/ Security News /

Malta-based cryptocurrency exchange Binance has become a victim of a ransom demand from a scammer who claimed to have hacked the KYC (Know Your Customer) data of thousands of its customers. The unknown attacker threatened the world’s largest cryptocurrency exchange by volume to release KYC information of 10,000 users if the company did not pay …

/ Security Assessments News /

More than 20,000 Linksys wireless routers are regularly leaking full historic records of every device that has ever connected to them, including devices’ unique identifiers, names, and the operating systems they use. The data can be used by snoops or hackers in either targeted or opportunistic attacks. Troy Mursch Independent researcher Troy Mursch said the …

/ Security News /

German federal police have arrested a 20-year-old local student for stealing and publishing a massive trove of personal data of hundreds of politicians, journalists and other public figures last month. The young man, whose identity has not been revealed by the police, was arrested after police raided his parent’s house in west-central German State of …

/ Security News /

Germany has been hit with the biggest hack in its history. A group of unknown hackers has leaked highly-sensitive personal data from more than 100 German politicians, including German Chancellor Angela Merkel, Brandenburg’s prime minister Dietmar Woidke, along with some German artists, journalists, and YouTube celebrities. The leaked data that was published on a Twitter …

/ Security News /

Facebook has been fined £500,000 ($664,000) in the U.K. after the country’s data protection watchdog concluded that its data-sharing scandal broke the law, making it as the social network’s first fine over the Cambridge Analytica scandal. Yes, £500,000—that’s the maximum fine allowed by the UK’s Data Protection Act 1998, and equals to what Facebook earns …

/ Security Assessments News /

Enlarge / A shiny wafer full of Kaby Lake refresh parts. Last week, developers on OpenBSD—the open source operating system that prioritizes security—disabled hyperthreading on Intel processors. Project leader Theo de Raadt said that a research paper due to be presented at Black Hat in August prompted the change, but he would not elaborate further. …

/ Security Assessments News /

Security researchers have unearthed a sprawling list of login credentials that allows anyone on the Internet to take over home routers and more than 1,700 “Internet of things” devices and make them part of a destructive botnet. The list of telnet-accessible devices, currently posted at this Pastebin address, was first posted in June, but it …

/ Security Assessments News /

Enlarge / A computer screen displaying Eternalromance, one of the NSA exploits used in Tuesday’s NotPetya outbreak. Update: This post was revised throughout to reflect changes F-Secure made to Thursday’s blog post. The company now says that the NotPetya component was probably completed in February, and assuming that timeline is correct, it didn’t have any definitive …

/ Security Assessments News /

Enlarge / An aerial view of the NSA. nsa.gov After learning that one of its most prized hacking tools was stolen by a mysterious group calling itself the Shadow Brokers, National Security Agency officials warned Microsoft of the critical Windows vulnerability the tool exploited, according to a report published Tuesday by The Washington Post. The …

/ Security News /

Update: Most of the exploits made publicly available (mentioned in this article) by the Shadow Brokers group are already patched by Microsoft in the last month’s Patch Tuesday update. So, it is always recommended that you keep your systems up-to-date in order to prevent you from being hacked. The Shadow Brokers – a hackers group …