A new variant of Russian malware tricks mobile users into encrypting their files, then impersonates the FBI to force ransom payments, accusing the user of downloading illegal pornographic content Malware is downloaded and installed via social media and instant messenger apps as a video player application Lucy sends ransom note under guise of FBI, stating that user’s details have been uploaded […]
According to reports, the UK government’s Covid-19 contact-tracing app remains on schedule for launch in May despite ongoing privacy concerns and only recently passing through alpha testing, leading UK scientists told MPs.
It has been reported that, in the United States, election officials are preparing for what may the highest election turnout in modern history in the middle of a pandemic. In response, several states will be turning to a relatively new and untested form of Internet-based voting to aid the voters who may have the most trouble getting […]
Two companies that provide Usenet services have disclosed security breaches today. The two companies, UseNeXT and Usenet.nl, blamed the breaches on “a security vulnerability at a partner company. “Neither UseNeXT nor Usenet.nl have named the third-party company whose software enabled the intrusion. It is unclear if this is referring to a Usenet desktop client or […]
Cybersecurity experts from Lucy Security and Red Canary reacted to Microsoft’s blog post Ransomware groups continue to target healthcare, critical services; here’s how to reduce risk.
Edtech company Chegg confirmed earlier today that it had suffered its third breach in as many years. The education tech giant, which last year acquired Thinkful for $80 million, said hackers stole 700 current and former employee records, including their names and Social Security numbers.
A Which? Money’s investigation today found a rise in social media scammers and identity theft online – and put the onus on social media platforms to stop them. This follows the Centre for the Analysis of Social Media at Demos last week advising verifying the identities of every social media user to fight trolls and fake news. Mitek, experts in identity […]
Health Secretary Matt Hancock has used emergency powers under the NHS Act of 2006 to give GCHQ special dispensation to access NHS data, according to ComputerWeekly. This access has been granted to allow GCHQ to examine and boost NHS cyber security, amongst other IT systems, in order to better protect the health service from potential cyber […]
Software containers have become more popular in recent years as many organizations have discovered the benefits of containerization. Kubernetes is the most widely used container orchestrator in the market, and Kubernetes adoption – especially in production environments – is taking off. According to Gartner, “by 2022, more than 75% of global organizations will be running […]
ZDNet has reported that a group of hackers has breached the network of Zaha Hadid Architects, one of the world’s leading architectural firms. The intrusion took place last week, and hackers stole files from the company’s network, encrypted files using ransomware, and are now threatening to release sensitive information on the dark web unless the company pays a hefty ransom […]