersecurity
Former executive head of security at the CIA Nick Gisinto, who worked for the agency for 10 years and after leaving it worked for Uber and Tesla, called on companies to spend at least 10% of their IT budgets on cybersecurity.
M&M’s candy vending machines recognized the faces of university students — they will be dismantled
Canada’s University of Waterloo is dismantling smart M&M’s vending machines from its campus. Students discovered that the machines were secretly performing facial recognition without students’ consent.
Fingerprints can be played back by the sounds of finger movement on the touch screen — research
A research team from the United States and China has uncovered a new danger associated with biometric authentication. Their work is called «PrintListener: Detecting Fingerprint Authentication Vulnerability via Finger Friction Sound». The attack uses the sound characteristics of the user’s finger movement to extract the features of the…
Spelling error report
The following text will be sent to our editors: