Data from 500M LinkedIn Users Posted for Sale Online

Data from 500M LinkedIn Users Posted for Sale Online

Hackers posted an archive containing data they said includes LinkedIn IDs, full names, professional titles, email addresses, phone numbers and other personally identifiable information (PII) on a popular hacker forum, according to a report in CyberNews on Tuesday.

New Android malware disguises itself as a system update

New Android malware disguises itself as a system update

It is a spyware capable of making the user release complete control of the device to criminals, spy on all their browsing and allow personal data and files to be accessed without much effort – including bank and social network information or stored photos and videos.

Hobby Lobby Exposes Customer Data in Cloud Misconfiguration

Hobby Lobby Exposes Customer Data in Cloud Misconfiguration

Arts-and-crafts retailer Hobby Lobby has suffered a cloud-bucket misconfiguration, exposing a raft of customer information, according to a report.“The Hobby Lobby incident is the latest example of why we need to take public cloud threat vectors so seriously,” said Douglas Murray, CEO at Valtix, told Threatpost.

New CopperStealer malware steals Google, Apple, Facebook accounts

New CopperStealer malware steals Google, Apple, Facebook accounts

Previously undocumented account-stealing malware distributed via fake software crack sites targets the users of major service providers, including Google, Facebook, Amazon, and Apple.The KeyGenNinja site CopperStealer shows similar targeting and delivery methods with the SilentFade malware used to steal browser cookies and promote malicious ads via compromised Facebook accounts, leading to over $4 million in damages.

Privacy Talks | Interview with Robin Wilton from Internet Society

Privacy Talks | Interview with Robin Wilton from Internet Society

[] – Without getting too technical, why is quantum computing a threat to encryption and how worried should we be?What are some other resources that you’d suggest for those looking to learn more about quantum computing?

Millions of Social Profiles Leaked by Chinese Data-Scrapers

Millions of Social Profiles Leaked by Chinese Data-Scrapers

The leak stems from a misconfigured ElasticSearch database owned by Chinese social-media management company SocialArks, which contained personally identifiable information (PII) from users of Facebook, Instagram, LinkedIn and other platforms, according to researchers at Safety Detectives.

Ransomware Gang Collects Data from Blood Testing Lab

Ransomware Gang Collects Data from Blood Testing Lab

Apex Laboratory, which provides blood work at home for patients in New York City, Long Island and South Florida, has been hit with a ransomware attack that also resulted in patient data being stolen.

T-Mobile data breach exposed phone numbers, call records

T-Mobile data breach exposed phone numbers, call records

T-Mobile states that the data breach did not expose account holders' names, physical addresses, email addresses, financial data, credit card information, social security numbers, tax IDs, passwords, or PINs. In a statement to BleepingComputer, T-Mobile stated that this breach affected a "small number of customers (less than 0.2%)."

Iranian RANA Android Malware Also Spies On Instant Messengers

Iranian RANA Android Malware Also Spies On Instant Messengers

Formally linking the operations of APT39 to Rana, the FBI detailed eight separate and distinct sets of previously undisclosed malware used by the group to conduct their computer intrusion and reconnaissance activities, including an Android spyware app called "" with information-stealing and remote access capabilities.

Speech readied for CSIS boss raises spectre of ‘hostile’ nations hunting for personal data through schools and businesses

Speech readied for CSIS boss raises spectre of ‘hostile’ nations hunting for personal data through schools and businesses

Concern is growing within Canada’s spy agency about the threat posed by hostile state actors, especially China and Russia, looking to steal intellectual property and “large digital data sets” from private companies and academic institutions.

FBI warns ransomware assault threatens US healthcare system

FBI warns ransomware assault threatens US healthcare system

The aggressive offensive by a Russian-speaking criminal gang coincides with the U.S. presidential election, though there was no immediate indication it was motivated by anything but profit.“We are experiencing the most significant cyber security threat we’ve ever seen in the United States,” Charles Carmakal, chief technical officer of the cybersecurity firm Mandiant, said in a statement.

Privacy News Online | Weekly Review: October 16, 2020

Privacy News Online | Weekly Review: October 16, 2020

Location data shouldn’t be accessible to government agencies without a warrant thanks to a 2017 Supreme Court ruling.Court documents from an arson case have revealed that Google regularly gives information to law enforcement on anyone who has searched a particular keyword, including physical addresses.

“Anonymity Would Not Be Possible,” According to ECB’s Digital Euro Plans

“Anonymity Would Not Be Possible,” According to ECB’s Digital Euro Plans

The ECB has published a 50-page report to examine the prospects of launching a Central Bank Digital Currency (CBDC).An ECB executive member Fabio Panetta, formerly head of the Italian central bank, has published a blog to introduce ECB’s latest report and seek public opinion.

Alleged Activision hack, 500,000 Call Of Duty players impacted

Alleged Activision hack, 500,000 Call Of Duty players impacted

More than 500,000 Activision accounts may have compromised as a result of a data breach suffered by the gaming firm on September 20, reported the eSports site Dexerto.

HostsFileHijack : Microsoft Defender falsely reports you are infected if you try and block Microsoft telemetry and ads

HostsFileHijack : Microsoft Defender falsely reports you are infected if you try and block Microsoft telemetry and ads

The latest versions of Microsoft Defender for Windows 10 will detect if you are adding entries to your host file which would block Microsoft’s servers and refuse to allow you to save the file, claiming it is a severe security risk.

