A number of malicious websites that were recently reported to have been secretly hacking into iPhones over a two-year period were in fact targeting Uyghur Muslims, Zack Whittaker of TechCrunch reports today. Read the rest
Hackers have published a big dump of private data related to German Chancellor Angela Merkel and hundreds of other of the country's politicians, in what is said to be the biggest data dump of its kind ever in Germany. Read the rest
The question-and-answer sharing website Quora says about 100 million users were affected by a hack blamed on a “malicious third party.” Read the rest
Dell released a statement on Wednesday that says the computer giant reset passwords for all accounts on the Dell.com online electronics store on Nov. 14.
That was a full 5 days after they discovered and reportedly thwarted hackers who were trying to steal customer data. Read the rest
Facebook says an attack on its network left the personal information of some 50 million users—perhaps you?—exposed to hackers. Who were the hackers, and what did they want? Facebook doesn't know, or won't say. But the company has confirmed that execs Mark Zuckerberg and Sheryl Sanders were among the users affected.
“We have a responsibility to protect your data, and if we can’t then we don’t deserve to serve you,” Zuckerberg said about Facebook's Cambridge Analytica scandal earlier this year.
Well. You heard the man. Read the rest
Reddit announced to users that the site had a "security incident."
"On June 19, we learned that between June 14 and June 18, an attacker compromised a few of our employees’ accounts with our cloud and source code hosting providers. Already having our primary access points for code and infrastructure behind strong authentication requiring two-factor authentication (2FA), we learned that SMS-based authentication is not nearly as secure as we would hope, and the main attack was via SMS intercept. We point this out to encourage everyone here to move to token-based 2FA."
Data accessed includes all Reddit data through 2007, including account credentials and email addresses, along with source code and employee workspace files.
Ticketmaster UK today admitted that an unknown number of customers' data may have been stolen in a malware attack. Read the rest
A university, mercifully left unnamed, blew off complaints from students about its slow network. When the problem became too bad to ignore, their IT team found the culprit thanks to a "sudden big interest in seafood-related domains."
The firewall analysis identified over 5,000 discrete systems making hundreds of DNS lookups every 15 minutes. Of these, nearly all systems were found to be living on the segment of the network dedicated to our IoT infrastructure. With a massive campus to monitor and manage, everything from light bulbs to vending machines had been connected to the network for ease of management and improved efficiencies. While these IoT systems were supposed to be isolated from the rest of the network, it was clear that they were all configured to use DNS servers in a different subnet. ... botnet spread from device to device by brute forcing default and weak passwords. Once the password was known, the malware had full control of the device and would check in with command infrastructure for updates and change the device’s password – locking us out of the 5,000 systems.
The Internet of Hacked Things strikes again! I'm sure some content filtering and updating passwords will do the trick. Read the rest
Technology writer Mat Honan was "epically hacked," in a widely-circulated cautionary tale that should have you changing your passwords and turning on secondary authentication measures. The Novato, California-based firm DriveSavers helped Mat get his data back, and he traveled to the clean room to see how they did it. (wired.com) Read the rest