Connect with us

Cyber Security

CouchSurfing Investigates Potential Data Breach

Avatar

Published

on


The service has reportedly hired a security firm after 17 million user records were found on a public hacking forum.

CouchSurfing, a company that helps travelers find free places to stay, is looking into a data breach following the discovery of 17 million user records for sale on hacking forums and private Telegram channels, ZDNet reports.

An anonymous data broker found that the data has a price tag of $700 and has been advertised as stolen from CouchSurfing servers earlier in July. A sample of the data revealed user IDs, real names, email addresses, and account settings. Notably, it did not include users’ passwords.

The data was first shared in Telegram channels, then appeared in public hacking forums. Couchsurfing has reportedly hired an external cybersecurity firm and contacted law enforcement as part of its investigation.

Read more details here.

 

 

Register now for this year’s fully virtual Black Hat USA, scheduled to take place August 1–6, and get more information about the event on the Black Hat website. Click for details on conference information and to register.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Recommended Reading:

More Insights

Source: https://www.darkreading.com/attacks-breaches/couchsurfing-investigates-potential-data-breach/d/d-id/1338437?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Cyber Security

Russian hackers steal Prince Harry and Meghan Markle photos via Cyber Attack

Avatar

Published

on

According to a biography ‘Finding Freedom’, Russian hackers reportedly stole 100s of photos and videos related to the marriage of Duke with Duchess of Sussex that includes some snaps related to the Queen of Britain.

Authored by Omid Scobie and Carolyn Durand, the biography gives us details on why Prince Harry chose to depart the royal life to lead a quiet living in United States along with his newly born son ‘Archie’ Harrison Mountbatten Windsor and wife Meghan Markle.

Coming to the data leak, the breach is a wake up call to the entire world on how hackers could invade into the personal lives of celebrities without their knowledge to create havoc thereafter.

Cybersecurity Insiders has learnt that the stolen photos were related to the wedding photographer Alexi Lubomiriski, hired to digitally capture the wedding of the Duke with Meghan in May’18. Around 200 photos related to the Prince’s wedding were stolen by a computer programmer based in Russia out of which many were ‘outtakes’ meant to be directed to the computer trash can.

The biography specifies that the memorabilia were siphoned from a cloud account owned by the marriage photographer and includes pictures taken by Harry and Meghan along with the Queen at the wedding.

A photo sharing website named Tumblr is seen displaying a few of the stolen pictures possibly leaked by the hacker. 

An inquiry into the data breach and leakage of wedding photos was launched by the law enforcement in Britain after it received an official complaint from the authorities at the Queens palace.

Note- In June 2019, hackers somehow managed to infiltrate the personal computer of the New York based fashion photographer Alexi Lubomirski well- known in the fashion community of London for digitally capturing the lives of Scarlett Johnson, Jennifer Lopez, Britney Spears, Natalie Portman on many ocassions/events.

Source: https://www.cybersecurity-insiders.com/russian-hackers-steal-prince-harry-and-meghan-markle-photos-via-cyber-attack/?utm_source=rss&utm_medium=rss&utm_campaign=russian-hackers-steal-prince-harry-and-meghan-markle-photos-via-cyber-attack

Continue Reading

Cyber Security

Texas School District experiences DDoS Cyber Attack

Avatar

Published

on

On the very first day of virtual learning, a Texas school district has made it official that it became a victim of a cyber attack that disrupted virtual classes for 48 minutes. However, the good news is that the IT staff of the school district was swift enough to thwart the Denial of service cyber attack, neutralizing its repercussions to full extent.

The school district that is in discussion is based on the City of Humble, Texas, United States and is known as ‘The Humble Independent School District (Humble ISD) ’.

Liz Celania- Fagan, the Superintendent of Humble ISD, has confirmed the incident via twitter and informed the world that the virtual classes that were impacted by the cyber incident were back online after a break of nearly an hour.

Liz mentioned in her statement that all those students who were logged into the classes via their student Gmail accounts might not be able to log into their student email accounts until the incident is technically resolved.

Note- A denial of service attack aka distributed denial of service attack is launched through botnets that aim to shut down a computer network by bombarding it with fake web traffic.

Meanwhile, The Federal Bureau of Investigation (FBI) has issued a nationwide alert that all school districts that are planning for virtual classes for this academic year should take adequate Cybersecurity measures as there is a high possibility that their servers might be targeted by ransomware.

“As many of the K-12 schools are planning virtual classes from September, it makes them vulnerable to cyber attacks such as ransomware”, says Corey Harris, a special agent of FBI.

There is a good chance that hacking groups might be after social security numbers and other faculty or staff info added Harris.

Hope, the CIOs or CTOs of school districts have taken a note of the ransomware alert issued by FBI targeting K-12 schools.

Source: https://www.cybersecurity-insiders.com/texas-school-district-experiences-ddos-cyber-attack/?utm_source=rss&utm_medium=rss&utm_campaign=texas-school-district-experiences-ddos-cyber-attack

Continue Reading

Cyber Security

Digital signatures security explained

Avatar

Published

on

[ This article was originally published here ]

This blog was written by an independent guest blogger.
Digital signatures have been around for decades, but recent events have put them back in the spotlight. They were heralded as the future of cybersecurity as far back as 1999, but in the intervening years came to be somewhat taken for granted by security engineers. Not any longer: the massive move to home working precipitated by the Covid-19 pandemic have forced many to take a fresh look at the security value of digital signatures, why they matter, and their relationship to encryption.
We thought we’d do the same. In this article, we’ll give you a refresher course on how digital signatures work, why they are important for security, and what the future holds.
How do digital signatures work?
Digital signatures, at the most fundamental level, are mathematical algorithms used to validate the authenticity and integrity of an electronic message….

