Exclusive: Hacker selling 500 million Facebook user data from 82 countries

Exclusive: Hacker selling 500 million Facebook user data from 82 countries

Now, a hacker or call them a threat actor is claiming to have access to a database with 500 million Facebook user data from 82 countries.Remember, third-party firms can use data scrapping, a fairly common practice to extract the personal information of users from websites like Facebook or Twitter.

Hacker leaks 2.3 million Indonesian citizenship data for download

Hacker leaks 2.3 million Indonesian citizenship data for download

What’s worse for Indonesian citizens is that the threat actor is claiming to have access over 200 million Indonesian citizenship data which they plan to leak on the hacker forum where the electoral data is currently being traded.

GoDaddy reports data breach involving SSH access on hosting accounts

GoDaddy reports data breach involving SSH access on hosting accounts

GoDaddy on Tuesday reported [PDF] an October data breach to Californian authorities, stating that an unauthorised individual was able to access SSH accounts used in its hosting environment.

You Could Get Jailed For Not Installing Aarogya Setu App: Noida Police

You Could Get Jailed For Not Installing Aarogya Setu App: Noida Police

However, the police officials of Noida and Greater Noida have said that they will let go of the people who agree to download the app in front of them at the time of checking.

Children’s computer game Roblox insider tricked by hacker for access to users’ data

Children’s computer game Roblox insider tricked by hacker for access to users’ data

A hacker who bribed a worker for the online video game Roblox managed to gain access to the personal information of a smaller number of users, the ability to change passwords and email addresses, and allocate in-game currency.

Indonesia's Tokopedia probes alleged data leak of 91 million users

Indonesia's Tokopedia probes alleged data leak of 91 million users

SINGAPORE (Reuters) - Tokopedia, Indonesia’s largest e-commerce platform, said it was investigating an attempted hack and claims that the details of millions of its users had been leaked online.

Imperiled information

Imperiled information

Metropolitansky and Attari wondered if they could identify an individual across all other leaks that have occurred, combining stolen personal information from perhaps hundreds of sources.

Ring Doorbell Hack Lawsuits

Ring Doorbell Hack Lawsuits

Multiple class action lawsuits have been filed alleging that Ring has failed to implement “even the most basic” security measures to protect its customers.Multiple class action lawsuits have been filed against Ring LLC following reports of hackers infiltrating the company’s camera systems and terrorizing homeowners and their children.

Ring hit with class action lawsuit for 'failure to take basic security precautions'

Ring hit with class action lawsuit for 'failure to take basic security precautions'

The lawsuit, which was filed earlier this month in the United States District Court, claims that Ring has shirked basic security measures that would help protect camera owners' accounts, even though the company has known that its devices are a popular target for hackers.

Beset by lawsuits over poor security protections, Ring rolls out 'privacy dashboard' for its creepy surveillance cams, immediately takes heat

Beset by lawsuits over poor security protections, Ring rolls out 'privacy dashboard' for its creepy surveillance cams, immediately takes heat

On Monday, in time for this year's CES in Las Vegas, the home surveillance camera and internet-connected doorbell specialist made a point of unveiling an account control panel it hopes will allow users to better manage the access settings on their devices and keep hackers and other intruders out.

Ring and Amazon get slammed with a federal lawsuit that claims the companies failed to secure cameras against hackers

Ring and Amazon get slammed with a federal lawsuit that claims the companies failed to secure cameras against hackers

The lawsuit alleges that, as a manufacturer of security products, Ring failed to meet its „most basic obligation by not ensuring its Wi-Fi enabled cameras were protected against cyber-attack.“ It also argues that Ring and Amazon sought to avoid responsibility by blaming users for not implementing proper security measures despite knowing the risks of not requiring things like two-factor authentication.

267 Million Names And Phone Numbers Leaked Online — And They’re All From Facebook

267 Million Names And Phone Numbers Leaked Online — And They’re All From Facebook

Recently, a security researcher named Bob Diachenko found a database of user account info including their name and phone numbers for 267 million Facebook users.There’s no new information about how users can find out if their data was hacked and if the database is still being shared on hacker forums.

Hacker accesses Ring camera in little girl’s bedroom to tell her he’s Santa

Hacker accesses Ring camera in little girl’s bedroom to tell her he’s Santa

That said, there’s a lot of steps you can take to keep your passwords safe and protect your Ring security camera from being hacked, including enabling two-factor authentication and regularly changing your password.

1.2 billion people exposed in data leak includes personal info, LinkedIN, Facebook

1.2 billion people exposed in data leak includes personal info, LinkedIN, Facebook

The data within the three different PDL indexes also varied slightly, some focusing on scraped LinkedIN information, email addresses and phone numbers, while other indexes provided information on individual social media profiles such as a person’s Facebook, Twitter, and Github URLs. According to their website, the PDL application can be used to search: Over 1.5 Billion unique people, including close to 260 million in the US.

Vulnerability In Ring Doorbells Left the Door Open for Hackers to Open the Door

Vulnerability In Ring Doorbells Left the Door Open for Hackers to Open the Door

Bitdefender–the tireless actuary of the Internet of Things–were able to crack into homeowner’s personal WiFi networks via Amazon’s Ring doorbells, the video-enabled auto-locks that allow homeowners to remotely open the door.Balan told us that the vulnerability was discovered following a request from PCMag to look into the device and that it’s now been patched.

