Teri Robinson SC Media | Page 2 of 182

Teri Robinson

Executive Editor

Most recent articles by Teri Robinson

ICE, FBI using driver’s license photos, without permission, for facial recognition searches

Driver’s license photos have been used, without users’ permission, by agents with the FBI and Immigration and Customs Enforcement (ICE) for facial recognition searches. While their efforts were ostensibly aimed at tracking criminals, the information could be used on citizens who have not committed crime. “Law enforcement’s access of state databases” is “often done in…

Hackers breach Canonical GitHub account, create repositories, leave source code untouched

Hackers compromised credentials to break into a Canonical Ltd. GitHub account July 6 and created repositories, but apparently did not lift sensitive information or manipulate any source code. “We can confirm that on 2019-07-06 there was a Canonical owned account on GitHub whose credentials were compromised and used to create repositories and issues among other…

DHS election lead warns state secretaries of phishing threat leading up to 2020

A Department of Homeland Security (DHS) official warned a Santa Fe, N.M., gathering of secretaries of state to beware of phishing attempts that might target their state and local election systems and workers. “We know that phishing is how a significant number of state and local government networks become exploited,” an ABC News report cited…

Cyber Command

Cyber Command warns hackers exploiting Outlook vulnerability to attack gov’t agencies

The U.S. Cyber Command warned that a threat group was exploiting a vulnerability in Outlook in an effort to attack government agencies and uploaded samples that one security researcher said are linked to APT33 and Shamoon2. “USCYBERCOM has discovered active malicious use of CVE-2017-11774 and recommends immediate #patching. Malware is currently delivered from: ‘hxxps://customermgmt.net/page/macrocosm’,” Cyber…

Senate building

Senate passes King bill to secure energy grid

The Securing Energy Infrastructure Act that passed the Senate late last week would shore up the energy grid through collaboration with private industry to remove vulnerabilities that hackers could exploit. “Our connectivity is a strength that, if left unprotected, can be exploited as a weakness,” according to a release from Sen. Angus King, I-Maine, who introduced…

facialrecognition_1326427

Hong Kong protesters fear gov’t use of facial recognition, surveillance tech

Fear that the government will draw facial recognition technology from its arsenal of digital surveillance tools to identify protesters in Hong Kong has prompted some to take evasive action to diminish or eliminate their digital footprints. Some protesters are deleting posts on social media as well as shutting off their phones’ location tracking features, even…

Exposed Orvibo database leaks two billion records

More than two billion user logs containing information on Chinese home solutions company Orvibo’s customers were leaked after a database was left exposed. The company sells a portfolio of 100 smart solutions to manage energy and security systems, such as lighting systems, home entertainment devices and HVAC, in homes, offices and hotel rooms via a…

Cloud provider PCM hacked, customer info likely stolen for gift card scam

Hackers accessed emails and file sharing systems of some customers of cloud provider PCM Inc. During a May 2019 intrusion, hackers nicked administrative credentials that the cloud vendor uses for managing customer accounts in Microsoft Office365 and appeared to want to use stolen information to perpetrate gift card fraud in a scheme that resembled a…

ChinaInternet

Operation Soft Cell campaign targets cellular telecom providers, points to China’s APT10

A threat actor using tools and techniques associated with APT10, the Chinese hacking group, and aimed at global cellular telecommunications providers completely took over at least one provider’s network in its efforts to obtain data on very specific, high-value targets, according to a report from the Cybereason Nocturnus team. Operation Soft Cell, active since at…

Next post in APTs/cyberespionage