Beta Mobile

Headlines : News Security News   Page 1    



Subtitle Attack Threatens Millions of Smart TVs, Mobiles and PCs - .. - Infosecurity-magazine - 25/05 5:43 am

Infosecurity Magazine Subtitle Attack Threatens Millions of Smart TVs, Mobiles and PCs Infosecurity Magazine International and foreign-language film fans beware: Check Point researchers have uncovered a new attack vector that uses malicious subtitles to infect devices via their media players. According to Check Point, the gambit threatens millions of users... VLC & Kodi Subtitle Vulnerability Could Give Attacker Control Of 200M Devices Silicon UK Millions of Kodi, VLC and Popcorn Time users at ..





VLC & Kodi Subtitle Vulnerability Could Give Attacker Control Of 200M .. - Silicon - 24/05 11:32 pm

Silicon UK VLC & Kodi Subtitle Vulnerability Could Give Attacker Control Of 200M Devices Silicon UK VLC and Kodi are two of the programs cited by researchers at CheckPoint, which estimates as many as 200 million PCs, Android smartphones and smart TVs are affected. It said that part of the danger was that subtitle files, often downloaded from free... Hackers could use subtitles on Kodi and VLC to gain 'full control' of ... International Business Times UK Attack of the evil subtitles: Update ..





Why Companies Shouldn't Try to Hack Their Hackers - Harvard Business Review - HBR - 24/05 11:06 pm

Harvard Business Review Why Companies Shouldn't Try to Hack Their Hackers Harvard Business Review These infected devices and their owners are as much victims of the attacker as the primary target, yet any attempt to hack back could cause them harm. Even governments, which possess the large-scale, sophisticated intelligence-gathering programs...





Czech-based Avast looks to number one position in global security - Radio .. - Radio - 24/05 4:55 pm

Radio Prague Czech-based Avast looks to number one position in global security Radio Prague And the number of attacks of all types on computers and smart phones is growing every year, with ransomware high among the ever growing threats. There were 150 new strains of ransomware detected in 2016, that's a rise of 105% on the previous year.





Hackers Spoof Samsung Iris Scanners With A Photo And Contact Lens - Vocativ - Vocativ - 24/05 3:28 am

Vocativ Hackers Spoof Samsung Iris Scanners With A Photo And Contact Lens Vocativ The Samsung Galaxy S8 is the first commercially available smartphone with a built-in iris scanner. And according to hackers with Germany's Chaos Computer Club, it's possible to fool that scanner using nothing more than an ordinary contact lens and a ... Samsung Galaxy S8 Iris Scanner Hacked Ubergizmo





Shadow Brokers Threaten To Unleash More Hacking Tools - NewsFactor Network - Newsfactor - 23/05 3:00 pm

NewsFactor Network Shadow Brokers Threaten To Unleash More Hacking Tools NewsFactor Network It said it was "taking pride in picking adversary equal to or better than selves, a worthy opponent" and that it was "always being about theshadowbrokers vs theequationgroup [a sophisticated hacking team believed to be operated by the NSA]." The cyber... Why do we need 'accidental heroes' to deal with global cyber-attacks? The Guardian NSA's Hacking Tool and Wannacry Ransomware The Hans India ..





WannaCry connection to North Korea hacking group 'compelling' - Financial .. - FT - 23/05 11:41 am

Financial Times WannaCry connection to North Korea hacking group 'compelling' Financial Times WannaCry, the ransomware that spread through the UK's National Health Service and companies around the world, shows compelling evidence of a link to North Korean hacking group Lazarus, according to a new report by Symantec. ... technical director of ... North Korea cyber war on Australia more likely than missile attack: Expert NEWS.com.au North Korea May Be Responsible For Global Cyberattack ..





$30M trading scheme nets Ukrainian hacker 2 years in prison - NJ.com - NJ - 23/05 4:44 am

NJ.com $30M trading scheme nets Ukrainian hacker 2 years in prison NJ.com Iermolovych was one of nine charged in 2015 in what prosecutors described as the largest and most sophisticated trading fraud scheme of its kind, which authorities said generated more than $30 million in profits for the conspirators. Prosecutors have





Hackers hit Russian bank customers, planned international cyber raids - .. - Reuters - 23/05 1:05 am

Reuters Hackers hit Russian bank customers, planned international cyber raids Reuters Their campaign raised a relatively small sum by cyber-crime standards - more than 50 million roubles ($892,000) - but they had also obtained more sophisticated malicious software for a modest monthly fee to go after the clients of banks in France and





Smart technology leaves us vulnerable to hacking - wivb.com - Wivb - 22/05 8:15 pm

wivb.com Smart technology leaves us vulnerable to hacking wivb.com You can turn heat on at home from the comfort of your office, and get reminders sent to your phone that you need to swing by the store to pick up eggs or milk, but in the wake of recent cyber attacks, many are wondering if their smart devices are ...





