FireSale HackBoy

Knowledge Shared By FireSale HackBoy...

Thursday, May 31, 2018

These Chrome extensions & Android apps collect your Facebook data

By Waqas The data collection is not limited to Facebook data but This is a post from HackRead.com Read the original post: These Chrome extensions & Android apps collect your Facebook data May 31, 2018 at 08:11...

Channel Insider Interview: Driving Partner Profitability with a Gemalto Partnership

Imagine adding a new vendor to your partner line up and increasing your bottom line profitability by 5% within one year?   That is exactly the incredible success “Emerging Partner of the Year” CompuNet has had with Gemalto’s Cipher Partner program. “Gemalto year over year bookings grew by 5x. Average gross margin in 2017 increased by 5% putting Gemalto in the top tier of our solution offerings in terms of profitability.  Across the board, we view Gemalto as a strategic partner enabling profitability and other pull through opportunities...

Cyber Attack on Ticketfly

San Francisco based Ticketfly.com, an online ticket distribution service provider has made it official that its database was targeted by hackers on May 30, 2018 and so has been pulled down as a precautionary measure. Sources reporting to Cybersecurity Insiders say that the attack was launched by a hackers group known as IsHaKdZ. The group is said to be demanding a ransom to decrypt the database and warned that ‘zero response’ from the authorities of Ticketfly will make them publish the database “backstage”. Meanwhile, the ‘Indie’ focused ticketing...

Cloud Security Trailing Cloud App Adoption in 2018

This post was originally published here by  Jacob Serpa. In recent years, the cloud has attracted countless organizations with its promises of increased productivity, improved collaboration, and decreased IT overhead. As more and more companies migrate, more and more cloud-based tools arise. In its fourth cloud adoption report, Bitglass reveals the state of cloud in 2018. Unsurprisingly, organizations are adopting more cloud-based solutions than ever before. However, their use of key cloud security tools is lacking. Read on to learn more. The...

Wednesday, May 30, 2018

From novelty to necessity: the evolution of biometrics

Interest in biometrics has skyrocketed in recent years, since the adoption of mobile technologies for accessing various applications in the digital world. But if you look beyond the current trend, we must remember that biometrics are not a new identification technology. For thousands of years, people have recognized one another through their faces, voices and expressions –...

More women needed in Cybersecurity field

It’s evident that Cybersecurity field seems to be ever-evolving. But as usual, the shortage of women in the said professional sphere is clearly evident, as only 11% of Cybersecurity jobs have been occupied by the said gender across the globe. However, the good news is that companies like Palo Alto Networks and Symantec Corp are trying their best to generate interest among young girls to such an extent that they are showing a lot of interest in choosing Cybersecurity as their future career. In fact, Palo Alto Networks has developed a special curriculum...

Multiple Internet-Connected BMW vehicles vulnerable to getting hacked

By Waqas In total, researchers have identified 14 vulnerabilities in Multiple Internet-Connected BMW This is a post from HackRead.com Read the original post: Multiple Internet-Connected BMW vehicles vulnerable to getting hacked May 30, 2018 at 08:11...

Webinar: How to overcome challenges when securing modern cloud environments

This post was originally published here by casey pechan. Our latest webinar, How to overcome challenges in securing modern cloud environments, dives into how you can cope with new security challenges that you may be re-assessing as you examine your security posture and strategy. And here’s why: As more workloads shift to the cloud, cybersecurity professionals remain concerned about the security of data, systems, and services in the cloud.  Legacy security tools weren’t built for dynamic, virtual and distributed cloud environments. This...

Bitglass Security Spotlight: Twitter, PyRoMine, & Stresspaint

This post was originally published here by  Jacob Serpa. Here are the top cybersecurity stories of recent weeks: Twitter exposes user credentials in plaintext PyRoMine mines Monero and disables security Stresspaint malware hunts Facebook credentials MassMiner malware mines cryptocurrency Access Group Education Lending breached Twitter exposes user credentials in plaintext Despite the fact that Twitter doesn’t store or display users’ credentials in plaintext, the social media company recently had a security mishap. Passwords were stored...

Tuesday, May 29, 2018

Four Gemalto Women Recognized as CRN’s 2018 Women of the Channel

Each year, Computer Reseller News (CRN) honors hundreds of women for their IT channel expertise and vision. Their Women of the Channel list includes some of the most powerful women in IT who are being recognized by CRN for their outstanding leadership, vision and unique role in driving channel growth and innovation. I would like to congratulate Gemalto’s own Colleen McMillan,...