Bernard Brode Posted by:

Bernard Brode

      

Avatar

Source: https://www.cybersecurity-insiders.com/digital-signatures-security-explained/?utm_source=rss&utm_medium=rss&utm_campaign=digital-signatures-security-explained

Continue Reading
Nano Technology11 hours ago

SEMI Partners with GLOBALFOUNDRIES to Offer Apprenticeship Program Aimed at Building the Electronics Talent Pipeline

Fisher Yu, University of Arkansas CREDIT University of Arkansas
Nano Technology11 hours ago

Materials science researchers develop first electrically injected laser: The diode laser uses semiconducting material germanium tin and could improve micro-processing speed and efficiency at much lower costs

Nano Technology11 hours ago

Advance in programmable synthetic materials: Reading sequence of metal atoms in MOFs allows encoding of multiple chemical functions

Blockchain11 hours ago

Invest 3% in Bitcoin to Avoid COVID-19 Lockdown Devaluation — BitGo CEO

Blockchain11 hours ago

Cointelegraph Launches Newsletter for Professional Investors

Blockchain12 hours ago

Bitcoin Cash short-term Price Analysis: 12 August

Blockchain12 hours ago

Token Launches From Ethereum to Telegram: Where Do We Go From Here?

AR/VR12 hours ago

Enterprise VR Hardware Specialist Varjo Raises $54 Million in Latest Funding Round

Blockchain13 hours ago

Grayscale Bitcoin Trust Saw Surge in Investor Interest After March

Blockchain13 hours ago

VeChain & Oxford Announce New Framework to Assess Consensus Protocols

Blockchain13 hours ago

Championing Blockchain Education in Africa: Women Leading the Bitcoin Cause

Gaming13 hours ago

Evening Reading – August 11, 2020

Blockchain13 hours ago

Chainlink: Traders under zero loss, but why?

Blockchain14 hours ago

The Babylon Project: A Blockchain Focused Hackathon with a Commitment to Diversity & Inclusion

AR/VR14 hours ago

Varjo Raises $54M Financing to Support Its Retina-Quality VR/AR Headsets for Enterprise

Blockchain14 hours ago

Ethereum, Zcash, Dogecoin Price Analysis: 12 August

Blockchain15 hours ago

Peer-to-Peer Exchange CryptoLocally Now Offers Instant Credit Card Payment

Blockchain15 hours ago

Cardano (ADA) Holds On to Crucial Support By a Thread

Blockchain16 hours ago

Bitcoin Creates Double-Top After Failing Close Above $12,000

Blockchain17 hours ago

DeFi Farmers Rush to Yam and Serum for Explosive Yields

Energy18 hours ago

Copper Foil Market Size Worth $10.3 Billion By 2027 | CAGR: 9.7%: Grand View Research, Inc.

Energy18 hours ago

Corundum Market Size Worth $3.5 Billion By 2027 | CAGR: 4.0%: Grand View Research, Inc.

AR/VR19 hours ago

Mozilla is Shuttering its XR Team Amidst Major Layoff, But ‘Hubs’ Will Continue

Energy19 hours ago

New Energy Challenger, Rebel Energy, Places Blue Prism Digital Workers at the Heart of its Launch Plans

Science19 hours ago

Teknosa grows by 580 percent in e-commerce and pulls its operating profit into positive territory in Q2, despite the pandemic

Science19 hours ago

Novo Ventures Portfolio Company F2G Closes US$60.8 Million Financing

Science19 hours ago

F2G Closes US$60.8 Million Financing to fund late stage development of novel mechanism antifungal agent

Blockchain19 hours ago

LocalCryptos Integrates Inbuilt Crypto-To-Crypto Exchanges, Powered by ChangeNOW

Publications20 hours ago

Putin’s plan for Russia’s coronavirus vaccine is at ‘high risk of backfiring,’ expert says

Publications20 hours ago

UK enters recession after GDP plunged by a record 20.4% in the second quarter

Gaming20 hours ago

Another Steam Game Festival Is Coming In October

Science20 hours ago

Top 25 Nationally Ranked Carr, Riggs & Ingram (CRI) Welcomes Cookeville-Based Firm, Duncan, Wheeler & Wilkerson, P.C.

Science20 hours ago

Avast plc Half Year Results For The Six-Months Ended 30 June 2020

Cyber Security20 hours ago

Russian hackers steal Prince Harry and Meghan Markle photos via Cyber Attack

Gaming20 hours ago

Oddworld: New ‘N Tasty Coming To Switch In October

Gaming20 hours ago

Linkin Park’s Mike Shinoda Is Writing A Song For Gamescom 2020

Cyber Security20 hours ago

Texas School District experiences DDoS Cyber Attack

Gaming20 hours ago

‘EVE: Echoes’ from CCP Games and Netease Is Now Available Early on the App Store, Servers Go Live Tomorrow

Gaming20 hours ago

Hans Zimmer Created An Extended Netflix “Ta Dum” Sound For Theatres

Cannabis20 hours ago

Everything you need to know about the Exxus Snap VV

Trending