Shadow Brokers Threaten To Unleash More Hacking Tools - CIO Today - Cio-today - 22/05 3:03 pm

CIO Today Shadow Brokers Threaten To Unleash More Hacking Tools CIO Today It said it was "taking pride in picking adversary equal to or better than selves, a worthy opponent" and that it was "always being about theshadowbrokers vs theequationgroup [a sophisticated hacking team believed to be operated by the NSA]." The cyber... Shadow Brokers Claims Possession of More Hacking Programs, Threatens to Dump SPAMfighter News (press release)





Web-connected devices are vulnerable: Cyber specialists - Deccan Chronicle - Deccanchronicle - 22/05 10:17 am

Deccan Chronicle Web-connected devices are vulnerable : Cyber specialists Deccan Chronicle According to documents released in March by Wikileaks, US intelligence can hack smartphones , computers and smart, web-connected TVs, to pilot them and eavesdrop. "All the other connected objects can be pirated, that has been shown, be it a coffee





EternalRocks network worm uses 7 NSA hacking tools - Network World - Networkworld - 21/05 11:59 pm

Network World EternalRocks network worm uses 7 NSA hacking tools Network World EternalBlue was part of the Shadow Brokers' April 14 dump of NSA hacking tools. Almost immediately, since late April, sophisticated attackers started repackaging the EternalBlue exploit. Security firm Secdo reported that three weeks before the WannaCry... New cyber chaos appears to have been avoided: Europol pppFocus





Shadow Brokers Threaten To Unleash More Hacking Tools - Sci-Tech Today - Sci-tech-today - 21/05 3:00 pm

Sci-Tech Today Shadow Brokers Threaten To Unleash More Hacking Tools Sci-Tech Today It said it was "taking pride in picking adversary equal to or better than selves, a worthy opponent" and that it was "always being about theshadowbrokers vs theequationgroup [a sophisticated hacking team believed to be operated by the NSA]." The cyber... Why do we need 'accidental heroes' to deal with global cyber-attacks? The Guardian WannaCry, Nation States and What the President of Microsoft Forgot to ..





Cyber hackers and digital defences: Gone phishing... So, everyone ... - .. - Straitstimes - 21/05 11:22 am

The Straits Times Cyber hackers and digital defences: Gone phishing... So, everyone ... The Straits Times The Internet is becoming a new battleground for criminals and states. Amid Singapore's push to be a Smart Nation, Insight looks at how recent attacks have hit





North Korean Hackers Are Scarier Than North Korean Nukes - Newsweek - Newsweek - 20/05 11:00 pm

Newsweek North Korean Hackers Are Scarier Than North Korean Nukes Newsweek North Korea may have launched that attack, and lots of scary nations large and small are sponsoring increasingly sophisticated hacking operations. We used to worry about Russia and China taking down our infrastructure, said Stewart Baker, a former... Ransomware aimed at South Korea in early 2017 may be work of North Korea, firm says CyberScoop Don't WannaCry again Telangana Today





Shadow Brokers Threaten To Unleash More Hacking Tools - NewsFactor Network - Newsfactor - 20/05 10:49 pm

NewsFactor Network Shadow Brokers Threaten To Unleash More Hacking Tools NewsFactor Network It said it was "taking pride in picking adversary equal to or better than selves, a worthy opponent" and that it was "always being about theshadowbrokers vs theequationgroup [a sophisticated hacking team believed to be operated by the NSA]." The cyber... Microsoft slams spy agencies for hoarding hacking tools used in cyber attacks Newburghcircle Should spies use secret software vulnerabilities? Phys.Org ..





Why the emerging ransomware threat's next target could be your smartphone .. - Cnbc - 20/05 9:01 pm

CNBC Why the emerging ransomware threat's next target could be your smartphone or tablet CNBC More sophisticated attacks will be hard to prevent," said Stuart Okin, a senior vice president of product at 1E, a cybersecurity firm that helps companies keep software up to date. The latest hacking threats were WannaCry, a type of ransomware, and





Shadow Brokers Threaten To Unleash More Hacking Tools ... - Top Tech News - Toptechnews - 20/05 3:01 pm

Top Tech News Shadow Brokers Threaten To Unleash More Hacking Tools ... Top Tech News The hacking group that says it facilitated the WannaCry ransomware attack has threatened to leak a new wave of hacking tools it claims to have stolen from the... Hacker group that leaked NSA spy tools likely includes a U.S. insider, experts say McClatchy Washington Bureau Hacking group offers subscription for NSA code Sky News OH LORDY! Comey Wanna Cry Edition Steemit Steemit Computerworld - The Official ..





