Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


North Korean Malicious Cyber Activity

Original release date: April 10, 2019

The Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) have identified a Trojan malware variant—referred to as HOPLIGHT—used by the North Korean government. The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA.

The Cybersecurity and Infrastructure Security ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Russia accused of massive GPS spoofing campaign

Russia has been hijacking signals sent by Global Navigation Satellite Systems (GNSS) systems such as GPS, researchers claim.


Spycam sex videos of 1,600 motel guests sold to paying subscribers

1,600 guests were filmed with hidden webcams that live-streamed the action. The site also sold videos.


Continue Reading →
0

Stupid Politicians – Australia Edition

Thank God this hasn’t happened here in the United States (yet).  It is not for lack of trying by US law enforcement agencies, though.  What am I talking about?  Australia recently passed the controversial and totally STUPID anti-encryption law called Telecommunication & Other Legislation Amendment (Assistance & Access) Act of 2018 (TOLA).

TOLA is supposed to ...

Continue Reading →
0

VPN Encryption Protocols Explained

A VPN can provide a way to keep your location private by replacing the IP address of your ISP’s gateway router with an anonymous IP from the VPN provider’s pool.  It will prevent your ISP, or Google and other websites from discovering your location, tracking your activity online, or saving your search history.  The contents of your communications are changed from plaintext to ...

Continue Reading →
0

How to Pick a VPN

If you are looking to protect yourself and your computer communications by using a VPN, the hardest part often is knowing where to start.  There are dozens of companies providing VPN services for a fee.  How can you know which one is best for you?

There are a number of features to consider when shopping for a VPN service.  Some of the features to ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


620 million records from 16 websites listed for sale on the Dark Web

The Register reports that a seller on the Dream Market – a Dark Web marketplace hidden by the encrypted layers of Tor – began offering 16 stolen databases with 620 million accounts.


First it was location, now every app wants your contacts

Why do app developers ...

Continue Reading →
0
Page 1 of 8 12345...»