Connect with us

Cyber Security

Garmin GPS suffers a Ransomware Cyber Attack

Avatar

Published

on

Garmin, an American Multinational Technology company specializing in GPS is said to be reigning under a ransomware cyber attack and so the website Garmin.com and the fitness tracking app of the same company dubbed Garmin Connect are unable for access to users since11:33 PM of July 22nd,2020.

All phone systems and email services related to the company have been disrupted due to the file encrypting malware attack and users of Garmin Japan and Garmin India speculate that the recovery might only be possible early next week.

Highly placed sources say that those spreading WastedLocker Ransomware related to Russian Firm Evil Corp could have disrupted the systems of Garmin LTD.

Note 1- WastedLocker is a highly customizable file encrypting malware that acts according to the victim’s defense-line. And those developing it from Evil Corp usually demand a ransom, often ranging in between $500,000 to $10 million- all in cryptocurrency like Bitcoins and Monero.

Note 2- Garmin offers Global Positioning System technology to companies offering products such as Maps, wearable devices, smart phone manufacturing firms, automotive units, vehicles serving in marine and aviation industry and sports activity related products.

Note 3- A Ransomware is a kind of malware that encrypts files on a database until a ransom is paid. Nowadays, as the technology has developed, cyber criminals spreading ransomware are seen first stealing a portion of data from the storage server and then encrypting it. This is to ensure that they get paid either by the victim or an interested prospect available on the dark web.

Naveen Goud is a writer at Cybersecurity Insiders covering topics such as Mergers & Acquisitions, Startups, Cyber Attacks, Cloud Security and Mobile Security

Source: https://www.cybersecurity-insiders.com/garmin-gps-suffers-a-ransomware-cyber-attack/

Cyber Security

Russian hackers steal Prince Harry and Meghan Markle photos via Cyber Attack

Avatar

Published

on

According to a biography ‘Finding Freedom’, Russian hackers reportedly stole 100s of photos and videos related to the marriage of Duke with Duchess of Sussex that includes some snaps related to the Queen of Britain.

Authored by Omid Scobie and Carolyn Durand, the biography gives us details on why Prince Harry chose to depart the royal life to lead a quiet living in United States along with his newly born son ‘Archie’ Harrison Mountbatten Windsor and wife Meghan Markle.

Coming to the data leak, the breach is a wake up call to the entire world on how hackers could invade into the personal lives of celebrities without their knowledge to create havoc thereafter.

Cybersecurity Insiders has learnt that the stolen photos were related to the wedding photographer Alexi Lubomiriski, hired to digitally capture the wedding of the Duke with Meghan in May’18. Around 200 photos related to the Prince’s wedding were stolen by a computer programmer based in Russia out of which many were ‘outtakes’ meant to be directed to the computer trash can.

The biography specifies that the memorabilia were siphoned from a cloud account owned by the marriage photographer and includes pictures taken by Harry and Meghan along with the Queen at the wedding.

A photo sharing website named Tumblr is seen displaying a few of the stolen pictures possibly leaked by the hacker. 

An inquiry into the data breach and leakage of wedding photos was launched by the law enforcement in Britain after it received an official complaint from the authorities at the Queens palace.

Note- In June 2019, hackers somehow managed to infiltrate the personal computer of the New York based fashion photographer Alexi Lubomirski well- known in the fashion community of London for digitally capturing the lives of Scarlett Johnson, Jennifer Lopez, Britney Spears, Natalie Portman on many ocassions/events.

Source: https://www.cybersecurity-insiders.com/russian-hackers-steal-prince-harry-and-meghan-markle-photos-via-cyber-attack/?utm_source=rss&utm_medium=rss&utm_campaign=russian-hackers-steal-prince-harry-and-meghan-markle-photos-via-cyber-attack

Continue Reading

Cyber Security

Texas School District experiences DDoS Cyber Attack

Avatar

Published

on

On the very first day of virtual learning, a Texas school district has made it official that it became a victim of a cyber attack that disrupted virtual classes for 48 minutes. However, the good news is that the IT staff of the school district was swift enough to thwart the Denial of service cyber attack, neutralizing its repercussions to full extent.

The school district that is in discussion is based on the City of Humble, Texas, United States and is known as ‘The Humble Independent School District (Humble ISD) ’.

Liz Celania- Fagan, the Superintendent of Humble ISD, has confirmed the incident via twitter and informed the world that the virtual classes that were impacted by the cyber incident were back online after a break of nearly an hour.

