<img src="https://secure.ruth8badb.com/159098.png" alt="" style="display:none;">

IT Security Newsletter - 2/17/2020

SHARE

Breaches

How the suspected Equifax hackers covered their tracks

Even for U.S. law enforcement, the Equifax hack was different. Unlike in previous examples of apparent Chinese government-backed cyber-operations, the hackers behind the Equifax breach stymied police for months. After the Office of Personnel Management hack in 2015, and the Marriott breach which was disclosed in 2018, investigators were confident enough that China was involved to tell the Wall Street Journal and New York Times about their suspicions soon afterward. READ MORE...

Hacking

Mobile phishing scam hits customers at big North American banks

Nearly 4,000 IP addresses tied to customers of banks in North America and elsewhere have been targeted in a mobile phishing scam to steal login credentials, researchers said Friday. Customers at big banks like Chase, the Royal Bank of Canada, and London-based HSBC are among the targets. The hackers are exploiting how accustomed users are to receiving text messages from their banks, said analysts at Lookout, a San Francisco-based security company. READ MORE...

Malware

500 Malicious Chrome Extensions Impact Millions of Users

Researchers say that 500 Google Chrome browser extensions were discovered secretly uploading private browsing data to attacker-controlled servers, and redirecting victims to malware-laced websites. The browser extensions, all of which have now been removed, were downloaded millions of times from Google's Chrome Web Store. Browser extensions are used for customizing web browsers, modifying user interfaces, blocking ads and managing cookies. READ MORE...

Exploits/Vulnerabilities

SweynTooth: Bluetooth Vulnerabilities Expose Many Devices to Attacks

Security researchers have discovered numerous vulnerabilities in the Bluetooth Low Energy (BLE) implementations of major system-on-a-chip (SoC) vendors. BLE is a wireless communication technology designed to reduce the battery drainage of mobile and Internet of Things (IoT) devices. Consisting of a set of standardized protocols, BLE provides connectivity between peripherals and a user's smartphone or notebook. READ MORE...

Science & Culture

Martin and Dorothie Hellman on Love, Crypto & Saving the World

Martin Hellman, co-creator of the Diffie-Hellman key exchange, and his wife of 53 years, Dorothie, talk about the current state of cryptography and what making peace at home taught them about making peace on Earth. But that partnership almost didn't last. The couple recently self-published a book about their road back from the brink of separation, but this book is rather different than most books on marriage you'll find in the self-help aisle. READ MORE...