The cyber world of summer vacation - Nevada Herald - Nevadadailymail - 20/05 1:03 pm

Nevada Herald The cyber world of summer vacation Nevada Herald Predators turn to online methods to seek out their victims because they know how vulnerable a child can be. As children use smart phones and computers at a younger age, there are certain apps that parents should be cautious about. Apps like Snap Chat,...





Accused Russian hacker arraigned in Atlanta federal court - MyAJC - Myajc - 20/05 5:01 am

MyAJC Accused Russian hacker arraigned in Atlanta federal court MyAJC John Horn, the U.S. attorney in Atlanta, said Seleznev and his cohorts are responsible for what was in 2008 the most sophisticated and organized computer fraud attack ever conducted. Seleznev, of Vladivostok, Russia, was arraigned before a federal... Convicted Russian Cyber Criminal Roman Seleznev Faces Charges in Atlanta Dark Reading Russian Charged in 2008 Hack of Payroll Processor Courthouse News Service





7 signs your phone is dying and it's time to get a new one - INSIDER - Thisisinsider - 20/05 1:09 am

INSIDER 7 signs your phone is dying and it's time to get a new one INSIDER Now more than ever, it feels like there's a new smartphone coming out every day. The last eight months alone have given us the iPhone 7, Google Pixel, and Galaxy S8, among others. Regardless, it's easy to hold off on an upgrade especially





Russian hacking has got even worse since the election - Yahoo News - Yahoo - 19/05 10:43 pm

Yahoo News Russian hacking has got even worse since the election Yahoo News It described how Russia had already moved on from the rudimentary email hacks against politicians it had used in 2016, Time writes. Now the Russians were running a more sophisticated hack on Twitter. The report said the Russians had sent expertly





6 Smartphone Clues, Signalling To Vulnerability - ValueWalk - Valuewalk - 19/05 10:16 pm

ValueWalk 6 Smartphone Clues, Signalling To Vulnerability ValueWalk Smartphones are usually prone to hot batteries. However, before the android and IOS were found, the battery problems were thought to be a clue of phone tapping. The Hot battery is often caused by the usage of many apps running simultaneously, but if





Experts question North Korea role in WannaCry cyberattack - ABC News - Abcgo - 19/05 6:50 pm

Fox News Experts question North Korea role in WannaCry cyberattack ABC News But identifying hackers behind sophisticated attacks is a notoriously difficult task. Proving they are acting under the explicit orders of a nation state is even trickier. When experts say North Korea is behind an attack, what they often mean is that ... North Korea's hacker army: A look at Hermit Kingdom's 'elite' cyber ops Fox News The WannaCry Ransomware Has a Link to Suspected North Korean Hackers WIRED How to tell ..





Experts question North Korea role in WannaCry cyberattack - News 12 .. - News12 - 19/05 4:22 pm

Fox News Experts question North Korea role in WannaCry cyberattack News 12 Westchester But identifying hackers behind sophisticated attacks is a notoriously difficult task. Proving they are acting under the explicit orders of a nation state is even trickier. When experts say North Korea is behind an attack, what they often mean is that ... North Korea's hacker army: A look at Hermit Kingdom's 'elite' cyber ops Fox News The WannaCry Ransomware Has a Link to Suspected North Korean Hackers WIRED ..





Experts question North Korea role in WannaCry cyberattack - News 12 Long .. - News12 - 19/05 4:18 pm

Fox News Experts question North Korea role in WannaCry cyberattack News 12 Long Island But identifying hackers behind sophisticated attacks is a notoriously difficult task. Proving they are acting under the explicit orders of a nation state is even trickier. When experts say North Korea is behind an attack, what they often mean is that ... North Korea's hacker army: A look at Hermit Kingdom's 'elite' cyber ops Fox News The WannaCry Ransomware Has a Link to Suspected North Korean Hackers WIRED ..





