Almost imperceptible attacks on virtual cloud machines allow to replace the memory and compromise the cryptographic keys available on them.
2. FairWare ransomware infects servers through exposed Redis instances
Hackers replace SSH root key using insecure default configuration Redis data in the database, and then destroy all the data on the server.
3. Mission Impossible? FBI wants to be cool enough to recruit hackers
There's been a hacking increase in US companies and organizations. To combat this, the FBI is looking for new employees in the hacker environment to counter the growing number of cyber attacks. The FBI will have to change in order to lure people from the private sector.
4. Uber to require U.S. drivers to verify themselves by snapping selfies before accepting rides
Uber got too many complaints about the drivers. Now Uber app will periodically request a selfie from the driver to make sure that he uses the account. The data will be processed automatically.
5. Researchers manage to hack Tesla brakes remotely
Now you need to update not only your computer, but also your car. Researchers found multiple holes in Tesla security in the CAN tires, which allowed them to remotely manage some components.
6. Advantages of Using Encryption Technology for Data Protection
The more data is stored online, the more people want to get the data. The article offers encryption as an important part of protection.
7. Cyber Security of the Connected Car in the Age of the Internet of Things
In times of IoT any car available on the network is a potential target for cybercriminals. Everyone, starting with the producer to the consumer is responsible for the safety of the car, but few are prepared for it at this point.
8. HSBC will now let customers open new bank accounts using selfies
The new bank application can perform authentication through the Selfie, identify and verify the documents from 150 countries in the world to open new bank accounts remotely. It is also contemplated to use biometric data and fingerprints.
9. FBI must get a warrant to hack into someone's computer, US judge rules
A federal judge in the case of child pornography decided that the FBI will need permission to break into someone else's computer. However, the current rules do not allow to obtain permission to hack at an unknown address.
10. Lenovo, Intel, Synaptics and PayPal team up to replace passwords on PCs with fingerprint authentication
The technology will allow people to use fingerprints for identification when using online payment services. To do this, a new FIDO alliance has been set up, which includes major banks and technology companies.
Which of today's news topics did you enjoy the most?