News Clipping

Four Giants Introduce the Data Transfer Project: Consumer Data Portability [source: microsoft]

As we progress further into the era of the intelligent cloud and all its potential applications, Microsoft recognizes that people will only use technologies they trust – and that they can control. This is at the heart of Microsoft’s recent commitments to extend rights that are at the heart of GDPR to all of our consumer customers worldwide, and drives the design of our privacy dashboard to give users...

Read More


Hacking WiFi Password in a few steps using a new attack on WPA/WPA2 [source: securityaffairs]

A security researcher has devised a new WiFi hacking technique that could be exploited to easily crack WiFi passwords of most modern routers. The security researcher Jens ‘Atom’ Steube, lead developer of the popular password-cracking tool Hashcat, has devised a new WiFi hacking technique that could be exploited to easily crack WiFi passwords of most modern routers. The new WiFi hacking technique allows to crack WPA/WPA2 wireless network protocols...

Read More


Emotet Malware [source: us-cert]

Systems Affected Network Systems Overview Emotet is an advanced, modular banking Trojan that primarily functions as a downloader or dropper of other banking Trojans. Emotet continues to be among the most costly and destructive malware affecting state, local, tribal, and territorial (SLTT) governments, and the private and public sectors. This joint Technical Alert (TA) is the result of Multi-State Information Sharing & Analysis Center (MS-ISAC)...

Read More


Malicious Macro Hijacks Windows Desktop Shortcuts [source: gbhackers]

Cybercriminals using a malicious macro that changes the target of Desktop Shortcuts to download malware and when the user clicks on the altered shortcut file, the malware executes. With this new campaign, attackers used common tools like WinRAR, and Ammyy Admin to gather information instead of their own tools. Security researchers from Trend Micro uncovered the new campaign, the malware and macro are not sophisticated and researchers...

Read More


Protecting Yourself on Social Networks [source: ssd.eff]

Social networks are among the most popular websites on the Internet. Facebook has over a billion users, and Instagram and Twitter have hundreds of millions of users each. Social networks were generally built on the idea of sharing posts, photographs, and personal information. Now they have also become forums for organizing and speech. Any of these activities can rely on privacy and pseudonymity. Thus, the...

Read More


Page 44 of 123« First...102030...4243444546...506070...Last »