Ransomware Goes Mobile – New Android Ransomware Fabricates Notes From FBI

A new variant of Russian malware tricks mobile users into encrypting their files, then impersonates the FBI to force ransom payments, accusing the user of downloading illegal pornographic content Malware is downloaded and installed via social media and instant messenger apps as a video player application Lucy sends ransom note under guise of FBI, stating that user’s details have been uploaded […]

US States Expand Internet Voting Experiments Amid Pandemic, Raising Security Fears

It has been reported that, in the United States, election officials are preparing for what may the highest election turnout in modern history in the middle of a pandemic. In response, several states will be turning to a relatively new and untested form of Internet-based voting to aid the voters who may have the most trouble getting […]

Expert Reaction On Two Usenet Providers Blame Data Breaches On Partner Company

Two companies that provide Usenet services have disclosed security breaches today. The two companies, UseNeXT and Usenet.nl, blamed the breaches on “a security vulnerability at a partner company. “Neither UseNeXT nor Usenet.nl have named the third-party company whose software enabled the intrusion. It is unclear if this is referring to a Usenet desktop client or […]

Microsoft On Ransomware – Expert Comments

Cybersecurity experts from Lucy Security and Red Canary reacted to Microsoft’s blog post Ransomware groups continue to target healthcare, critical services; here’s how to reduce risk.

Expert Reaction On Chegg Confirms Third Hack In 3 Years

Edtech company Chegg confirmed earlier today that it had suffered its third breach in as many years. The education tech giant, which last year acquired Thinkful for $80 million, said hackers stole 700 current and former employee records, including their names and Social Security numbers.

Experts Advise On The Rise Of Social Media Scammers & Identity Theft

A Which? Money’s investigation today found a rise in social media scammers and identity theft online – and put the onus on social media platforms to stop them. This follows the Centre for the Analysis of Social Media at Demos last week advising verifying the identities of every social media user to fight trolls and fake news. Mitek, experts in identity […]

NHS Grants GCHQ Access To Beef Up Security

Health Secretary Matt Hancock has used emergency powers under the NHS Act of 2006 to give GCHQ special dispensation to access NHS data, according to ComputerWeekly. This access has been granted to allow GCHQ to examine and boost NHS cyber security, amongst other IT systems, in order to better protect the health service from potential cyber […]

What Are The Top 5 Kubernetes Security Challenges And Risks?

Software containers have become more popular in recent years as many organizations have discovered the benefits of containerization. Kubernetes is the most widely used container orchestrator in the market, and Kubernetes adoption – especially in production environments – is taking off. According to Gartner, “by 2022, more than 75% of global organizations will be running […]

Expert Comments On Hackers Threaten To Leak Data From Famous High-end Zaha Hadid Architecture Firm

information-leak

ZDNet has reported that a group of hackers has breached the network of Zaha Hadid Architects, one of the world’s leading architectural firms. The intrusion took place last week, and hackers stole files from the company’s network, encrypted files using ransomware, and are now threatening to release sensitive information on the dark web unless the company pays a hefty ransom […]