Remove InfoSec Remove Social Engineering Remove Surveillance Remove Technology
article thumbnail

Robinhood Data Breach, 600 Hours of Dallas Police Helicopter Footage Leaked

Security Boulevard

Details on the Robinhood data breach (apparently caused by a social engineering attack) affecting approximately 7 million customers, and a discussion about surveillance and privacy concerns from a 600-hour leak of Dallas Police Department helicopter footage. ** Links mentioned on the show ** Robinhood Trading App Suffers Data Breach Exposing 7 Million (..)

article thumbnail

Pandemic Surveillance in Canada, Malware-Filled USB Sticks are Back, Kill Switches in New Cars

Security Boulevard

Canada’s federal government admitted to surveilling its population’s movements during the COVID-19 lock-down by tracking 33 million phones, the FBI warned that a hacker group has been sending malware-laden USB sticks to companies, and details on a new law in the United States which will install kill switches in new cars. ** Links mentioned on […].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Janet Jackson Can Crash Laptops, Credential Phishing Attacks Skyrocket, A Phone Carrier That Doesn’t Track You

Security Boulevard

Janet Jackson’s “Rhythm Nation” has been recognized as an exploit for a vulnerability after Microsoft reported it can crash the hard drives of certain old laptop computers, phishing attacks that compromise credentials using brand impersonation are on the rise, and details about a new privacy focused phone carrier that doesn’t track your location or (..)

article thumbnail

5 Major Cybersecurity Trends to Know for 2024

eSecurity Planet

AI Use Danger As with any emerging technology, many organizations should expect errors and growing pains as teams learn the nuances of applying the technology. Some attacks will be aided by technology, while others will be more strategic in nature as companies strengthen cyberdefense against older attacks.

article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

What role does technology play in facilitating intimate partner abuse? They discuss how software and IoT companies can avoid becoming the next Black Mirror episode and share resources that can help survivors (and those who want to help them) deal with the technology issues that can be associated with technologically facilitated abuse.

article thumbnail

The Trouble with Politicians Sharing Passwords

Troy Hunt

All the subsequent reasons given for why it’s necessary have technology solutions which provide traceability back to individual, identifiable users. Her approach to password sharing may simply be evidence of humans working around technology constraints: I don't blame her, I blame the I.T but the topic kept coming up.

Passwords 204