Archive for May, 2019

Google Joins Facebook & Twitter in Password Storage Issues

Wednesday, May 22nd, 2019

Twitter did it. Facebook did it. Now Google’s done it. Google revealed Tuesday in a blog post that it accidentally stored its users’ passwords unprotected in plain text.  For fourteen years, any Google employee with access to the Google internal servers could read them. G Suite, previously known as Google Apps and mainly a business […]

Five Ways to Avoid a Ransomware Attack

Monday, May 20th, 2019

Ransomware attacks are on the rise, and while most attacks are aimed at large entities who can provide large payoffs, individuals are still at personal risk. Until money is paid, you could be looking at a total lockout of all of your files, email, and financial systems. Here are just a few ways to minimize […]

Ransomware Attacks Continue to Target US Cities

Friday, May 17th, 2019

So far in 2019, there have been 22 reported public-sector ransomware attacks on US cities, signaling a rise in frequency since 2018. The attacks are targeted at local US government facilities such as cities, police stations, and schools. Some of these attacks have cost millions of dollars in ransom to get functioning again. Recorded Future, […]

Raised Stakes in Baltimore Ransomware Attack

Wednesday, May 15th, 2019

The city of Baltimore was recently hit with a crippling ransomware attack, bringing most of the city’s servers down and affecting everything from bill payments to government communications. Baltimore has refused to pay, so the hackers seem to have upped the ante. A newly-created Twitter account claims to show screenshots of sensitive information purloined from […]

Intel Zombieland Fix Threatens Processor Performance

Thursday, May 9th, 2019

“Zombieload” vulnerabilities of the microarchitectural data sampling (MDS) variety have been discovered by researchers Michael Schwarz, Moritz Lipp, and Daniel Gruss at Graz University of Technology in Austria, as well as Jo Van Bulk at Belgium’s KU Leuven. These latest flaws in Intel processors can be utilized by attackers to steal private data from PCs […]

Hawkeye Uses NSA Cyberattack Tools

Wednesday, May 8th, 2019

The mystery surrounding the misappropriation of some of the National Security Agency’s most effective cyberweapons deepened recently when a Chinese hacking group known as Buckeye, APT3, and Gothic Panda utilized NSA exploits and attack tools EternalRomance and EternalSynergy. It remains unclear how they obtained the NSA tools though both were released by the Shadow Brokers. […]