QakBot Banking Trojan Returned With New Sneaky Tricks to Steal Your Money

QakBot Banking Trojan Returned With New Sneaky Tricks to Steal Your Money

In an analysis released by Check Point Research today, the latest wave of Qbot activity appears to have dovetailed with the return of Emotet — another email-based malware behind several botnet-driven spam campaigns and ransomware attacks — last month, with the new sample capable of covertly gathering all email threads from a victim's Outlook client and using them for later malspam campaigns.

Popular torrenting site YTS provides IP address logs to copyright lawyers to extort you with

Popular torrenting site YTS provides IP address logs to copyright lawyers to extort you with

Visiting a clearnet website that logs your IP address when trying to torrent privately is bad enough, knowing that your logs will actually be given up to copyright infringement lawyers and end up being used against you in legal proceedings is a real life and ongoing worst case scenario for torrenters around the world.

The recent erasure of anarchist spaces from corporate platforms shows we need a strong anarchist media alliance

The recent erasure of anarchist spaces from corporate platforms shows we need a strong anarchist media alliance

They'll continue to erase any anarchist, anti-capitalist or anti-fascist project that grows enough on their platforms to pose a threat to the established order.We need to lean on each other now that we can no longer rely on individually promoting our platforms on corporate media.

Records of 45 Million+ travelers to Thailand and Malaysia Leaked on Darkweb!!

Records of 45 Million+ travelers to Thailand and Malaysia Leaked on Darkweb!!

It is being analyzed by our Threat Researchers and will soon be indexed on our data breach monitoring and notification platform – people who’re concerned about their information exposure can register on the platform to ascertain the risks.

List of well-known web sites that port scan their visitors

List of well-known web sites that port scan their visitors

Many well-known and heavily used web sites are using a fraud protection script that port scans your local computer for remote access programs.Of the sites we tested, we saw Citibank, TD Bank, Ameriprise, Chick-fil-A, Lendup, BeachBody, Equifax IQ connect, TIAA-CREF, Sky, GumTree, and WePay port scanning our computers.

UK’s largest airline, easyJet, reveals January 2020 breach of 9 million customer records

UK’s largest airline, easyJet, reveals January 2020 breach of 9 million customer records

All in all, approximately 9 million customers were affected by the EasyJet hack.The EasyJet disclosure also revealed that 2,208 of the 9 million affected customers had their credit card information accessed but nobody had their passport records accessed.easyJet breach affects 9 million customers.

GoDaddy Confirms Data Breach: What 19 Million Customers Need To Know

GoDaddy Confirms Data Breach: What 19 Million Customers Need To Know

The email notification stated that, upon an investigation of the incident, it was determined that an "unauthorized individual" had gained access to login credentials that meant they could "connect to SSH" on the affected hosting accounts.

Free online 'threat blocker' launched in Canada as successful COVID-19 scams multiply

Free online 'threat blocker' launched in Canada as successful COVID-19 scams multiply

As the number of successful pandemic-related scams continues to grow online, Canada's cyber spy agency is helping to launch a new — and free — threat-blocking tool for all Canadians to use.

The Coronavirus Class Divide: Space and Privacy

The Coronavirus Class Divide: Space and Privacy

“Bleak House,” the 1852 novel some consider Dickens’s best, even traces the class lines of an epidemic, revealing its two-sided logic: Its threat is universal, but its real-world damage concentrates on the poor.

Linux Security: Chinese State Hackers May Have Compromised ‘Holy Grail’ Targets Since 2012

Linux Security: Chinese State Hackers May Have Compromised ‘Holy Grail’ Targets Since 2012

Decade of Chinese RATs. This new research adds to that concern, claiming that a concerted effort involving five Chinese advanced persistent threat (APT) groups has been focused on the Linux servers that "comprise the backbone of the majority of large data centers responsible for the some of the most sensitive enterprise network operations."

Google and Facebook Should Not Give Your Location Data to the Government. Even to Stop Coronavirus

Google and Facebook Should Not Give Your Location Data to the Government. Even to Stop Coronavirus

We don't need the government tracking our location.The government wants to track your location to make sure you're not getting too close to other people.

Hospitals Outdated Operating Systems Might Leave Patients Data at Risk!

Hospitals Outdated Operating Systems Might Leave Patients Data at Risk!

The research was conducted by Palo Alto Networks , a cybersecurity firm, it revealed that 83% devices ran on outdated services that can’t even be updated even when it contains several loopholes that hackers can easily bypass and exploit.

Coronavirus Phishing Attacks Aim to Spread Malware Infection

Coronavirus Phishing Attacks Aim to Spread Malware Infection

“The sole intention of these threat actors is to play on the public’s genuine fear to increase the likelihood of users clicking on an attachment or link delivered in a malicious communication, to cause infection, or for monetary gain.

Chinese state 'likely' linked to cyber spies targeting human rights workers

Chinese state 'likely' linked to cyber spies targeting human rights workers

The espionage group, dubbed Bronze President, deployed malware against its alleged victims to monitor their activities and steal documents, according to the assessment released on Sunday by Secureworks , a US-based cyber security company.

Not so IDLE hands: FBI program offers companies data protection via deception

Not so IDLE hands: FBI program offers companies data protection via deception

Sometimes, that involves field agents proactively contacting companies when they have information of a threat—as two FBI agents did when they caught wind of researchers trying to alert casinos of vulnerabilities they said they had found in casino kiosk systems.