Amazon Accidentally Leaked Customer Names And Email Addresses

There’s trouble brewing at Amazon, although details are sketchy about how much trouble there might be. Recently, the company sent the following message to some of its customers: “Hello, We’re contacting you to let you know that our website inadvertently disclosed your email address due to a technical error.  The issue has been fixed.  This is not a result of …

Google Continues To Battle With Malware In Play Store

In recent months, Google has taken steps to tighten up its processes so that fewer poisoned apps find their way into the Google Play Store.  In addition to that, the company has stepped up its efforts to ruthlessly track down and remove malicious apps whenever and wherever they are found.  By most accounts, that effort has been successful. Sadly, it …

Are Graphics Processing Units Vulnerable To Hacker Attacks?

Bad news for computer users everywhere.  Researchers at the University of California in Riverside have discovered that GPUs (Graphics Processing Units) are vulnerable to side-channel attacks like Spectre and Meltdown, which have been plaguing Intel CPU’s for the better part of a year. The team, (consisting of two computer science professors and two PhD students) reverse-engineered an Nvidia GPU and …

Fraudulent Payments Are Hurting Venmo And Its Users

The mobile payment platform Venmo (owned by Paypal) has a fraud problem.  That’s not exactly new.  The company has struggled with fraud issues for a long time, but recently, things have gotten out of control.  According to the Wall Street Journal, the company reported losses of $40 million in just the first three months of 2018, and there’s no end …

You Should Be Worried About Cryptocurrency Mining Malware

In the world of data security, cryptocurrency mining software is often overlooked or discounted as a threat because it doesn’t do serious harm to the infected system. It bleeds off computing resources, putting them to work for the miners who control the software, working for them to solve complex cryptographic puzzles which generate revenue for the hackers.  However, that’s not …

Most Travelers Are Oblivious To Security Risks During Travel

Over the course of the holiday season this year, more than half of the working adults in the United States will be traveling with one or more of their work devices. Unfortunately, only a tiny fraction of those fully appreciate the data security risks inherent in travel, which is a grim reality that could put your company and its data …

Target’s Twitter Gets Hacked And Hackers Post A Scam Tweet

Target is the latest company to fall victim to a simple but effective Twitter-Bitcoin scam.  The scam is about as straightforward as it gets:  A tweet gets sent out by a well-respected brand or prominent individual.  It contains a link which is likely to be clicked on, given that it’s from a prominent individual or well-respected brand. The page at …

Survey Finds Employees Aren’t Improving Internal Security Practices

SailPoint has recently published some new research that will probably give you a headache, if you’re a business owner. It’s been common knowledge for at least a few years now that employees are a company’s weakest link when it comes to data security.  From weak passwords, to using the same password across multiple web properties, to a general lack of …

Two More Companies Just Had Customer Data Breached

How long does it take from when hackers steal credit card data from a given company until it appears for sale on the Dark Web? The answer varies from one hacker to the next, but the short answer is ‘not very long.’  The more precise answer, at least in the case of New Egg and British Airways, (both of whom …

Researchers Have Found A New Security Issue With Bluetooth

Researchers from the Israeli security firm Armis have discovered a new security flaw in BLE (Bluetooth Low Energy) chips that expose millions of access points and networking devices around the world. This opened the door to a new hack. The flaw has been dubbed “BleedingBit” and is actually two separate vulnerabilities that could allow a hacker to execute code or …