Iranian Hacker Group OilRig Thought to Be Using Russian Hackers-for-Hire .. - Spacewatchme - 19/05 3:35 pm

SpaceWatch Middle East (press release) (subscription) (blog) Iranian Hacker Group OilRig Thought to Be Using Russian Hackers -for-Hire in US Cyber Attack SpaceWatch Middle East (press release) (subscription) (blog) OilRig are among a number of hacker groups linked to Iranian intelligence and the Islamic Revolutionary Guard Corps (IRGC), and are believed to have been founded around 2015. Since then they have evolved into one of the more sophisticated and...





Russian hacking has got even worse since the election - BGR - BGR - 19/05 10:02 am

BGR Russian hacking has got even worse since the election BGR The fascinating report into Russia's sophisticated hacking operations against the US comes from Time magazine. The publication reveals that on March 2nd, a disturbing report hit the desks of US counterintelligence officials in Washington Time ... Inside Russia's Social Media War on America TIME





Losses from reported Australian hacking incidents quadrupled in ... - ZDNet - Zdnet - 19/05 7:30 am

ZDNet Losses from reported Australian hacking incidents quadrupled in ... ZDNet The Australian Competition and Consumer Commission (ACCC) has reported a four-fold increase in hacking scams, with AU$2.9 million lost to such activity in





North Korea's hacker army: A look at Hermit Kingdom's 'elite' cyber ops - .. - Foxnews - 19/05 5:41 am

Fox News North Korea's hacker army: A look at Hermit Kingdom's 'elite' cyber ops Fox News Last week's global cyber attack has shed light on the shadowy and highly sophisticated team of cyber spies in North Korea believed to be among the best hackers in the world. That elite and highly trained team is believed to be behind the biggest online... The WannaCry Ransomware Has a Link to Suspected North Korean Hackers WIRED How to tell if you've been hacked by Russia, China, or North Korea The Week ..





Poor cybersecurity spotted at Mar-a-Lago, other popular Trump retreats - .. - Scmagazine - 19/05 3:48 am

SC Magazine Poor cybersecurity spotted at Mar-a-Lago, other popular Trump retreats SC Magazine Researchers said the flaws could allow a sophisticated hacker to exploit the weaknesses to seize control of devices including computers or smart phones from anyone on the premises. Similar vulnerabilities were also spotted outside ... These included ... Trump's Mar-a-Lago resort is a hacker's dream, investigation alleges CBS News The abysmal information security at Trump properties has probably ..





Inside Russia's Social Media War on America - TIME - Time - 18/05 7:34 pm

TIME Inside Russia's Social Media War on America TIME It described how Russia had already moved on from the rudimentary email hacks against politicians it had used in 2016. Now the Russians were running a more sophisticated hack on Twitter. The report said the Russians had sent expertly tailored messages





WannaCry exposes the chaos hacking tools can bring - Irish Times - Irishtimes - 18/05 2:00 pm

Irish Times WannaCry exposes the chaos hacking tools can bring Irish Times The talk was that this was a sophisticated attack, perhaps from a state actor, hitting specific targets, using a leaked US National Security Agency exploit which was being spread by a phishing ransomware attack, where people were duped into opening an... Hackers prime second classified US cyber weapon Financial Times Business braces for global hacking assault The Australian The Global Hack Could Have Been Much, Much ..





It almost makes you WannaCry: The search for the hackers who infected .. - Latimes - 18/05 6:32 am

Los Angeles Times It almost makes you WannaCry: The search for the hackers who infected computers around the world Los Angeles Times Faced with an explosion of hacks and viruses from increasingly sophisticated pirates and nation-states, it often takes a combination of these detectives sometimes working in harmony, sometimes at odds sifting through the intricacies of a





Any Half-Decent Hacker Could Break Into Mar-a-Lago - ProPublica - Propublica - 18/05 1:03 am

ProPublica Any Half-Decent Hacker Could Break Into Mar-a-Lago ProPublica Sophisticated attackers could take advantage of vulnerabilities in the Wi-Fi networks to take over devices like computers or smart phones and use them to record conversations involving anyone on the premises. Those networks all have to be crawling





A new smartphones Bill could see parents fined - Donegal News - Donegalnews - 17/05 11:23 pm

Donegal News A new smartphones Bill could see parents fined Donegal News ... Smartphones Bill would forbid the sale of phones to under-14s, and fine parents who allow their children to access the Internet unsupervised. Unveiled last week by Jim Daly, the Chairman of the Oireachtas Committee on Children, aims to protect





Shadow Brokers threaten to unleash more hacking tools - The Guardian - Theguardian - 17/05 7:56 pm

The Guardian Shadow Brokers threaten to unleash more hacking tools The Guardian They said they were taking pride in picking adversary equal to or better than selves, a worthy opponent and that it was always being about theshadowbrokers vs theequationgroup [a sophisticated hacking team believed to be operated by the NSA]. Hacker group that leaked NSA spy tools likely includes a U.S. insider, experts say McClatchy Washington Bureau Buy the data we stole or else, warn hackers The Times ..





