Category: Cyberawareness

Nearly 50% of Americans Change Passwords Post 2016 Elections Hack

 A poll has shown that a significant number of American are making changes to their online habits to protect their privacy after last year’s hacks of the Democratic Party. It is now common...

Read more arrow_forward

Ransomware Hackers Could Soon Target Smartphones, TVs: UK Cybersecurity Chiefs

A joint report by the UK’s National Cyber Security Centre (NCSC) and the National Crime Agency (NCA) has underlined the risk of hackers targeting internet-connected devices for extortion. As...

Read more arrow_forward

Trump Campaign Advisor Engaged in Twitter Exchange with DNC Hackers

President Trump’s former campaign advisor Roger Stone has admitted to having conversations with the perpetrator behind the hack of the Democratic National Committee. Speaking to The Washington...

Read more arrow_forward

Google Removes Instagram Phishing Apps After 1.5 Million Installs

Security researchers from cybersecurity firm ESET discovered at least 13 new Instagram credential-stealing apps on Google Play which have been installed by up to 1.5 million users. A number of...

Read more arrow_forward

CIA Blasts WikiLeaks for Publishing Breached Secret Documents

The Central Intelligence Agency (CIA) has lambasted WikiLeaks, accusing the whistleblower organization of endangering the lives of Americans after releasing a trove of CIA hacking tools and secretive...

Read more arrow_forward

WikiLeaks: CIA Malware Turned iPhones, smart TVs into Hacking Devices

WikiLeaks has leaked a large trove of CIA documents and hacking tools that were supposedly used by the agency to compromise smartphones, computers and even IoT devices such as smart televisions, in...

Read more arrow_forward

Vice President Pence Used AOL Email as Indiana Governor, Got Hacked

United States Vice President Mike Pence used his private AOL email account to conduct state business as governor of Indiana. His personal email account was hacked last summer. According to a report...

Read more arrow_forward

NSA White-Hat Hackers are Reportedly Quitting in Droves

The NSA is seeing an increased number of employed hackers and cyberespionage agents quitting the agency, according to current and former NSA officials. Citing current and former officials, Reuters...

Read more arrow_forward

IoT Teddy Bear Leaks 2 Million Recordings of Parents’ and Kids’ Messages

The manufacturer of Internet-connected “smart” teddy bears has leaked the credentials of over 800,000 user accounts and millions of personal messages between parents and their children, which...

Read more arrow_forward

MacOS Malware Linked to Russian Hackers Steals Passwords, iPhone Backups

A new variant of a Mac malware allegedly developed by APT28, the same cyber espionage group believed to be responsible for the hacks of the Democratic party in the lead up to the 2016 presidential...

Read more arrow_forward

Yahoo: Your Email Accounts May Have Been Hacked, Again

For the third time in less than 6 months, Yahoo has, once again, warned users that their email accounts may have been hacked. On the day where Verizon is reportedly renegotiating its deal to acquire...

Read more arrow_forward

Malware Targeting MS Word for Apple Mac OS Discovered in the Wild

Macros-based malware attacks targeting Windows machines running Microsoft Word have been proved to be a long-standing and routine threat to PCs. Now, security researchers have discovered attackers...

Read more arrow_forward

Yahoo, MSN Struck by Advanced Malvertising Campaign

 A treacherous malicious advertising campaign is making a comeback on major publishing websites including the likes of MSN and Yahoo, merely months after researchers discovered and were thought to...

Read more arrow_forward

It’s Tax Season and the IRS Warns of a “Dangerous W-2 Phishing Scam”

Fraudsters are turning to phishing campaigns in attempts to trick individuals with access to their company’s W-2 tax forms into turning them over, the IRS has revealed. More pointedly, the Internal...

Read more arrow_forward

Federal Govt’s Rogue Tweeters Could be Prosecuted as Hackers

An online campaign that saw a number of unauthorized tweets on climate change with opinions that are inconsistent with Trump’s campaign statements and policies on climate change could see...

