FireSale HackBoy

Knowledge Shared By FireSale HackBoy...

Friday, June 29, 2018

Worse than Equifax: Personal records of 340M people leaked online

By Waqas Last year the credit reporting firm Equifax revealed how unknown This is a post from HackRead.com Read the original post: Worse than Equifax: Personal records of 340M people leaked online June 30, 2018 at 12:15...

Github refuses Microsoft’s $2 billion acquisition deal

Github, a web-based development platform for software engineers has declined the $2 billion offer of Microsoft to take over its control. But sources from Business Insider say that the proposal of Microsoft to acquire Github for the said sum has not be declined but has been kept on a temporary hold. Those reporting to Cybersecurity Insiders say that Github is interested in handing over its company controls to Satya Nadela led Microsoft Corporation for a fancy offer of $7 billion or more. It’s not immediately clear where the talks will land up in...

Gentoo Linux on Github hacked; repositories modified

By Waqas Another day, another data breach – This time, it is This is a post from HackRead.com Read the original post: Gentoo Linux on Github hacked; repositories modified June 29, 2018 at 05:35...

Now available to all Halo users: Cortex v1.1

This post was originally published here by ash wilson. We’ve just released Cortex v1.1 (https://github.com/cloudpassage/cortex), and while some changes may seem subtle, they greatly improve the functionality and efficiency of Cortex, giving you an even more seamless experience. Some of the changes you’ll see include: File-based configuration for scheduled jobs: In the original design, users could disable certain components in Cortex and re-implement them in with other automation systems. Now, we have refactored the scheduler and task dispatcher...

Thursday, June 28, 2018

Are Your Smartphones’ Batteries Spying on You?

By Kayla Matthews Most batteries in today’s smartphone are intelligent enough to detect This is a post from HackRead.com Read the original post: Are Your Smartphones’ Batteries Spying on You? June 29, 2018 at 01:41...

Digital Disruption for Mobile Operators

Traditionally the MNO has applied volume based charging models. Voice services are charged per min. Messaging services charged per message. Data services are charged per bit. The existing trajectory of the MNO will only result in possible market consolidation as seen recently with T-Mobile and Sprint in the US. The MNO has reached equilibrium in terms of growth in its traditional business and must transform itself into a business where it is operating higher in the value chain. Let’s take look at the use of Artificial Intelligence (AI) in enabling...

Tuesday, June 26, 2018

Voice records of millions of Brits stored by tax agency without consent

By Carolina According to Big Brother Watch, a British privacy advocate, and civil liberties organization, This is a post from HackRead.com Read the original post: Voice records of millions of Brits stored by tax agency without consent June 26, 2018 at 06:38...

Monday, June 25, 2018

Cyber Attacks incur $100 billion losses to Financial Institutions

Cyber Attacks are bringing in $100 billion in losses to financial institutions(FIs) says a survey conducted by International Monetary Fund(IMF). This is due to the fact that FI’s play a vital role in procuring and handling funds. According to the IMF Staff Modeling Exercise report, hackers chose FI’s as easy targets due to the fact that they can spread the attack quickly through the interconnected financial system. And because most of the financial institutes still use legacy digital systems, their defense parameters prove almost defenseless against...

Sunday, June 24, 2018

GDPR and the REAL impact on business

By Patrick Vernon General Data Protection Regulation (GDPR) has taken the world by This is a post from HackRead.com Read the original post: GDPR and the REAL impact on business June 24, 2018 at 04:14...

Bitglass Security Spotlight: Google, SynAck, & Drupal

This post was originally published here by Jacob Serpa. Here are the top cybersecurity stories of recent weeks:  Google improves G Suite’s collaboration capabilities SynAck ransomware evades antivirus software Drupal websites subject to cryptojacking Nigelthorn malware targets facebook users to mine cryptocurrency 211 LA County exposes 3.2 million files through AWS misconfiguration Google improves G Suite’s collaboration capabilities Google has recently revamped its ability to integrate with a variety of other cloud services in...

Friday, June 22, 2018

In Russia for World Cup? Beware of fake WiFi hotspots stealing user data

By Uzair Amir The Football World Cup 2018 has gathered thousands of fans This is a post from HackRead.com Read the original post: In Russia for World Cup? Beware of fake WiFi hotspots stealing user data June 22, 2018 at 05:31...

Northwestern Partners with Bitglass for Data Security

This post was originally published here by Jennifer Perisho. A few weeks ago, I had the pleasure of sitting down with Tom Murphy, the CISO of Northwestern University – a Bitglass customer. After corresponding for a few months, hoping he would meet with us to make a customer testimonial video, it finally happened! Like most interviews, it took us a few minutes to set up, but, once the interview started, he was unstoppable! For anyone unfamiliar with it, Northwestern University, based in Illinois, is one of the country’s leading research and academic...

