UK’s largest airline, easyJet, reveals January 2020 breach of 9 million customer records

UK’s largest airline, easyJet, reveals January 2020 breach of 9 million customer records

All in all, approximately 9 million customers were affected by the EasyJet hack.The EasyJet disclosure also revealed that 2,208 of the 9 million affected customers had their credit card information accessed but nobody had their passport records accessed.easyJet breach affects 9 million customers.

GoDaddy Confirms Data Breach: What 19 Million Customers Need To Know

GoDaddy Confirms Data Breach: What 19 Million Customers Need To Know

The email notification stated that, upon an investigation of the incident, it was determined that an "unauthorized individual" had gained access to login credentials that meant they could "connect to SSH" on the affected hosting accounts.

Free online 'threat blocker' launched in Canada as successful COVID-19 scams multiply

Free online 'threat blocker' launched in Canada as successful COVID-19 scams multiply

As the number of successful pandemic-related scams continues to grow online, Canada's cyber spy agency is helping to launch a new — and free — threat-blocking tool for all Canadians to use.

The Coronavirus Class Divide: Space and Privacy

The Coronavirus Class Divide: Space and Privacy

“Bleak House,” the 1852 novel some consider Dickens’s best, even traces the class lines of an epidemic, revealing its two-sided logic: Its threat is universal, but its real-world damage concentrates on the poor.

Linux Security: Chinese State Hackers May Have Compromised ‘Holy Grail’ Targets Since 2012

Linux Security: Chinese State Hackers May Have Compromised ‘Holy Grail’ Targets Since 2012

Decade of Chinese RATs. This new research adds to that concern, claiming that a concerted effort involving five Chinese advanced persistent threat (APT) groups has been focused on the Linux servers that "comprise the backbone of the majority of large data centers responsible for the some of the most sensitive enterprise network operations."

Google and Facebook Should Not Give Your Location Data to the Government. Even to Stop Coronavirus

Google and Facebook Should Not Give Your Location Data to the Government. Even to Stop Coronavirus

We don't need the government tracking our location.The government wants to track your location to make sure you're not getting too close to other people.

Hospitals Outdated Operating Systems Might Leave Patients Data at Risk!

Hospitals Outdated Operating Systems Might Leave Patients Data at Risk!

The research was conducted by Palo Alto Networks , a cybersecurity firm, it revealed that 83% devices ran on outdated services that can’t even be updated even when it contains several loopholes that hackers can easily bypass and exploit.

Coronavirus Phishing Attacks Aim to Spread Malware Infection

Coronavirus Phishing Attacks Aim to Spread Malware Infection

“The sole intention of these threat actors is to play on the public’s genuine fear to increase the likelihood of users clicking on an attachment or link delivered in a malicious communication, to cause infection, or for monetary gain.

Chinese state 'likely' linked to cyber spies targeting human rights workers

Chinese state 'likely' linked to cyber spies targeting human rights workers

The espionage group, dubbed Bronze President, deployed malware against its alleged victims to monitor their activities and steal documents, according to the assessment released on Sunday by Secureworks , a US-based cyber security company.

Not so IDLE hands: FBI program offers companies data protection via deception

Not so IDLE hands: FBI program offers companies data protection via deception

Sometimes, that involves field agents proactively contacting companies when they have information of a threat—as two FBI agents did when they caught wind of researchers trying to alert casinos of vulnerabilities they said they had found in casino kiosk systems.

California Woman Sues TSA For Detaining Her, Forcing Her to Submit to “Groin Search”

California Woman Sues TSA For Detaining Her, Forcing Her to Submit to “Groin Search”

I knew that TSA screeners were unable to force a traveler to comply, and that their only lawful option is to allow the traveler to leave the checkpoint into the non-secure area, so I continued my refusal until they let me go.

ThreatList: Healthcare Breaches Spike in October

ThreatList: Healthcare Breaches Spike in October

There was also a breach at Texas Health Resources thanks to a mailing error, which involved a total of 82,577 records.In all, October saw healthcare organizations and business associates in 24 states report data breaches (Texas’ 15 accounting for most of them).

Researchers unearth malware that siphoned SMS texts out of telco’s network

Researchers unearth malware that siphoned SMS texts out of telco’s network

If an SMS message contained either a phone number or an IMSI number that matched the predefined list, it was saved to a CSV file for later theft by the threat actor.

Lawmakers ask US intelligence chief to investigate if TikTok is a national security threat

Lawmakers ask US intelligence chief to investigate if TikTok is a national security threat

“Security experts have voiced concerns that China’s vague patchwork of intelligence, national security, and cybersecurity laws compel Chinese companies to support and cooperate with intelligence work controlled by the Chinese Communist Party,” the letter, dated Wednesday, said.

Massachusetts: Tell Your Lawmakers to Press Pause on Government Face Surveillance

Massachusetts: Tell Your Lawmakers to Press Pause on Government Face Surveillance

Massachusetts residents: tell your legislature to press pause on government use of face surveillance throughout the Commonwealth.The city council of Somerville, Massachusetts voted unanimously in July to ban government face surveillance altogether, becoming the first community on the East coast to do so.

