article thumbnail

Pandemic Surveillance in Canada, Malware-Filled USB Sticks are Back, Kill Switches in New Cars

Security Boulevard

Canada’s federal government admitted to surveilling its population’s movements during the COVID-19 lock-down by tracking 33 million phones, the FBI warned that a hacker group has been sending malware-laden USB sticks to companies, and details on a new law in the United States which will install kill switches in new cars. ** Links mentioned on […].

article thumbnail

Navy Insider Threat Bust: Encryption, Social Engineering, and Crypto

SecureWorld News

This happened through social engineering, which included a secret signal for him in Washington D.C. Meanwhile, the FBI was still using social engineering tactics to get the Naval Nuclear Engineer to make an in-person data drop. Once again he unknowingly told the FBI, 'this is how you socially engineer me.'.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

A hacking collective compromised roughly 150,000 internet-connected surveillance cameras from Verkada, Inc., Hacktivist Tillie Kottmann is reportedly among those asserting responsibility for the incident, telling Bloomberg that their act helped expose the security holes of modern-day surveillance platforms.

article thumbnail

The US Capitol Riot is a National Cybersecurity Emergency

Adam Levin

The potentially compromised data could include: Social Security numbers, health records (including mental health), home addresses, phone numbers, etc., as well as details about state business and likely correspondents, which could be used in a spear phishing attack, doxxing , and other social engineering ploys.

article thumbnail

Robinhood Data Breach, 600 Hours of Dallas Police Helicopter Footage Leaked

Security Boulevard

Details on the Robinhood data breach (apparently caused by a social engineering attack) affecting approximately 7 million customers, and a discussion about surveillance and privacy concerns from a 600-hour leak of Dallas Police Department helicopter footage. ** Links mentioned on the show ** Robinhood Trading App Suffers Data Breach Exposing 7 Million (..)

article thumbnail

Stealth Soldier backdoor used is targeted espionage attacks in Libya

Security Affairs

Stealth Soldier is surveillance software that allows operators to spy on the victims and exfiltrate collected data. “Stealth Soldier malware is an undocumented backdoor that primarily operates surveillance functions such as file exfiltration, screen and microphone recording, keystroke logging and stealing browser information.”

article thumbnail

Top Methods Use By Hackers to Bypass Two-Factor Authentication

Hacker's King

However, if hackers gain access to these tokens through social engineering, phishing attacks, or other means, they can bypass 2FA by directly entering the codes, granting them unauthorized access. Social Engineering: Guarding Against Manipulation Social engineering remains a potent tool in hackers’ arsenal.