11-year-old wunderkind demonstrates vulnerability of net-connected devices .. - Japantimes - 17/05 6:13 pm

The Japan Times 11-year-old wunderkind demonstrates vulnerability of net-connected devices The Japan Times From airplanes to automobiles, from smart phones to smart homes, anything or any toy can be part of the internet of things (IOT), he said, pacing the huge stage at the World Forum in The Hague. From terminators to teddy bears, anything or any toy





Hacker's paradise: Secrets of the "dark web" - CBS News - Cbsnews - 17/05 5:15 pm

CBS News Hacker's paradise: Secrets of the "dark web" CBS News Although Silk Road, which was allegedly used to buy drugs and launder money, was shut down by the FBI in 2013, many more popped up in its place -- and are even more sophisticated . Both law enforcement and national security officials are well aware of




News Buzz    



Focus on 1MDB allows other abuses to go unnoticed, .. - Mkini
Malaysiakini (subscription) Focus on 1MDB allows other abuses to go unnoticed, economist warns Malaysiakini (subscription) However, economist Jomo Kwame Sundaram now warns that the focus on 1MDB has allowed other excesses to go relatively unnoticed. As an example, the former United Nations ..
News Maker    



Jomo: Foreign political funding always raises red flag .. - FMT
Free Malaysia Today Jomo: Foreign political funding always raises red flag Free Malaysia Today Another panellist, prominent human rights lawyer Syahredzan Johan proposed that a law be enacted to clearly spell out the role of a caretaker government from the time parliament was dissolved for a ..
World    



Indonesia probes suicide attack that killed 3 .. - CNA
Channel NewsAsia Indonesia probes suicide attack that killed 3 policemen Channel NewsAsia Indonesia's elite anti-terror squad was Thursday investigating a suicide bombing attack near a busy Jakarta bus station that killed three policemen. AFP/FERNANDO. 25 May 2017 12:25PM (Updated: 25 May 2017 ..
Business    



Mahathir bemoans 'loss' of Proton, says more assets .. - FMT
Free Malaysia Today Mahathir bemoans 'loss' of Proton, says more assets may be sold Free Malaysia Today The former prime minister says Proton may do splendidly after Geely buys over a 49.9% stake but that he cannot be proud of the success of something that does not belong to him or his country. ..
Tech    



DJI unveils its smallest drone ever - AsiaOne - Asiaone
AsiaOne DJI unveils its smallest drone ever AsiaOne DJI unveiled its tiny Spark drone on Wednesday, and it's sort of the anti-drone for consumers. It's small enough to fit in your hand, launches and lands from there, can be controlled almost entirely with gestures, lets you take a selfie from just 10 ..
Tech Hack    



The eyes have it: How to prevent visual hacking in .. - Securityinfowatch
SecurityInfoWatch The eyes have it: How to prevent visual hacking in financial institutions SecurityInfoWatch He has developed and sustained risk oversight for major financial institutions in privacy, data protection, information security, incident response management, enterprise assessments and ..
Wireless Mobile    



Cloak and Dagger Android Vulnerability is Supremely .. - Infosecurity-magazine
Infosecurity Magazine Cloak and Dagger Android Vulnerability is Supremely Dangerous Infosecurity Magazine A new vulnerability for Android , dubbed Cloak and Dagger, has been discovered by the Georgia Institute of Technology . It makes it easier for bad actors to pass off trojanized apps as ..
Tech Watch    



Facebook will court 'millennials' with its original .. - Engadget
Engadget Facebook will court 'millennials' with its original videos Engadget Facebook's dreams of pushing original video shows may be delayed, but that's doing little to stop its ever-growing ambitions. Reuters sources claim that Facebook has landed deals with a slew of "millennial-focused" ..
Automotive Future    



Wrthersee Sauce: Volkswagen Shows Off Hybrid .. - Caranddriver
Car and Driver (blog) Wrthersee Sauce: Volkswagen Shows Off Hybrid All-Wheel-Drive GTI at Annual Car Meet Car and Driver (blog) Marking a decade of concept cars presented by Volkswagen's Wolfsburg apprentices at Wrthersee, the aptly named Golf GTI First Decade concept sports an innovative ..
Ads