ESA’s E3 web security negligence endangers more than 2000 game media journalists, investors, after accidental leak exposes PII data

ESA’s E3 web security negligence endangers more than 2000 game media journalists, investors, after accidental leak exposes PII data

A few days ago, the Entertainment Software Association accidentally leaked a spreadsheet including personal information of about 2,025 games industry journalists, content creators, video producers on its E3 ( Electronic Entertainment Expo) website making it publically available. The information including details such as names, publications, home addresses, email addresses, and ... Read More
Researchers reveal vulnerability that can bypass payment limits in contactless Visa card

Researchers reveal vulnerability that can bypass payment limits in contactless Visa card

A few days ago, researchers from Positive technologies discovered flaws in Visa contactless cards, which allow hackers to bypass the payment limits. This research was conducted by two of Positive technologies’ researchers: Leigh-Anne Galloway, Cyber Security Resilience Lead and Tim Yunusov, Head of banking security. The attack was tested with ... Read More
Equifax breach victims may not even get the promised $125; FTC urges them to opt for 10-year free credit monitoring services

Equifax breach victims may not even get the promised $125; FTC urges them to opt for 10-year free credit monitoring services

| | SBN News, Security News
When Equifax announced up to $425 million global settlement with the FTC and that users affected by its data breach in 2017 can file a claim, the public response to this settlement was overwhelming. FTC says, “millions of people visited ftc.gov/Equifax and gone on to the settlement website’s claims form” ... Read More
Google Project Zero reveals six “interactionless” bugs that can affect iOS via Apple’s iMessage

Google Project Zero reveals six “interactionless” bugs that can affect iOS via Apple’s iMessage

Yesterday, two members of the Google Project Zero team revealed about six “interactionless” security bugs that can affect iOS by exploiting the iMessage Client. Four of these bugs can execute malicious code on a remote iOS device, without any prior user interaction. Apple released fixes for these bugs in the ... Read More
Ex-Amazon employee hacks Capital One’s firewall to access its Amazon S3 database; 100m US and 60m Canadian users affected

Ex-Amazon employee hacks Capital One’s firewall to access its Amazon S3 database; 100m US and 60m Canadian users affected

Capital One Financial Corp., one of the largest banks in the United States, has been subject to a massive data breach affecting 100 million customers in the U.S and an additional 6 million in Canada. Capital One said the hacker exploited a configuration vulnerability in its firewall that allowed access ... Read More
‘City Power Johannesburg’ hit by a ransomware attack that encrypted all its databases, applications and network

‘City Power Johannesburg’ hit by a ransomware attack that encrypted all its databases, applications and network

Yesterday, a ransomware virus affected City Power Johannesburg, the electricity distributor for some parts of South Africa’s capital city. City Power notified citizens via Twitter that the virus has encrypted all its databases, applications and network and that the ICT team is trying to fix the issue. #Update City Power ... Read More
VLC media player affected by a major vulnerability in a 3rd library, libebml; updating to the latest version may help

VLC media player affected by a major vulnerability in a 3rd library, libebml; updating to the latest version may help

A few days ago, a German security agency CERT-Bund revealed it had found a Remote Code Execution (RCE) flaw in the popular open-source, VLC Media Player allowing hackers to install, modify, or run any software on a victim’s device without their authority and could also be used to disclose files ... Read More
Developers should be in charge of Application security: Whitesource security report

Developers should be in charge of Application security: Whitesource security report

Security these days is a major concern for all organizations dealing with user data. We have newer apps being developed daily, crunching in user data to provide users with better services, great deals, discounts, and much more. Application security has become one of the top priorities and needs to be ... Read More
International cybercriminals exploited Citrix internal systems for six months using password spraying technique

International cybercriminals exploited Citrix internal systems for six months using password spraying technique

On March 8, this year, an American Cloud computing firm, Citrix revealed a data breach occurrence where international cybercriminals gained access to its internal network. The FBI informed the company about this incident on March 6. Soon after the incident was reported by the FBI, Citrix initiated a forensic investigation ... Read More
Kazakhstan government intercepts nationwide HTTPS traffic to re-encrypt with a govt-issued root certificate – Cyber-security or Cyber-surveillance?

Kazakhstan government intercepts nationwide HTTPS traffic to re-encrypt with a govt-issued root certificate – Cyber-security or Cyber-surveillance?

On Wednesday, July 17, 2019, the Kazakhstan government started intercepting internet traffic within its borders. The government further instructed all the ISPs to force their users to install a government-issued root certificate by Quaznet Trust Network on all devices and in every browser. With the help of this security root ... Read More