New Zealand central bank says its data system was breached

New Zealand central bank says its data system was breached

WELLINGTON (Reuters) - The Reserve Bank of New Zealand said on Sunday that it was responding with urgency to a breach of one of its data systems.In a November 2019 Financial Stability report, the RBNZ warned that the frequency and severity of cybersecurity incidents were on the rise in New Zealand.

Suspected Russian hackers spied on US federal agencies

Suspected Russian hackers spied on US federal agencies

On Monday, the US national security council said it was working closely with the FBI and the Cybersecurity and Infrastructure Security Agency (Cisa) “to coordinate a swift and effective whole-of-government recovery and response to the recent compromise.”.

Should You Use Biometric Locks on Your Devices?

Should You Use Biometric Locks on Your Devices?

As such, many cybersecurity experts actually recommend biometric locks like fingerprint, face scan, or retina scan instead.No matter what protection you go with for your devices – be it password, PIN, or biometric lock – make sure that you’ve done your research.

FBI warns ransomware assault threatens US healthcare system

FBI warns ransomware assault threatens US healthcare system

The aggressive offensive by a Russian-speaking criminal gang coincides with the U.S. presidential election, though there was no immediate indication it was motivated by anything but profit.“We are experiencing the most significant cyber security threat we’ve ever seen in the United States,” Charles Carmakal, chief technical officer of the cybersecurity firm Mandiant, said in a statement.

Experts Warn of Privacy Risks Caused by Link Previews in Messaging Apps

Experts Warn of Privacy Risks Caused by Link Previews in Messaging Apps

Cybersecurity researchers over the weekend disclosed new security risks associated with link previews in popular messaging apps that cause the services to leak IP addresses, expose links sent via end-to-end encrypted chats, and even unnecessarily download gigabytes of data stealthily in the background.

Cybersecurity company finds hacker selling info on 186 million U.S. voters

Cybersecurity company finds hacker selling info on 186 million U.S. voters

But the fact that so many names, email addresses, phone numbers and voter registration records were found for sale in bulk on the so-called dark web underscores how easily criminals and foreign adversaries can deploy it as the FBI said Iran has done recently, by sending emails designed to intimidate voters.

A hacker published thousands of students' grades and private information after a Nevada school district refused to pay ransom

A hacker published thousands of students' grades and private information after a Nevada school district refused to pay ransom

Brett Callow, a threat analyst with cybersecurity firm Emsisoft, told Business Insider that he discovered leaked documents published to an online hacking forum that purported to include records from Nevada's Clark County School District, including students' names, social security numbers, addresses, and some financial information.

Report: 97% of Cybersecurity Companies Have Leaked Data on the Dark Web

Report: 97% of Cybersecurity Companies Have Leaked Data on the Dark Web

97% of companies have data leaks and other security incidents exposed on the Dark Web. 631,512 verified security incidents were found with over 25% (or 160,529) of those classed as a high or critical risk level+ containing highly sensitive information such as plaintext credentials or PII, including financial or similar data.

Peter Dutton confirms Australia could spy on its own citizens under cybersecurity plan

Peter Dutton confirms Australia could spy on its own citizens under cybersecurity plan

Dutton said law enforcement agencies would target terrorists, paedophiles and drug traffickers operating in the dark web – promising proposed new powers will apply “to those people and those people only”.

Popular Chinese-Made Drone Is Found to Have Security Weakness

Popular Chinese-Made Drone Is Found to Have Security Weakness

Cybersecurity researchers revealed on Thursday a newfound vulnerability in an app that controls the world’s most popular consumer drones, threatening to intensify the growing tensions between China and the United States.

TikTok under consideration for a U.S. ban due to cybersecurity threats

TikTok under consideration for a U.S. ban due to cybersecurity threats

The Trump administration reportedly has plans in the works to shutter the app for American users – citing privacy threats from TikTok’s parent company and the Chinese Communist Party.

China Uses Android Malware To Spy On Ethnic Minorities Worldwide, New Research Says

China Uses Android Malware To Spy On Ethnic Minorities Worldwide, New Research Says

SOPA Images/LightRocket via Getty Images China-based surveillance campaigns are using Android malware to spy on Uighur Muslims and other ethnic minorities worldwide, according to new research from mobile cybersecurity firm Lookout.Lookout It’s not known how many Uighurs, Tibetans and other ethnic minorities have downloaded apps containing the malware.

'How I caught my online scammer – and Facebooked his mum'

'How I caught my online scammer – and Facebooked his mum'

Image copyright Christian Haschek Image caption Security researcher Christian Haschek says he has mixed feelings about catching the scammer A cybersecurity researcher living in Austria who was scammed out of $500 (£375) says his money was returned after he tracked down the scammer's family and contacted them on Facebook.

Report finds massive drop in Canadians’ willingness to disclose personal information for free online services

Report finds massive drop in Canadians’ willingness to disclose personal information for free online services

The report will help inform policy discussions ahead of the Canadian Internet Governance Forum, which has been rescheduled to November 24th and 25th due to COVID-19.Overall, the report shows Canadians growing anxiety about cybersecurity-related issues, including a significant drop in their willingness to disclose personal information for better content and services online.

Why small businesses should buy VPN subscriptions for their employees

Why small businesses should buy VPN subscriptions for their employees

While large businesses often utilize site to site VPNs as part of their cybersecurity plan, the conventional wisdom has often been that small businesses don’t need to protect the internet use of their employees – this is a dangerous mentality that needs to be changed.

Reject the "EARN IT Act" (s. 3398) which threatens free speech, encryption, privacy, and the nation's cybersecurity.

