China Using Fake Linkedin Profiles to Recruit Americans as Spies US intelligence officials are warning LinkedIn users that China is being “super aggressive” at recruiting Americans with access to government and commeACrcial secrets. The Chinese are creating fake LinkedIn profiles, friending people and trolling to see if they would be valuable if flipped or conned […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Spyware Company Leaves Terabytes of Data Unprotected Spyfone, a software company that allows parents to spy on their kids, spouses to spy on each other and employers to spy on employees allowed the world to spy on everyone. The data left exposed on Amazon included photos, text messages, contacts, location information, Facebook messages and other […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
FBI Asks Google for Information on ALL People Near Certain Crimes Now that we know that Google tracks you even if you ask nicely for it not to, this news from BBC becomes more interesting. The FBI issued a search warrant to Google for information on all people within a 100 acre block around a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Hamas Creates Fake Missile Warning App to Hack Israelis The Times of Israel is reporting that Hamas has created and was distributing a fake Code Red rocket warning app. The app, according to Clearsky Cyber Security, takes over the phone and is impossible to remove, even if the app is deleted. Once infected, the app […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Lack of Vendor Cyber Risk Management Hurts over 750 Banks TCM Bank, a company that helps hundreds of small banks issue credit cards had a problem with their third party vendor – the bank’s fourth party vendor risk. The small bank wants to issue credit cards so they hire TCM and TCM hires someone else […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Old Hacks Never Die Brian Krebs is reporting that state government agencies are receiving malware laced CDs in the mail, hoping that someone is curious enough to place it in their computer and infect it. This is an older version of a ploy that is still common of dropping malware infected flash drives in areas […]
Continue reading →
[DISPLAY_ACURAX_ICONS]