#ICANDOCYBER: Denise Murtagh-Dunne

by Denise Murtagh-Dunne, Information Security Manager, PWC Ireland From my early childhood, I developed a passion for unravelling the mysteries of how machines worked. My father was a mechanic and, as a child, he would let me help taking car engines apart. This is where I first developed a fascination with getting “under the hood” of machines and understanding their inner...

Hackers are turning Webcam users into slaves

All those who thought that Facebook founder Mark Zuckerberg and Ex-FBI Director James Comey were covering their webcams with tape just for fun, here’s a fact to enlighten your minds. A Symantec based security expert named Candid Wueest says that hackers are nowadays turning webcam users into slaves by recording their secret activity through their computer and blackmailing them in exchange for money in the form of cryptocurrency. Wueest stated that the cyber crooks may also get hold of all the intimate recordings you shared with your BF/GF and start...

Hackers demand $1m ransom after stealing data from 2 Canadian banks

By Uzair Amir Hackers have stolen financial data of thousands of customers – This is a post from HackRead.com Read the original post: Hackers demand $1m ransom after stealing data from 2 Canadian banks May 29, 2018 at 07:24...

Watch thieves steal keyless Mercedes within 23 seconds

By Waqas As recently as May 17th, 2018, a security camera recorded This is a post from HackRead.com Read the original post: Watch thieves steal keyless Mercedes within 23 seconds May 29, 2018 at 04:23...

Monday, May 28, 2018

10 years prison for man who hacked 200 firms & sold data on Dark Web

By Waqas The hacker also sold drugs on Dark Web and taught This is a post from HackRead.com Read the original post: 10 years prison for man who hacked 200 firms & sold data on Dark Web May 28, 2018 at 11:24...

This Chrome extension reveals if your password has been breached

By Waqas Okta has introduced new password manager PassProtect in its latest, This is a post from HackRead.com Read the original post: This Chrome extension reveals if your password has been breached May 28, 2018 at 07:41...

Bank of Montreal hit by Cyber Attack

Bank of Montreal(BMO), known to be Canada’s fourth largest financial service corporation said on Monday that it was hit by a cyber attack in which some hackers got hold of personal information of some of the BMO customers and were trying to blackmail the higher authorities of the financial institution to mint money. An official statement released just a few minutes ago says that the cyber crooks could have got hold of the data from third parties operating outside the country and assured that the exposure could have been related to the accounts...

Man arrested for possession of 58 terabytes of child sexual abuse material

By Carolina On May 15th, 2018, a man from Allen city Texas This is a post from HackRead.com Read the original post: Man arrested for possession of 58 terabytes of child sexual abuse material May 28, 2018 at 06:15...

Sunday, May 27, 2018

Cola-Cola breach: ex-employee stole hard drive with 8,000 workers’ data

By Carolina The world-renowned carbonated soft drink producer Cola-Cola has announced that it has This is a post from HackRead.com Read the original post: Cola-Cola breach: ex-employee stole hard drive with 8,000 workers’ data May 27, 2018 at 10:35...

Check Out the Delta Risk Cyber Security Blog – Page 1

I have spent the most notable years of my career helping organizations improve their cyber security incident response plans. To do this effectively, we dive in, ask questions, consider scenarios, look at contingencies, and identify gaps. It has personally been very rewarding for me because planning is in my core – I rarely fly by the seat of my pants, and usually have multiple...

Saturday, May 26, 2018

New cryptojacking malware hits Mac devices

By Waqas There is no doubt about the fact that cryptojacking malware This is a post from HackRead.com Read the original post: New cryptojacking malware hits Mac devices May 26, 2018 at 10:29...

Hackers deface Airport screens in Iran with anti-government messages

By Waqas On Thursday 24th May, the airport screens at Mashhad city in northeast This is a post from HackRead.com Read the original post: Hackers deface Airport screens in Iran with anti-government messages May 26, 2018 at 09:25...

Announcing support for Alpine!

Earlier this year we released CloudPassage Container Secure and we’re pleased to say that since that release, we’ve received some phenomenal feedback from our customers. This customer feedback hasn’t gone unnoticed, and we have spent the last few months using it to continuously improve our Container Secure capabilities. So thanks to your input we have some new additions the we’re pleased to announce: along with the CoreOS support rollout we released in February, we have released support for Alpine! Alpine’s lightweight and security-aware platform...

Friday, May 25, 2018

Hundreds of Android devices shipped with pre-installed malware

By Waqas It is commonly believed that a brand new handset would This is a post from HackRead.com Read the original post: Hundreds of Android devices shipped with pre-installed malware May 26, 2018 at 12:04...

