Update: Acronis responds to claimed hack
Acronis confirms a 12.2 GB data leak. Earlier, a popular hacker forum announced the data breach.
In a statement to The Register, Acronis' CISO confirmed that the systems were indeed compromised. The damage was reportedly limited to a single customer. No access was gained to any other data held a... Read more
Assume you have been or will be hacked to avoid the worst
In the security world, several experts recommend assuming that your company has been or will be hacked. This line of thinking makes an organization place a higher priority on making systems and business environments more secure. A company then takes more steps before a hack actually occurs, adaptin... Read more
GoDaddy hit by very lengthy cyber attack
GoDaddy appears to have been hit for years by a cyber attack in which source code was captured and malware was placed on servers. This writes the American domain registrar and web host in a statement to stock market regulator SEC.
According to the statement, it was discovered last December that ... Read more
Irish privacy watchdog investigates Twitter after massive data breach
Ireland's privacy watchdog is demanding answers from Twitter about a data scraping incident that leaked user information of millions of Twitter accounts.
Last August, Twitter acknowledged that hackers took advantage of a system flaw that has since been repaired to access profiles linked to email... Read more
ID-ware hack hits thousands of university students and employees
The personal data of tens of thousands of Eindhoven University of Technology students and employees were captured in a recent ransomware attack on the Dutch branch of German smart card specialist ID-ware.
In an email to about 21,000 students and employees, TU Eindhoven announced that personal d... Read more
FishPig discovers exploit that puts 200,000 websites at risk
200,000 sites risk having their data compromised due to an exploit in FishPig's software.
FishPig is a UK-based e-commerce software developer. Organizations use its Magento and WordPress plugins to streamline processes. FishPig recently discovered that attackers had found a backdoor into the sec... Read more
Google aims to make Linux kernel vulnerabilities tougher to exploit
Google plans to make the Kernel Flaws custom through 'Experimental Mitigations' that could make it difficult for hackers to breach.
Google says it uses Linux for pretty much everything, from the cloud system to Chromebooks. Now, the company focuses on putting together a team of security research... Read more
SGX, Intel’s seemingly secure data fortress, has been breached
The ÆPIC leak CPU bug spills users' sensitive and confidential data in seconds from Intel SGX enclaves.
Intel's latest CPUs contain a major vulnerability that enables attackers to achieve encryption keys as well as other private data protected by its SGX. This cutting-edge feature works as a va... Read more
Fraudulent Android apps can disable wifi and sign contracts
A new generation of Android scamware employs several tricks to register users to costly services.
According to Microsoft, Android malware developers have stepped up their billing fraud games with applications that disable WiFi connections, covertly subscribe individuals to costly wireless servic... Read more
Many housing corporations affected by breach of The Sourcing Company
An attack on ICT service provider The Sourcing Company led to data leaks at nine Dutch housing corporations.
A recent breach at The Sourcing Company has many consequences for housing corporations that purchased services from the ICT service provider. A total of nine Dutch housing corporations h... Read more