Read more arrow_forward

FBI: Business E-Mail Compromise Scams Increasing Dramatically

The Boston Division of the FBI has warned of a significant increase in BECs or business e-mail compromises that are targeting businesses of all sizes and types, resulting in massive financial losses...

Read more arrow_forward

Hacker Finds Glaring Vulnerabilities in Apple’s Notification Feature

A buggy new notification feature that was found to contain multiple significant vulnerabilities by a security researcher has seen Apple pullback and disable the feature entirely. Released for users...

Read more arrow_forward

How to Avoid Bad HIPAA Compliance Practices

The Health Insurance Portability and Accountability Act (HIPAA) of 1996 was enacted to protect health insurance coverage for employees and their families. HIPAA is particularly useful when an employee...

Read more arrow_forward

Cybersecurity Experts Discover Botnet of 350,000 Twitter Accounts

An entire botnet of Twitter accounts that have the means to produce spam, manipulate debates, shape public opinion in an insidious manner has been uncovered by researchers at the University College...

Read more arrow_forward

US Intelligence Agencies Have Been Investigating Russia’s State-Sponsored Hacking

A group of intelligence agencies and law enforcement authorities have, for months, led investigations into the possibility of hackers paid by the Russian government to infiltrate targets in the United...

Read more arrow_forward

Report: WhatsApp ‘Backdoor’ Leaves Encrypted Communication Vulnerable

New research has claimed that the way in which popular messaging platform WhatsApp has implemented its end-to-end encryption protocol leaves it vulnerable to outsider attacks. WhatsApp, a messaging...

Read more arrow_forward

Trump’s Cybersecurity Advisor Rudy Giuliani Runs an Insecure Website

Rudy Giuliani, the former New York mayor who is now appointed by President-elect Donald Trump as his special advisor on cybersecurity is facing a potentially embarrassing faux pas. Security experts...

Read more arrow_forward

U.S. Declassifies Technical Details of Russian Hacking

Following unprecedented sanctions against Russia for the cyberattacks and hacking endeavors in the run-up to the US presidential elections, the Obama administration has declassified technical...

Read more arrow_forward

FTC Sues Networking Giant D-Link over Risking US Consumers' Privacy

The U.S. Federal Trade Commission (FTC) has charged hardware manufacturer D-Link on Thursday, alleging that the company’s inadequate security measures has left its wireless routers and Internet...

Read more arrow_forward

WikiLeaks’ Julian Assange: A Teenager Could Have Hacked Podesta’s Emails

WikiLeaks founder Julian Assange has claimed that a 14-year old could have broken into the personal email inbox belonging to John Podesta, a close aide of Hillary Clinton who was targeted among the...

Read more arrow_forward

White House Announces Sanctions for Russian Hacking

In an unprecedented move, the White House has enforced several sanctions against Russia in retaliation to the alleged hacks by state-sponsored Russian hackers in the lead up to the 2016 Presidential...

Read more arrow_forward

President-elect Donald Trump: “No Computer is Safe”

President-elect Donald Trump has expressed skepticism about the security of electronic communications, stating that no computer is safe from hacking. Trump was speaking to reporters during his annual...

Read more arrow_forward

Apple Backtracks on 2017 Mandate for HTTPS-Only Apps

Apple issued a mandate during its 2016 WorldWide Developer Conference, requiring developers of all iOS and OS X applications in Apple’s App Store to adopt ATS, or App Transport Security. Much...

Read more arrow_forward

Hacker Exploits MacOS FileVault2 Password in 30 Seconds

Ulf Frisk, a Swedish hacker and penetration tester has revealed a new exploit that any attacker can exploit a macOS FileVault2, even if the Mac computer is in sleep or locked at the time of the...

Read more arrow_forward

Microsoft is Warning Christmas Shoppers about Ransomware

In a new post on its Malware Protection Center blog, software giant Microsoft has warned customers about ransomware cybercriminals targeting online shoppers through a phishing...

