TweakTown NewsRefine News by Category:
Popular fast casual restaurant Chipotle has issued an apology to its Twitter followers, after being hacked over the weekend. Insensitive tweets were published to more than its 634,000 followers, including racist messages aimed at President Obama - before Twitter could suspend the account. A separate tweet claimed the company would be shutting restaurants before the end of the year.
We apologize for the very offensive messages sent out from our account earlier tonight. We were unfortunately hijacked temporarily. -Joe- Chipotle (@ChipotleTweets) February 8, 2015
The attack also reportedly hit the official Chipotle website, which led visitors to a different website.
"Our Twitter account was hijacked overnight for about two hours during which a series of offensive tweets was posted to the account," said Chris Arnold, communications director of Chipotle. "We apologize for the nature of the posts that were made during that time, and we are now conducting an investigation to try to determine what happened and who might have been involved."
In the aftermath of the Anthem data breach last week, the New York Financial Services Department said it plans to conduct cybersecurity audits of insurance companies. The "regular" and "targeted assessments" will be a part of its examination process, and enhanced regulations should keep New York insurance members safer from future data breaches.
The Anthem data breach could affect upwards of 80 million people, as personal information was taken during the sophisticated cyberattack.
"We're still in the process of finalizing and determining the enhanced requirements, but we are moving quickly and expect to begin putting them forward in the coming weeks," said Matt Anderson, spokesman of the New York Financial Services Department, in a statement published by Reuters. "These requirements are specific to New York, but we're of course always willing to discuss these issues with other states."
Donna Prouty, 57, is accused of stealing more than $2,500 in credits from a restaurant, accessing the restaurant's mobile payment account. Her husband allegedly allowed her to use the app to transfer funds from the restaurant's bank accounts into her own personal accounts.
The Maryland District Court Commissioner has charged Prouty with theft, theft scheme, and several counts of unauthorized use of a credit card.
Restaurants and other businesses hope that accepting mobile payments will make it easier for customers to pay - but mobile security remains a critical issue. It's unknown what service the restaurant uses to collect mobile payments, however, this type of issue must be solved to prevent similar security breaches.
The Anonymous hacker collective is taking aim at ISIS in Syria and Iraq, launching attacks to disrupt the group's social media accounts. As part of its #OpISIS campaign, Anonymous has taken down hundreds of Twitter, Facebook, and other social media accounts linked to ISIS - used to spread propaganda and woo potential recruits.
"ISIS: We will hunt you, take down your sites, accounts, emails and expose you," Anonymous pledges. "From now on, no safe place for you online... you will be treated like a Virus, and we are the cure. We own the Internet. We are Anonymous; we are Legion; we do not forgive, we do not forget. Expect us."
In addition to listing Twitter and Facebook accounts - of both compromised accounts and possible targets - Anonymous has revealed email addresses, IP addresses, VPN connections and websites used by the extremist group.
The recent data breach suffered by Anthem is further proof that companies are under cyberattack - and find it difficult to keep up with increasing numbers of sophisticated attacks. Many corporations understand they face cybersecurity threats, but can do very little to prevent crippling data breaches.
"For any given unit of time that goes by, the probability of an organization being compromised is trending to 100 percent," said John Hering, co-founder of the Lookout security firm, in a statement to CNBC. "We need to move to a world where security is not reactive, but proactive and predictive."
Financial institutions and medical companies typically have more stringent security protocols in place, but still find it difficult to prevent attacks. Late last year, JPMorgan Chase suffered a data breach that affected millions of customers, with phishing attacks and other threats targeting compromised victims.
HLTV.org is arguably the home for all Counter-Strike 1.6 and CS:GO news, updates, reports, event coverage, announcements, professional player analysis and more. In a recent blog post they've reported a security breach has taken place.
Thankfully there is no user-stored financial information on this website, so all that has been compromised is your personal profile - however if you're like many and use the same password for multiple websites, you might want to act quickly.
The post went on to explain that the admins "have auto logged out everyone, so no sessions can be stolen that way, so that is why you are prompted to re-login the next time your session expire." HLTV recommends that all users change their passwords immediately.
Opposition fighters trying to overthrow the regime of Syrian President Bashar al-Assad have fallen prey to one of the oldest social engineering tactics: hackers use fake Facebook and Skype profiles of young, beautiful women to target rebels, inviting them to chat. Pictures are exchanged, though the hackers load images with malware able to copy chat logs and steal strategic information.
The tactic continues to work on oblivious Syrian fighters, continually chatting with pro-Assad hackers - and the results have been devastating. A FireEye report revealed 7.7GB of data has been compromised, along with more than 12,000 contacts and 31,000 Skype conversations.
"We are really seeing the convergence of traditional methods of espionage and Internet communication tools," said Richard Turner, EMEA VP of FireEye, told CNBC. "The evidence of that is the use of the attractive lady avatar to generate interest and open up individuals to deliver malware and compromise their communication."
In an effort to protect federal and private computer assets from cyberattacks, President Barack Obama wants to receive $14 billion in the 2016 fiscal year to put towards cybersecurity. The US government has increasingly called upon defense contractors and the private sector to provide next-generation software and hardware designed to help keep critical infrastructure safer from attack.
As part of his multi-billion-dollar cybersecurity effort, Obama wants to include additional intrusion detection and prevention solutions, along with increased intelligence sharing between the government and private sector.
"Cyber threats targeting the private sector, critical infrastructure and the federal government demonstrate that no sector, network or system is immune to infiltration by those seeking to steal commercial or government secrets and property or perpetrate malicious and disruptive activity," according to a White House summary.
Raptr confirmed that it was hacked, and the company is now recommending users change their passwords sooner rather than later. Some user data may have been compromised in the breach, but Raptr didn't say what type of data may have been stolen.
Raptr Reward Points earned by its members are protected with two-factor authentication and should be protected from any outside tampering.
"Although the potential risk to Raptr users is pretty minimal, we urge you to access any accounts on other sites and services in which you use the same login and password associated with your Raptr account and change the related password(s) immediately," Raptr said in an official statement.
A new cyber threat victimizing users is the 'RansomWeb' attack, which leaves compromised websites encrypted - and they will remain that way until the victim pays a ransom to cyberattackers. The threat was first detected by cybersecurity firm High-Tech Bridge, investigating a client website, which displayed a database error.
The cybercriminals demanded a $50,000 ransom in exchange for decrypting the database, despite it being compromised six months prior. A closer inspection found that several server scripts were edited so data was encrypted before it was submitted to the database, and data was decrypted after being pulled from the database.
Instead of an immediate ransom demand - like ransomware attacks against business users - the cybercriminals patiently waited until backups were also overwritten.