Toggle light / dark theme

Cybersecurity specialists report that Intel is facing a class action lawsuit for violating an anti–wiretapping law in the state of Florida, US. The plaintiffs argue that the company hid software on its website that allowed it to record users’ keystrokes and mouse movements without their express consent.

This is a new case of practice known as session replay, used by multiple companies to take detailed records of how their users interact with their websites, involving the capture of mouse movements, clicks and information queries on the page visited.

Under the lawsuit filed in Lake County Circuit Court, Florida, Intel is violating the state Communications Security Act, enacted in 2020 and which, among other things, prohibits companies from intentionally intercepting any electronic communication without consent.

Brown University is facing a cyberattack that has forced the school to shut some systems down — in an event that Brown is calling an “utmost priority.”

Jack Wrenn, a fifth-year doctoral candidate, said that official information was still “frustratingly scant” as of Wednesday night.

Wrenn provided a timeline as to what he understood transpired, and when the university community was notified.

Google stops western government hacking.

“Instead of focusing on who was behind and targeted by a specific operation, Google decided to take broader action for everyone. The justification was that even if a Western government was the one exploiting those vulnerabilities today, it will eventually be used by others, and so the right choice is always to fix the flaw today.”


A decision to shut down exploits being used by “friendly” hackers has caused controversy inside the company’s security teams.

Partners.

Banco Santander.

IBM

International Criminal Police Organization (INTERPOL)… See More


Cyberspace by nature has no borders, which allows criminals to launch their attacks from anywhere in the world, at any time. As legal parameters are unable to keep up with the pace of technological proliferation, the absence of international laws capable of restricting the actions of attackers regardless of their geolocation gives these criminals a sense of absolute impunity. To counter this effectively, there is an urgent need to start learning the basics of working together.

What is Cyber Polygon?

Hungarian mathematician László Lovász and Israeli computer scientist Avi Wigderson will share the prize, worth 7.5 million Norwegian kroner (US$886000), “for their foundational contributions to theoretical computer science and discrete mathematics, and their leading role in shaping them into central fields of modern mathematics”, the Norwegian Academy of Science and Letters announced on 17 March.


The work of winners László Lovász and Avi Wigderson underpins applications from Internet security to the study of networks.

But the site’s cybersecurity measures appear to be lacking.

Several other Nifty Gateway users reported that their accounts had been hacked. “My entire account was just hacked and the person who got in wasn’t even booted after changing my password?!” one user wrote in a tweet.

According to a Nifty spokesperson who spoke to Motherboard, the company was aware of the fraudulent activity. The company claims the affected users didn’t have two-factor authentication turned on and that “access was obtained via valid account credentials.”

Cybersecurity researchers have unwrapped an “interesting email campaign” undertaken by a threat actor that has taken to distributing a new malware written in Nim programming language.

Dubbed “NimzaLoader” by Proofpoint researchers, the development marks one of the rare instances of Nim malware discovered in the threat landscape.

“Malware developers may choose to use a rare programming language to avoid detection, as reverse engineers may not be familiar with Nim’s implementation, or focused on developing detection for it, and therefore tools and sandboxes may struggle to analyze samples of it,” the researchers said.

It didn’t take long. Intelligence agencies and cybersecurity researchers had been warning that unpatched Exchange Servers could open the pathway for ransomware infections in the wake of swift escalation of the attacks since last week.

Now it appears that threat actors have caught up.

According to the latest reports, cybercriminals are leveraging the heavily exploited ProxyLogon Exchange Server flaws to install a new strain of ransomware called “DearCry.”