Read more arrow_forward

The NSA’s Mission for National Security Includes Data Collection

President Obama spoke about the need to strike a balance between the need for security – through surveillance – and preserving one’s freedoms and privacy, in a May 2013 address....

Read more arrow_forward

Microsoft’s PowerShell is Being Abused by Malware Authors

Microsoft Powershell, the software giant’s prominent scripting language that is now the default shell in the ever-popular Windows operating system is being used by cybercriminals to spread...

Read more arrow_forward

Java Keylogger Malware Puts Online Shoppers at Risk

An exploit that forwards credit card details from checkout pages stems from a Java keylogger malware, researchers have discovered. The credit card information is stolen from online checkout forms...

Read more arrow_forward

The FBI Just Became the World’s Most Powerful Hacker

New amendments to Rule 41 of the Federal Rules of the Criminal Procedure means that the FBI can now access multiple locations – anywhere in the world – with a federal judge approved...

Read more arrow_forward

The San Francisco Transit Hack Could’ve Been Significantly Worse

A 2014 paper sanctioned and published by the American Public Transport Association has shown damning evidence that the San Francisco transit hack could’ve been far more destructive than the...

Read more arrow_forward

Ransomware Hackers Strike San Francisco Transit System

San Francisco’s transport agency has been targeted by a cyberattack by hackers who demanded a ransom of 100 bitcoins, approx. $70,000. Over 2,000 systems belonging to San Francisco’s...

Read more arrow_forward

Vince Martinez on SEC and Cybersecurity Policies

Vince Martinez is a partner in the Government Enforcement practice of K&L Gates LLP, where he focuses on investigations, defense and compliance advice matters.  Mr. Martinez previously served...

Read more arrow_forward

Alert: iPhone Passcode Can Be Bypassed to Access User Media

Despite Touch ID’s implementation, the Apple iPhone’s passcode has proven to be vulnerable, with a proof-of-concept demonstrating that the security feature can be bypassed to access the...

Read more arrow_forward

OPM Hack Victims Now Targets of a Ransomware Attack

It was June 2015 when the Office of Personnel Management (OPM) was revealed to be the victim of a breach, an infamous incident which was one of the largest breaches of a federal institution. Now, some...

Read more arrow_forward

U.S. Senate GOP Committee's Online Store Targeted by Hackers

According to reports, Russian hackers have been siphoning off credit card data from visitors of the online storefront belonging to the National Republican Senatorial Committee (NRSC). A Dutch...

Read more arrow_forward

Cybersecurity Expert: IoT Botnets are the Trojan Horse of the 21st Century

The sweeping and unprecedented cyberattack that occurred on October 21, 2016 draws parallels with the giant horse filled with Greek soldiers that was presented to the Trojans as a peace offering some...

Read more arrow_forward

Troublesome Cryptowall Ransomware Spotted in the Menacing Nuclear Exploit Kit

Cryptowall 4.0, the latest variant of arguably the world’s most annoying and intrusive ransomware has now surfaced in the Nuclear exploit kit, an equally dangerous exploit kit available in the...

Read more arrow_forward

Tune In To ABC NY To Watch Our CEO Give A Cyber Attack Demo - Monday 10/31 at 5:00 PM ET

Tune in tonight at 5:00 pm for LIFARS’ first interview with ABC! Watch a live demo of Man-in-the-Middle Cyber Attacks and learn about the dangers of public wifi. Ondrej Krehel, CEO & Founder...

Read more arrow_forward

Researchers Show NSA's Capability to Break Trillions of Encrypted Connections

Researchers have fundamentally proven that NSA broke the most-widely used encryption on the internet. It was 2014 when documents leaked by former NSA employee Edward Snowden revealed the NSA’s...

Read more arrow_forward

Microsoft Releases Patches for Zero-Day Vulnerabilities

This month’s Patch Tuesday sees a total of 10 security bulletins, all of which come as a package to the user.Microsoft’s new all-or-nothing patch model is out for the month of October. The...

Read more arrow_forward

If you have any further questions, please don't hesitate to contact us.