Bitcoin Gold loses over $18 million after hack attack

By Waqas Hackers are conducting Double Spend attack on cryptocurrency exchanges and the This is a post from HackRead.com Read the original post: Bitcoin Gold loses over $18 million after hack attack May 25, 2018 at 09:19...

Amazon Alexa overhears a couple’s private conversation and sends it to their random contacts as an audio file

Alexa, the virtual assistant operating in the Amazon Smart Speakers named ECHO is said to have overheard a private conversation of a couple in Portland and alleged to have sent that conversation to one of their random contacts, triggering data privacy concerns. According to a report disclosed by a Seattle based television station KIRO, Alexa, the digital assistant on Amazon Echo devices recorded a private conversation between a woman named Danielle and her husband and sent that conversation as an audio file to the boss of the husband. The incident...

Pornhub’s VPNhub is a free VPN for everyone

By Carolina Looking for a free VPN service? Look no further, believe This is a post from HackRead.com Read the original post: Pornhub’s VPNhub is a free VPN for everyone May 25, 2018 at 06:49...

Thursday, May 24, 2018

What’s Your GDPR Readiness Personality? The Results Are In.

With General Data Protection Regulation enforcement now days away, those involved with compliance could probably use some light relief. As you may have spotted, we’ve been doing our bit on that front over the last few weeks running our “GDPR Animal” Personality Quiz. So how did you compare to your peers and what, if any, conclusions can we draw from this highly unscientific...

Chapter Spotlight: SSDC

On May 7th and 8th, (ISC)² hosted its annual Secure Summit D.C. (SSDC) cybersecurity conference. (ISC)² Secure Summit DC evolved from (ISC)² CyberSecureGov to assemble the best minds in cybersecurity for two days of insightful discussions, workshops and best-practices sharing. Three local (ISC)² Chapters were represented at the event: Quantico Chapter, National Capital Region...

Ransomware attacks surge Cyber Insurance claims in Europe

Ransomware attacks have surged cyber insurance claims in Europe says a report compiled by AIG, one of the largest cyber insurers on the globe. The data shows that the financial institution has received as many cyber claims last year as in the previous four years from companies operating in Europe, Middle East, and Africa. AIG report also disclosed that the rise in claims stats was a result of a surge in ransomware attacks, in which hackers decrypt a database from further access until a ransom is paid to them in Cryptocurrencies such as Bitcoins...

Teen monitoring app exposes plaintext Apple ID passwords of its users

By Uzair Amir A popular teen monitoring app has become a victim of a This is a post from HackRead.com Read the original post: Teen monitoring app exposes plaintext Apple ID passwords of its users May 24, 2018 at 07:46...

Personal Data of 200M Japanese sold on underground hacking forums

By Waqas A cybercriminal operating from outside China was found to be This is a post from HackRead.com Read the original post: Personal Data of 200M Japanese sold on underground hacking forums May 24, 2018 at 03:08...

Wednesday, May 23, 2018

Gemalto EVOLUTION: Helping Businesses Adapt to Digital Transformation

Organizations across various industry verticals are undergoing or have transformed their business in order to move into the digital economy. Some have embraced online transactions, while others have brought on mobile apps and countless more are moving to consumption-based IT models such as the cloud. Digital transformation presents organizations with numerous business advantages...

Biometrics and the next financial sector revolution

In little more than five years, the financial services industry has went through a great transformation. Driving the breakneck pace of change is an ambitious new breed of fintechs, but also well-established tech companies and banks with histories stretching back centuries. Commercial success has gone hand in hand with fundamental changes to consumer behaviour – from paying for something with a wave of our phone to immediately transferring funds to a friend via an app. But the elephant in the room is security – which in the rush to innovate, has...

Russian hackers infect 500,000 routers to launch a massive cyber attack on Ukraine

Cisco Systems Inc on Wednesday issued a warning that says hackers from Russia have infected over 500,000 routers including storage devices in order to launch a massive cyber attack on Ukraine. The Networking giant stressed on the fact that the attack will be of Denial of service attack genre and will be mainly targeting Ukraine’s critical infrastructure in Kiev. Meanwhile, a news update released by a popular news source from Kiev says that the Russian Federation has already shown cyber aggression by targeting its critical infrastructure during...

Tuesday, May 22, 2018

US President Trump shows a blind eye towards Mobile Security

US President Donald Trump is said to be rebuffing his staff efforts to strengthen security around his phone use, by failing to follow regular security protocols. According to a report published in Politico, the 45th President is said to be using two mobile phones that lack the necessary security features to conceal his communications. As per the sources reporting to Cybersecurity Insiders, Trump uses an Apple iPhone and a Samsung Galaxy phone variant for his day to day communication needs with his staff, friends, and family members. A source quotes...