Thursday, June 21, 2018

The Pirate Bay is down – Here are its alternatives & Dark Web domain

By Waqas It is a fact that The Pirate Bay has been This is a post from HackRead.com Read the original post: The Pirate Bay is down – Here are its alternatives & Dark Web domain June 21, 2018 at 09:16...

3 questions that will help you understand Gemalto’s 5G vision on ensuring trustworthy virtualized networks

Digital transformation and 5G introduce new risks to the confidentiality, integrity and availability of enterprise data. Trust-by-design NFV architecture must prevail. Let’s have a look at: Gemalto’s understanding of the current 5G digital transformation Gemalto’s 5G vision The best way to ensure a trustworthy 5G network 1. What do you believe is the biggest digital...

Chapter Spotlight: Hawaii

Like many chapters, the (ISC)² Hawaii Chapter has had challenges with officer vacancies, legal registration, and low attendance at events over the past three years that the chapter has held its official charter. In early 2018, the new officer board took over and began to plan events to get the information security professionals in the area together to better connect, educate,...

Wednesday, June 20, 2018

Israel Prime Minister Netanyahu simulates Cyber Attack

Israel Prime Minister Benjamin Netanyahu has urged all nations to collaborate to fight growing cyber threats on critical infrastructure. Speaking at the cybersecurity conference in Tel Aviv, the 68-year old politician faked a cyber attack on the conference by a country from another side of Israel border. He told the attendees that their bank accounts and private conversations and information were being shared with the enemy. And when everyone felt baffled by his statement, Netanyahu said that it was just a fake attack launched from behind the stage. Benjamin...

Tuesday, June 19, 2018

When Prince Harry Met Access Management

...

16 arrested for hacking Internet cafes to mine cryptocurrency

By Waqas The group of hackers mined Siacoin cryptocurrency from hacked computer This is a post from HackRead.com Read the original post: 16 arrested for hacking Internet cafes to mine cryptocurrency June 19, 2018 at 06:19...

Zacinlo malware spams Windows 10 PCs with ads and takes screenshots

By Waqas The IT security researchers at Bitdefender have discovered a sophisticated This is a post from HackRead.com Read the original post: Zacinlo malware spams Windows 10 PCs with ads and takes screenshots June 19, 2018 at 01:29...

Monday, June 18, 2018

Bitdefender issues Cyber Threat warning on Zacinlo Malware

Romanian Cybersecurity firm Bitdefender has issued a cyber threat warning on the spread of Zacinlo Malware. Experts from the said security firm suggest that the adware has the potential to get deep into the operating systems including Windows 10 and has the ability to flood the users with invisible ads. Zacinlo is said to be a malware which infects user computers and opens multiple browser sessions loaded with ad banners and simulates clicks from fictional audiences. The said malware variant is capable of replacing the ads with its own content...

13 Ways Cyber Criminals Spread Malware

By David Balaban Security incidents where hackers distribute malicious code (malware) via spam, This is a post from HackRead.com Read the original post: 13 Ways Cyber Criminals Spread Malware June 18, 2018 at 05:16...

Sunday, June 17, 2018

ClipboardWalletHijacker malware replaces address to steal cryptocurrency

By Waqas The IT security researchers at Qihoo 360 Total Security have discovered This is a post from HackRead.com Read the original post: ClipboardWalletHijacker malware replaces address to steal cryptocurrency June 17, 2018 at 05:49...

Friday, June 15, 2018

Microsoft Cortana allows hackers to snoop down your files

Microsoft Windows 10 operating systems(OS) offers a virtual assistant called ‘Cortana’ which helps the OS users integrate with hundreds of Windows apps. But McAfee researchers allege that the hackers are using this AI propelled assistant to snoop down files from locked computers. Experts warn that the attack can turn serious if hackers decide to break into the network of the Windows 10 computer systems and spread malware on the PC/s. In general, Cortana is developed to assist Win 10 users to schedule calendar appointments, check weather updates,...

Thursday, June 14, 2018

PSD2 implementation update from the EBA

The European Banking Authority (EBA) has published two documents, Opinion of the EBA on the Implementation of the RTS on SCA and CSC  and Consultation Paper, in its ongoing PSD2 implementation process. Whilst there’s still lots of information to come, this communication does provide details on how strong customer authentication (SCA) and common and secure communication (CSC) needs to be implemented. The Opinion Paper, addressed to Competent Authorities, discusses key areas identified by the market and the authorities after the publication...

Why digital fintech companies are getting physical

It’s no surprise to tell you that the banking sector has undergone some fundamental changes over the past 20 years. A road that started with the arrival of online banking has led to a fintech revolution that’s transformed how consumers think about and manage their finances. For traditional banks, staying relevant in the face of new digital competitors  starting with the remodeling of branches to include technology and services that appeal to different customer groups. The rise of online has challenged the assumption that we need bank branches...

EU GDPR vs US: What Is Personal Data?

