You searched for digital shadows | SC Media

Your search for digital shadows returned 49 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Your search for digital shadows returned 49 results

Sort Results:

Relevant Recent
IoT risks become intimate after researcher hacks sex toy
Security News

Digital extortionist offer high six-figure salaries to accomplices

Cybercriminals are promising salaries of up to $360,000 a year to accomplices who seek to extort high networth individuals such as C-Level executives, lawyers, and doctors. These bribes can be even higher for those who have network management, penetration testing, and programming skills with one threat actor willing to pay the equivalent of $768,000 annually,…
Mobile Security, Mobile/End Point Security, Security News, Vulnerabilities

System bug gives Facebook access to iPhone cameras

A bug in the latest version of iOS opens iPhone cameras as users peruse their Facebook feeds, letting the social media giant access the cameras. “We have seen no evidence of photos or videos being uploaded due to this bug,” a spokesman told the Guardian, confirming that glitch would let the Facebook app “navigate to…
APTs/cyberespionage, Cybercrime, Events, Malware, Network Security, Ransomware, Research, SC Security Ops Center, Security News, Vulnerabilities

We interviewed cyber experts on a Vegas ferris wheel. Then ride security showed up…

In the film “Ocean’s 11,” Danny Ocean and his team of expert cybercriminals execute a daring casino heist in glitzy Las Vegas. This past summer at the Black Hat and DEF CON conferences in Sin City, the editorial staff at SC Media attempted to pull off a less ambitious – and decidedly more legal –…
APTs/cyberespionage, Security News

Russian Turla group masqueraded as Iranian hackers in attacks

The Russian hacker group Turla disguised itself as Iranians and stole state secrets from multiple countries, authorities from the U.S. and U.K. said Monday.  “Identifying those responsible for attacks can be very difficult, but the weight of evidence points towards the Turla group being behind this campaign,” Paul Chichester, director of operations at GCHQ’s National Cyber Security…
Ransomware, Security News

Talkin’ about an EVOLUTION…

In cybersecurity terms, is there anything more Darwin-esque than ransomware? Small variations in targets, attacks, points of entry, payout and even attacker priorities have saved it from extinction and increased its ability to compete, survive and reproduce just as Charles Darwin contended organisms developed. Unfortunately, though, those attacks have evolved into a greater menace for…
Data Breach, Privacy & Compliance News and Analysis, Security News

Exposed server leaks PII on all 16.6 million Ecuador citizens

If another leaky Elasticsearch server may seem a little anticlimactic, considering how frequently they occur, the latest find by security researchers might have more of a “wow” factor since it exposed information on nearly all of Ecuador’s 16.6 million citizens, 6.7 million of them children. “The irresponsible handling of Personally Identifiable Information (PII) has literally…
Network Security, Penetration Testing, Vulnerability Assessment, Risk Assessment, Research, Security News, Vulnerabilities

Metasploit Project publishes exploit for Bluekeep bug

Coders late last week publicly released a working exploit for the dangerous Bluekeep bug that was found and patched earlier this year in Microsoft’s Remote Desktop Protocol implementation. Designated as CVE-2019-0708, BlueKeep is a remote Windows kernel use-after-free vulnerability that could be used to create wormable attacks similar to the WannaCry ransomware incident of May…
Next post in Research