Obsessed fan finds Japanese idol's home by zooming in on her eyes

Obsessed fan finds Japanese idol's home by zooming in on her eyes

Matsuoka, 21, a member of the J-pop group Tenshitsukinukeniyomi (天使突抜ニ読ミ), was attacked outside her home in Tokyo on Sept 1 by Sato, who had been waiting at a bus stop.

Vulnerability in WebEx and Zoom allows hackers to access their sessions

Vulnerability in WebEx and Zoom allows hackers to access their sessions

Vulnerability testing specialists point out that any web application that uses numeric or alphanumeric identifiers is exposed to enumeration attacks.

This Site Uses AI to Find Issues in Privacy Policies

This Site Uses AI to Find Issues in Privacy Policies

Guard is a site that uses AI to read epically long privacy policies and then highlight any aspects of them that might be problematic.For now, you’re limited to seeing ratings for only services Guard has decided to analyze, which includes most of the major apps out there like youTube, Reddit, Spotify, and Instagram.

Opinion | Stop Surveillance Humanitarianism

Opinion | Stop Surveillance Humanitarianism

For humanitarian organizations, monitoring and collecting data are essential for delivering the right amount of aid to the right people at the right place and time.International organizations that deploy large-scale identity collection systems can become the largest data brokers in a crisis region.

Google Finally Confirms Security Problem For 1.5 Billion Gmail And Calendar Users

Google Finally Confirms Security Problem For 1.5 Billion Gmail And Calendar Users

Google is finally working on a fix for a security problem that leaves more than a billion Calendar users exposed to attack.The threat actors craft their messages to include a malicious link, leveraging the trust that user familiarity with calendar notifications brings with it.

AI-powered cameras become new tool against mass shootings

AI-powered cameras become new tool against mass shootings

Police, retailers, stadiums and Fortune 500 companies are also using intelligent video.“What we’re really looking for are those things that help us to identify things either before they occur or maybe right as they occur so that we can react a little faster,” Hildreth said.

Why You Should Never Borrow Someone Else's Charging Cable

Why You Should Never Borrow Someone Else's Charging Cable

For the moment, Henderson says, a bigger threat than malicious charging cables is USB charging stations you see in public places like airports.Many travelers know that, in a pinch, the hotel front desk will often have a drawer of charging cables that were left behind by guests.

Google removes stalkerware apps after researchers discover trackers on Play Store

Google removes stalkerware apps after researchers discover trackers on Play Store

"These apps are highly unethical and problematic for people's privacy and shouldn't be on the Google Play Store, as they promote criminal behavior, and can be abused by employers, stalkers or abusive partners to spy on their victims," Nikolaos Chrysaidos, Avast's head of mobile threat intelligence and security, said in a statement.

In Defense of Privacy

In Defense of Privacy

Media coverage of the threat to personal privacy from technology tends to follow a narrative in which privacy is a virtue, Big Tech its evil predator and government the good knight capable of protecting it.".

Google Confirms Android Smartphone Security Backdoor

Google Confirms Android Smartphone Security Backdoor

Earlier this year, Forbes reported how a banking Trojan called Triada had been found on a bunch of brand new budget Android smartphones. Google has now confirmed that threat actors did, indeed, manage to compromise Android smartphones with the installation of a backdoor as part of a supply chain attack.

Millions of Golfers Land in Privacy Hazard After Cloud Misconfig

Millions of Golfers Land in Privacy Hazard After Cloud Misconfig

Unfortunately, Game Golf landed its users in a sand trap of privacy concerns by not securing the database: Security Discovery senior security researcher Jeremiah Fowler said that the bucket included all of the aforementioned analyzer information, plus profile data like usernames and hashed passwords, emails, gender, and Facebook IDs and authorization tokens.

Why 5G is a huge future threat to privacy

Why 5G is a huge future threat to privacy

The same news item includes details about the concerns of Christopher Krebs, director of the US Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency: First, Krebs said, “the quality of the engineering is not great, and so there are a number of vulnerabilities that are left open on the box, so China and other capable actors – Russia, Iran, North Korea – could exploit the vulnerabilities”.

How to tell if your PC is cryptojacked

How to tell if your PC is cryptojacked

One particularly sinister emerging threat is cryptojacking , which can increase overheating, slow down processing speed, and drain your batteries – all under the radar.

EFF’s New ‘Threat Lab’ Dives Deep into Surveillance Technologies—And Their Use and Abuse

EFF’s New ‘Threat Lab’ Dives Deep into Surveillance Technologies—And Their Use and Abuse

EFF is proud to announce its newest investigative team: the Threat Lab. Using a combination of research skills, the Threat Lab will take a deep dive into how surveillance technologies are used to target communities, activists, or individuals.

Microsoft researchers spot NSA style backdoor in Huawei laptops

Microsoft researchers spot NSA style backdoor in Huawei laptops

The Microsoft Defender Advanced Threat Protection (ATP) service featured in Windows 10 version 1809 alerted researchers to an NSA-inspired backdoor vulnerability in Huawei laptops. The PCManager software included in some Huawei’s Matebook systems allows unprivileged users to create processes with superuser privileges, according to a March 25 Microsoft security post.