Planting Tiny Spy Chips in Hardware Can Cost as Little as $200

Planting Tiny Spy Chips in Hardware Can Cost as Little as $200

More than a year has passed since Bloomberg Businessweek grabbed the lapels of the cybersecurity world with a bombshell claim: that Supermicro motherboards in servers used by major tech firms, including Apple and Amazon, had been stealthily implanted with a chip the size of a rice grain that allowed Chinese hackers to spy deep into those networks.

Facebook, Google, and Oracle cloud are tracking the porn you watch in private

Facebook, Google, and Oracle cloud are tracking the porn you watch in private

“The sites Jack visits, as well as any third-parties trackers, may observe and record his online action,” the study reads.“These third-parties may even infer Jack’s sexual interests from the URLs of the sites he visits.

Why You Should Never Borrow Someone Else's Charging Cable

Why You Should Never Borrow Someone Else's Charging Cable

For the moment, Henderson says, a bigger threat than malicious charging cables is USB charging stations you see in public places like airports.Many travelers know that, in a pinch, the hotel front desk will often have a drawer of charging cables that were left behind by guests.

These Legit-Looking iPhone Lightning Cables Will Hijack Your Computer

These Legit-Looking iPhone Lightning Cables Will Hijack Your Computer

Instead, it had been modified to include an implant; extra components placed inside the cable letting the hacker remotely connect to the computer.

Clothing marketplace Poshmark confirms data breach

Clothing marketplace Poshmark confirms data breach

The company said in a brief blog post that user profile information, including names and usernames, gender and city data was taken by an “unauthorized third party.” Email addresses, size preferences and scrambled passwords were also taken.

5 big questions to ask companies before entrusting them with your personal data

5 big questions to ask companies before entrusting them with your personal data

Given the number of data breaches and privacy violations in recent years involving companies from Equifax EFX, -0.67% to Facebook FB, -0.77%, some people might only be surprised if their personal data was not hacked, said Britt Siedentopf, vice president of services at Global Asset, a cybersecurity and IT support firm in the Dallas, Texas metro area.

Massive Capital One breach exposes personal info of 100 million Americans

Massive Capital One breach exposes personal info of 100 million Americans

Banking institution Capital One has just revealed that it’s suffered a data breach that exposed the names, addresses, phone numbers, emails, dates of birth, and self-reported incomes of approximately 100 million Americans, and 6 million in Canada, due to a “configuration vulnerability” in the servers of an unnamed cloud computing company hosting the bank’s data.

Is someone watching me? — Webcam Security

Is someone watching me? — Webcam Security

People worldwide are encountering cyberattacks like getting their computers infected by malware and letting others access their webcams or microphones. With a malicious code a hacker can easily control your computer and perform many different actions like access your webcam.

Hackers breach FSB contractor, expose Tor deanonymization project and more

Hackers breach FSB contractor, expose Tor deanonymization project and more

Hackers have breached SyTech, a contractor for FSB, Russia's national intelligence service, from where they stole information about internal projects the company was working on behalf of the agency -- including one for deanonymizing Tor traffic.

Data of Nearly Every Adult in Bulgaria Likely Stolen in Cyberattack

Data of Nearly Every Adult in Bulgaria Likely Stolen in Cyberattack

The Bulgarian public first caught light of the hack on Monday, after someone claiming to be the hacker behind the attack contacted several local media outlets to say that they had stolen the personal information of more than five million citizens (in a country with a population of 7 million), and shared some of the data they had stolen.

Attack by Chinese hacker group targeted high-profile individuals around the world

Attack by Chinese hacker group targeted high-profile individuals around the world

A hacker attack of impressive magnitude targeted specific individuals of interest to the Chinese government as they moved around the world, in what appears to be the first such operation in the history of cyberespionage.

Tokyo 2020 will be the first Olympic Games to use facial recognition

Tokyo 2020 will be the first Olympic Games to use facial recognition

Select attendees of the games — including athletes, media, staff, and volunteers — will have their identities verified via a face scan to enter venues, the Tokyo Organizing Committee said in an announcement.

Cyberstalking Techniques: What Stalkers Can Do If They Have Your Name & Surname (Part I)

Cyberstalking Techniques: What Stalkers Can Do If They Have Your Name & Surname (Part I)

Your stalker can simply enter name/surname to Maltego’s database, and see what contact information is available about his victim online: what emails, what domains have a person by the same name are registered.

Most popular types of cyber attacks against individual users, part I

Most popular types of cyber attacks against individual users, part I

My prediction is that phishing attacks will become more sophisticated because of substantial data leaks that exposed private information to hackers. The three cyber attacks that I mentioned above benefit from such leaks, and it will take some time to train the required number of cybersecurity specialists.

The Trade Secret: Firms That Promised High-Tech Ransomware Solutions Almost Always Just Pay the Hackers

The Trade Secret: Firms That Promised High-Tech Ransomware Solutions Almost Always Just Pay the Hackers

Siegel refers to a handful of firms globally, including Proven Data and MonsterCloud, as “ransomware payment mills.” They “demonstrate how easily intermediaries can prey on the emotions of a ransomware victim” by advertising “guaranteed decryption without having to pay the hacker,” he said in a blog post.