Facebook has said around 100 app developers may have been able to obtain user data from groups on the social network, despite making changes to what third parties can see following the Cambridge Analytica scandal. The firm has admitted some retained access to information such as names and profile pictures in connection with group activity.
The post Facebook: 100 app developers may have accessed user data appeared first on Techerati.
A huge database of payment card records largely belonging to Indian banks has been discovered for sale on the dark web.
The stash was found listed on Joker's Stash, an underground 'card shop', on October 28 and holds more than 1.3 million credit and debit card records, making it the largest database of its kind ever discovered. Substantial payment leaks have occurred before, but they are usually uploaded in several smaller parts at different times.
Many attacks originated from hostile nation states The UK’s National Cyber Security Centre has revealed it helped prevent over 600 cyber attacks over the last year, bringing the total halted to almost 1800 since the centre’s formation in 2016. In its third annual review, the NCSC laid out the various ways it has been protecting... Read More
The post NCSC fended off 658 cyber attacks in last 12 months appeared first on Techerati.
Popular virtual private network service NordVPN confirmed one of its rented data centre servers suffered a breach in March 2018.
In an announcement posted on the company's website Monday, the VPN provider revealed an attacker accessed the server at a Finland data centre by exploiting the data centre provider's remote management system, which the company was unaware existed.
NordVPN, which deals with highly sensitive and private activity logs, was quick to reassure its 12 million customers:
"The server itself did not contain any user activity logs; none of our applications send user-created credentials for authentication, so usernames and passwords couldn’t have been intercepted either," the company wrote.
Russian hackers disguised themselves as Iranian hackers to launch a cyber attack targeting government and industry organisations in 35 countries, British and US officials announced in a joint statement.
As part of the campaign, the Russian hacking group known as "Turla" used Iranian tools and infrastructure and employed the same techniques used by hacking groups associated with the Islamic Republic.
The group extracted sensitive documents and assets from a range of sectors and organisations, including a 'large cluster' based in the Middle East, officials said.
The post UK and US accuse Russian hackers of disguising themselves as Iranian spies to attack 35 countries appeared first on Techerati.
Nearly three quarters of 5G IoT endpoint devices installed in 2020 will be outdoor surveillance cameras, taking the total number of 5G-equipped spycams to 6.2 million.
That's according to analyst house Gartner, which has just released its latest predictions for 5G IoT use cases (where connected devices leverage the emerging next-gen mobile network for connectivity).
Cloud computing has offered a wealth of opportunity for businesses across the globe. From encouraging vast and continuous development of services, applications and platforms, to giving companies a myriad of choices when it comes to finding the right solution to drive business benefit. However, cloud computing does open the door to new risks that need to be acknowledged. These risk factors come in many different shapes and sizes, including unauthorised system access, mass data loss, or the complexity of network identity management.
Visibility is absolutely key for businesses to make informed and educated decisions. Without the full picture, correct decision making is nearly impossible and will ultimately lead to failure. With an understanding of where the risks and threats lie, companies can build a defence to mitigate these threats; this is where having centralised connectivity is essential.
The post Why centralised connectivity is the most secure approach for businesses appeared first on Techerati.
A common assumption about cyber attacks is that they’re all about theft. But that’s not always the case, as data manipulation attacks illustrate. This type of attack is where cyber criminals access the target system and make undetected changes to data in order to elicit some form of gain, but without any outright theft taking place. Sometimes referred to as “the hack you might not notice”, they have the potential to cause immense damage.
Over the years, there has been an ongoing battle between those looking to advance technology and those looking to pinpoint its weaknesses. Whether it be computers versus viruses, or encryption versus hacking, there is often an overarching theme of good vs. evil when it comes to technology.
Perhaps this is to be expected. As the world has become more and more gadget-obsessed, we have seen a simultaneous rise in our dependence for effective cybersecurity. Hackers are getting smarter, and can now break down security defences using more innovative methods than ever before.
Cybercrime is getting smarter and data is growing in value. So, as cyber-attacks become more sophisticated, businesses need to rise to the challenge and protect their digital operations. This October is National Cybersecurity Awareness Month, which aims to draw attention to the threats that are putting businesses, and individuals, at risk. To highlight the importance of this awareness month, Techerati spoke with seven industry experts to get their thoughts and advice.
The post Cyber Security Awareness Month: With more risk, comes greater responsibility appeared first on Techerati.
Over the past few years, cyber security specialist Frank Satterwhite has been working with a talented group of cyber engineers to create and package a security platform that allows users to protect their data in cyberspace. One of the group’s key focuses is on increasing mobile cyber hygiene as smartphones become the default device for most digital tasks at home and, increasingly, in the workplace.
Smartphones have become the central tool of our daily digital lives, whether for facilitating quick communication with friends and family, browsing social media or keeping up to date with the latest news. But from a cyber security perspective, mobile devices present easy targets for hackers seeking to compromise personal data.
The post TechWeek 2019: How to ensure your smartphone and its data are not weaponised appeared first on Techerati.
In a few short years, Slack has transformed from a relatively unknown cloud application into one of the most popular team collaboration solutions in the world. For many enterprises, Slack is initially used in small, unsanctioned (shadow IT) deployments amongst internal workgroups. From there, use of the app typically balloons so quickly that it simply cannot be ignored. Today, Slack boasts over 10 million daily active users and more than 85,000 paying customers worldwide.