Hacking, Security & Privacy News - Page 3
Taiwanese computer company Acer has confirmed that it has experienced a massive data breach. However, its investigation into the hack indicates that customer data has not been stolen and is limited to things found on a server for repair technicians. The confirmation arrives after a hacker put up the data for auction on a popular hacker forum - claiming that 160GB of data had been stolen.
The hacker claims that the data includes "confidential" internal slides and presentations, staff documentation for technical support, Windows images, product information across various devices, "tons of BIOS stuff," and other files. The threat actor shared screenshots of schematics for an Acer display and other confidential documents to prove the data theft was real.
There isn't a price set other than the data will go to the highest bidder with the condition that payment is made via the hard-to-trace cryptocurrency Monero.
Windows 11 just got a raft of security fixes in the latest round of monthly patching from Microsoft, including some crucial ones.
In fact, there are three fixes for zero-day vulnerabilities provided, meaning bugs in Windows 11 which are public knowledge. And in this case, these security flaws are being actively exploited by nefarious types - so they represent a clear potential danger to Windows 11 users.
In total, there are 77 vulnerabilities fixed by Microsoft's February patch for Windows 11 PCs, and nine are labeled as 'critical.'
The US airline CommuteAir reportedly left a federal "No Fly List" on an unsecured server that was then accessed by a Swiss hacker.
The exclusive report comes from The Daily Dot that claims US airline CommuteAir left an unsecured server open that contained a large quantity of sensitive information. This server was accessed by a Swiss hacker that goes by "maia arson crimew" who wrote a blog post titled "how to completely own an airline in 3 easy steps," where they explained that they stumbled across the sensitive server by accident and through boredom.
Essentially, the hackers were just looking around through a search engine called Shodan when they discovered the server and a file titled "NoFly.csv". The file was opened, and the hackers discovered a 2019 version of a federal No Fly list that includes first and last names as well as dates of birth. The Daily Dot reports the list contained the names and aliases of many high-profile people, such as the recently-freed Russian arms dealer Viktor Bout and his 16 aliases.
Malware in the form of an advertisement in Google or other search engine results is not uncommon. We recently reported on a case involving a shady ad impersonating AMD for a user simply looking to update their graphics driver.
As per the PSA.
Norton LifeLock, a very well-known provider of identity protection and cybersecurity services, recently revealed in an announcement that thousands of its customers had their accounts compromised.
The parent company of Norton LifeLock, Gen Digital, states that the likely cause of the hack was a "credential stuffing" attack, which is when previously exposed or breached credentials of accounts are used to break into other accounts on different sites and services that have the same passwords. The company notes that it detected a "large volume" of failed logins to customer accounts on December 12, which led them to discover that the intruders had compromised accounts dating back to December 1.
The company sent notices to about 6,450 Norton customers whose accounts were affected by the breach. In the data breach notice, Gen Digital states that the unauthorized third party may have viewed customers' first names, last names, phone numbers, and mailing addresses. The company also said that it could not rule out that the intruders also accessed some customers' saved passwords.
A few days ago, on the popular PCMR subreddit, a user warned others that when he searched for "amd driver" the top result was an advertisement for a malicious website claiming to offer precisely that.
Of course, this wasn't a legitimate search result, but appearing above their search results, it was an ad made to look like the real thing. In our testing, it seems like the search result and site have both been removed, which is good to see.
Still, according to multiple sources, it was host to a dubious .exe download titled "Auto-Detect and Install Driver Updates for AMD Radeon Series Graphics and Ryzen Chipsets", which sounds legitimate. Until you take a closer look at the URL and realize it would definitely not do that. The site even featured AMD branding and AMD IP, a tactic that isn't new in the world of malware.
It wasn't until recently that I discovered Chrome has an in-built feature to help protect your kids (and anyone, actually) while browsing the web with Google's popular web browser. A recent Facebook post from the Google Chrome page alerted me to its "Enhanced Protection" security mode and family DNS feature, which we dive into below.
In the simplest terms, when turned on, this feature proactively monitors the user's behavior in Chrome and blocks bad websites, downloads, and extensions before they can cause a problem on your device. For example, you or your child might be about to enter a harmful website that attempts to steal important information. Chrome blocks the website and presents a very obvious red screen warning you.
A little discussion with your kids would go a long way, alerting them if they see this obvious red screen, reminding them it's a bad site and they shouldn't visit it. Chrome can also scan any downloads before the files are executed for malware. Privacy advocates may not be impressed by the feature since some of your data and activity need to be processed by Google. Still, it should be a suitable compromise for most if security concerns you. Considering this free feature doesn't slow down your devices as external security monitoring software and apps can, it's well worth it.
A group of hackers that are suspected of being Russian targeted more than a dozen US airport websites on Monday.
According to reports from ABC News and several other publications, a group of hackers believed to be located in Russia targeted fourteen US airport websites on Monday, with some of the websites being LaGuardia, O'Hare and LAX. The hack brought down the website for approximately fifteen minutes and sparked a response from a US government official that stated air traffic control, along with internal airport communications and other critical operations, weren't impacted by the hack.
However, travelers that were interested in wait times or any other information found on the website would have experienced an inconvenience. Furthermore, a spokesperson for LAX said that the attack didn't compromise internal airport systems and that there were no operational disruptions to report.
In what appears to be the largest education breach in the last couple of years, a large amount of student data has been released by a group of hackers that infiltrated a school system last month.
The hacking group named Vice Society claimed responsibility for the ransomware attack on Los Angeles Unified School District (LAUSD), which resulted in the bad actors gaining access to emails, computer systems, applications, and more. Reports indicate that hundreds of gigabytes of student data was stolen and that the hacker group demanded an undisclosed amount of money for the return of the data. Unfortunately, as expected by U.S. authorities, the data was released online as the October 4 deadline was not met.
According to Tech Crunch, the stolen data was posted to Vice Society's dark website and contains extremely sensitive data on students, such as personal identification information, passport details, Social Security numbers, and tax documents. Additionally, the half a terabyte of leaked sensitive information also contains confidential information in the form of documents, contracts, health information on students/staff, COVID-19 test data, conviction reports, and psychological assessments on students.
The hacking collective Anonymous has taken to YouTube to announce that its declaring war against the creators of one of the most popular NFT projects, the Bored Ape Yacht Club.
Anonymous released the above video onto its YouTube channel on September 27, and in the almost 9-minute long video, the hacking collective accuses the creators of the Bored Ape Yacht Club NFT project, Yuga Labs, of including "esoteric" Nazi, white supremacist, and pedophilic symbolism throughout its designs. These accusations aren't necessarily surprising, as Yuga Labs has previously denied any intentional inclusion of artistry that represents the aforementioned groups or ideologies.
Futurism reports that the accusations originally began with digital artist Ryder Ripps who published a website that connected symbols within some of the Bored Ape Yacht Club designs with Nazi symbolism. These allegations were seemingly picked up by Anonymous, which the hacking collective states in the above video it has found proof "beyond a shadow of a doubt" that Yuga Labs intentionally includes elusive Nazi symbolism within its digital art projects.