Reject the "EARN IT Act" (s. 3398) which threatens free speech, encryption, privacy, and the nation's cybersecurity.

We the people call upon Congress & this administration to protect our liberties, privacy, and security online as a nation by rejecting the EARN IT Act.

Hospitals Outdated Operating Systems Might Leave Patients Data at Risk!

Hospitals Outdated Operating Systems Might Leave Patients Data at Risk!

The research was conducted by Palo Alto Networks , a cybersecurity firm, it revealed that 83% devices ran on outdated services that can’t even be updated even when it contains several loopholes that hackers can easily bypass and exploit.

Australian Signals Directorate has already spied on Australians, boss confirms

Australian Signals Directorate has already spied on Australians, boss confirms

Noble said that “while much of our cybersecurity role, and the protection of Australia’s digital borders, is conducted domestically – ASD is prohibited by legislation from producing intelligence on Australian persons except in rare circumstances, and only then under the authority of a ministerial authorisation”.

Privacy is Cybersecurity for People

Privacy is Cybersecurity for People

Some people still imagine that companies Cybersecurity is about protecting assets like film footage from movies, or studio production tracks from recording sessions with music artists, or secret plans for the next Apple computer (duh, its another iPhone).

Hacker group targeted law firms, released veterans’ stolen data related to PTSD claims

Hacker group targeted law firms, released veterans’ stolen data related to PTSD claims

Hackers have gained access to sensitive data from at least five law firms in the past four months, releasing stolen data that includes pain diary entries from veterans’ personal injury cases, Emsisoft, a cybersecurity and anti-malware company, told Military Times.

Get yourself cybersecure for 2020

Get yourself cybersecure for 2020

“Most of the answers to security questions like these are easily acquired by hackers,” Tom Lysemose Hansen, founder of mobile app security vendor Promon, explains, “using simple trial-and-error methods based on LinkedIn, Facebook, Twitter and even Wikipedia data, which give away much of our personal and family details.” Indeed, it’s incredible, and incredibly worrying, what a simple Google search can uncover.

New Intel CPU Vulnerability Puts Protected Data At Risk

New Intel CPU Vulnerability Puts Protected Data At Risk

Intel CPUs are at the center of controversy once again as yet another vulnerability is discovered by Cybersecurity researchers.According to their findings, the security vulnerability can compromise SGX (software guard extensions) protected by undervolting the CPU when executing protected computations, to the degree that the SGX memory encryption failed to protect data.

It's privacy vs innovation as Google collects data on 50M medical patients

It's privacy vs innovation as Google collects data on 50M medical patients

The companies say it will improve patient care and administration, but the strategy has also sparked concern among certain consumer advocates, cybersecurity experts and reportedly some Ascension employees — especially because neither patients nor doctors had been previously been notified of this data-sharing arrangement.

Why hospitals are a weak spot in U.S. cybersecurity

Why hospitals are a weak spot in U.S. cybersecurity

"Cybercriminals know they are a soft target where they can access patient records and social security numbers and other information," Suzanne Schwartz, a deputy director in the FDA's device center, tells Axios.

Lawmakers ask US intelligence chief to investigate if TikTok is a national security threat

Lawmakers ask US intelligence chief to investigate if TikTok is a national security threat

“Security experts have voiced concerns that China’s vague patchwork of intelligence, national security, and cybersecurity laws compel Chinese companies to support and cooperate with intelligence work controlled by the Chinese Communist Party,” the letter, dated Wednesday, said.

Sberbank Hit by Huge Data Breach

Sberbank Hit by Huge Data Breach

The personal details of millions of Sberbank customers may have been leaked, in what would be the largest-ever data breach in Russian banking, according to cyber security experts.Analysts at cybersecurity firm DeviceLock found personal information relating to up to 60 million Sberbank credit card holders for sale on the black market.

Starting December 1st, China’s new MLPS 2.0 cybersecurity laws will require submission of a facial scan to receive internet access

Starting December 1st, China’s new MLPS 2.0 cybersecurity laws will require submission of a facial scan to receive internet access

China’s new MLPS (Multi-level Protection of Information Security) 2.0 cybersecurity laws goes into full effect on December 1st, 2019 and will see all internet service providers (ISPs) and mobile data providers requiring facial scans to sign up for new service.

Planting Tiny Spy Chips in Hardware Can Cost as Little as $200

Planting Tiny Spy Chips in Hardware Can Cost as Little as $200

More than a year has passed since Bloomberg Businessweek grabbed the lapels of the cybersecurity world with a bombshell claim: that Supermicro motherboards in servers used by major tech firms, including Apple and Amazon, had been stealthily implanted with a chip the size of a rice grain that allowed Chinese hackers to spy deep into those networks.

Can you give away your fingerprints in a photo?

Can you give away your fingerprints in a photo?

Going to such lengths to protect your fingerprints might seem extreme, but incentives to bypass biometric security are growing as it increasingly shows up in everything from smartphones to door locks.“As biometrics become more prevalent in the authentication process, motivated attackers will definitely find innovative ways to bypass them,” said Vivek Chudgar, senior director at Mandiant, a consulting arm of cybersecurity firm FireEye. But some experts say harvesting fingerprints from pictures requires some specific conditions.

Over half a million active GPS trackers have ‘123456’ as default password

Over half a million active GPS trackers have ‘123456’ as default password

Back in May, UK cybersecurity firm Fidus Information Security revealed a vulnerability in a popular GPS tracker used by elderly patients that can be tricked into sending its real-time location simply by sending it a text message with a specific command.

More