AFP reports: Israel’s military said on Sunday it had thwarted an attempted malware attack by Hamas that sought to gain access to soldiers’ mobile phones by using seductive pictures of young women. The phones of a few dozen soldiers were affected, but the military “does not assess that there has been a substantial breach of…
Category: Other
Genesis market 2020 overview, a bazaar for buying data out of compromised computers.
Under The Breach explains: A group of sophisticated hackers team up to sell the data of computers they managed to infect. The site began operating around the beginning of 2019 and only let users with an invitation code to join (it maintains this exclusivity until today). To find a person who has invitation codes is…
Cal Poly’s website gave visitors a surprise: hardcore porn
Monica Vaughan reports: An official Cal Poly website for the San Luis Obispo university’s Orfalea College of Business has all the related links you would expect: course descriptions, career pages, student groups and … porn? For several months, it appears that people who clicked to learn more about a professional student group called Information Systems Association were…
Data of sainik schools admission test hacked
Lalit Mohan reports: Data regarding entrance test for admissions to sainik schools has been hacked. Several residents of the Kangra region received phone calls today, demanding money to help their wards clear the examination. Balbir Kumar, a resident of Lunj area, submitted a complaint to the SP in this regard. Balbir, while talking to The…
OH: ‘Human error’ causes county data loss
Jennifer Woods reports: Due to “human error,” up to six months of data for a few county offices was lost or had to be re-uploaded to a computer system in December, according to the Fayette County Commissioners. Essentially, the data was being transferred by an employee of “YourColo” from one system into a more secure…
Ransomware: Cybercriminals are adding a new twist to their demands
Liam Tung reports that there’s a new twist to ransomware: attackers are not only encrypting the data, but stealing it and then threatening to leak it if their victim doesn’t pay up. Well, extortion demands (pay us or we’ll sell or dump your data) is nothing new, but I guess combining it with encrypting the…