This post was originally published here by  Rich Campagna. May 25th, GDPR enforcement day, has come and gone with little fan fare (and about 6 quadrillion privacy policy updates), but that doesn’t mean we all know what to do to get into compliance. In fact, some measures put only one third of organizations in compliance as of the deadline, and the linked article refers to UK organizations – what about US organizations that are only now catching on to the fact that they probably need to be GDPR compliant? We thought that contrasting...

SURVEY: MILLENNIALS DON’T SEE CAREER PATH IN CYBERSECURITY

This post was originally published here by (ISC)². As organizations struggle to fill cybersecurity vacancies, they aren’t finding many candidates among millennial jobseekers. A new study shows millennials are only marginally interested in cybersecurity careers, with 9 percent showing any interest at all. The finding is troubling, considering millennials have become the largest percentage of the overall workforce. This generation, which has grown up with iPhones and YouTube is often viewed as an untapped source of talent for...

Wednesday, June 13, 2018

Dixons Carphone admits payment card data breach

London based Dixons Carphone LLC, the largest electrical and telecommunications retailer and service provider has admitted that its servers were hacked by cyber crooks in July Last year who accessed the payment card data of customers in an unauthorized way. The consumer electronics company also admitted that it became a victim of a major cyberattack for the second time in three years and assured that the incident will never get repeated again in future. In an investigation launched last week, the security analysts hired by the company found that...

Promoting gender diversity to boost innovation

The question of how to get more women into technology isn’t a new one. Since 2001, the French organization “Le Cercle InterElles” (website in French) made up of members from 14 international companies, has been working on the topic. Every year InterElles holds a conference and in 2018 more than 600 people, both men and women, gathered to exchange on the subject of “How men and women collaborate on innovation and the role of men in supporting gender diversity. Gemalto is a member of several such organizations around the world, and is a member of...

Dixons Carphone breach: Millions of card and user data compromised

By Waqas A prominent United Kingdom-based retailer has suffered a massive data This is a post from HackRead.com Read the original post: Dixons Carphone breach: Millions of card and user data compromised June 13, 2018 at 07:05...

Tuesday, June 12, 2018

UK ICO imposes £250k fine on Yahoo

The Information Commissioner Office (ICO) of UK has imposed a fine of £250,000 on Yahoo’s UK Division for failing to notify the 2014 Cyber Attack on time. Yahoo! Officials notified the world about the hack in September 2016 i.e after two years of a data breach which was strictly against UK’s data protection standards. In September 2016, Yahoo disclosed that data of more than 500 million global users were compromised in a data breach-which includes details of 515,121 UK account holders. The leaked data includes email addresses, names, phone numbers,...

Dolphin attacks, and what they mean for digital assistants

Simply put, digital assistants are nothing short of amazing. In the past couple of years, advancements in this space have been stunning. We can now rely on digital assistants to enhance, simplify and improve our lives in multiple ways, both for personal and business use. The likes of Alexa, Cortana, Siri and Bixby (and many more) are now household names. They come with an impressive range of benefits, tricks, ever-improving software and being integrated in more and more devices. These virtual buddies/helpers can carry out a wide range of complex...

Make a lasting impact while in New Orleans during (ISC)² Security Congress

Data breaches are happening far too often. Stories about personal information being compromised are part of the daily news cycle. But even after the fact, many people are still not taking internet safety seriously. Let’s not forget that human error causes 90 percent of security incidents. Training employees about cybersecurity is essential but educating younger generations...

US government sees Russia as a cyber threat to undersea cables

US government’s Treasury Department has imposed new sanctions on 5 Russian companies and 3 Russian Nationals said to have helped the Russian Federal Security Services to launch cyber attacks on the critical infrastructure of United States in February this year. In a statement issued by Treasury Secretary Steven Mnuchin, it was clearly mentioned that the sanctions were imposed to punish foreign hackers working hand-in-hand with the Vladimir’s Putin’s government which was trying hard to jeopardize the safety and security of the United States and...

Monday, June 11, 2018

Start your week with these news snippets related to Cyber Security

Fifa World Cup Apps are vulnerable to cyber threats- San Francisco based mobile security company named Pradeo has found that almost all the Euro Sports Apps related to the FIFA World Cup Football are filled with over 63 vulnerabilities each related to Cyber Threat. This includes apps which have been downloaded more than 1000 to 10 million times. It was found in the research that the apps send user’s location to 18 remote servers and collect data via 8 ad libraries. Thus, researchers who dissected the technicalities of the apps say that the apps...

Security and Identity Management in the Gaming Industry

Last week we held a webinar together with Veridocs, on the topic of security and identity management in the gaming industry. We have pulled together the 5 key takeaways from the session. New technologies are equipped to overcome the deficiencies of the past. Many traditional technologies and security procedures such as handheld bar code readers, manual ID check, manual recordkeeping, and floor presence check points haven’t done enough to keep up with the ever-increasing complexities involved in keeping a casino floor safe. Fake IDs, for example,...