Liz mentioned in her statement that all those students who were logged into the classes via their student Gmail accounts might not be able to log into their student email accounts until the incident is technically resolved.

Note- A denial of service attack aka distributed denial of service attack is launched through botnets that aim to shut down a computer network by bombarding it with fake web traffic.

Meanwhile, The Federal Bureau of Investigation (FBI) has issued a nationwide alert that all school districts that are planning for virtual classes for this academic year should take adequate Cybersecurity measures as there is a high possibility that their servers might be targeted by ransomware.

“As many of the K-12 schools are planning virtual classes from September, it makes them vulnerable to cyber attacks such as ransomware”, says Corey Harris, a special agent of FBI.

There is a good chance that hacking groups might be after social security numbers and other faculty or staff info added Harris.

Hope, the CIOs or CTOs of school districts have taken a note of the ransomware alert issued by FBI targeting K-12 schools.

Source: https://www.cybersecurity-insiders.com/texas-school-district-experiences-ddos-cyber-attack/?utm_source=rss&utm_medium=rss&utm_campaign=texas-school-district-experiences-ddos-cyber-attack

Continue Reading

Cyber Security

Digital signatures security explained

Avatar

Published

on

[ This article was originally published here ]

This blog was written by an independent guest blogger.
Digital signatures have been around for decades, but recent events have put them back in the spotlight. They were heralded as the future of cybersecurity as far back as 1999, but in the intervening years came to be somewhat taken for granted by security engineers. Not any longer: the massive move to home working precipitated by the Covid-19 pandemic have forced many to take a fresh look at the security value of digital signatures, why they matter, and their relationship to encryption.
We thought we’d do the same. In this article, we’ll give you a refresher course on how digital signatures work, why they are important for security, and what the future holds.
How do digital signatures work?
Digital signatures, at the most fundamental level, are mathematical algorithms used to validate the authenticity and integrity of an electronic message….

Bernard Brode Posted by:

Bernard Brode

      

Avatar

Source: https://www.cybersecurity-insiders.com/digital-signatures-security-explained/?utm_source=rss&utm_medium=rss&utm_campaign=digital-signatures-security-explained

Continue Reading
Nano Technology5 hours ago

SEMI Partners with GLOBALFOUNDRIES to Offer Apprenticeship Program Aimed at Building the Electronics Talent Pipeline

Fisher Yu, University of Arkansas CREDIT University of Arkansas
Nano Technology5 hours ago

Materials science researchers develop first electrically injected laser: The diode laser uses semiconducting material germanium tin and could improve micro-processing speed and efficiency at much lower costs

Nano Technology5 hours ago

Advance in programmable synthetic materials: Reading sequence of metal atoms in MOFs allows encoding of multiple chemical functions

Blockchain6 hours ago

Invest 3% in Bitcoin to Avoid COVID-19 Lockdown Devaluation — BitGo CEO

Blockchain6 hours ago

Cointelegraph Launches Newsletter for Professional Investors

Blockchain6 hours ago

Bitcoin Cash short-term Price Analysis: 12 August

Blockchain6 hours ago

Token Launches From Ethereum to Telegram: Where Do We Go From Here?

AR/VR7 hours ago

Enterprise VR Hardware Specialist Varjo Raises $54 Million in Latest Funding Round

Blockchain7 hours ago

Grayscale Bitcoin Trust Saw Surge in Investor Interest After March

Blockchain7 hours ago

VeChain & Oxford Announce New Framework to Assess Consensus Protocols

Blockchain7 hours ago

Championing Blockchain Education in Africa: Women Leading the Bitcoin Cause

Gaming7 hours ago

Evening Reading – August 11, 2020

Blockchain8 hours ago

Chainlink: Traders under zero loss, but why?

Blockchain9 hours ago

The Babylon Project: A Blockchain Focused Hackathon with a Commitment to Diversity & Inclusion

AR/VR9 hours ago

Varjo Raises $54M Financing to Support Its Retina-Quality VR/AR Headsets for Enterprise

Blockchain9 hours ago

Ethereum, Zcash, Dogecoin Price Analysis: 12 August

Blockchain9 hours ago

Peer-to-Peer Exchange CryptoLocally Now Offers Instant Credit Card Payment

Blockchain9 hours ago

Cardano (ADA) Holds On to Crucial Support By a Thread

Blockchain11 hours ago

Bitcoin Creates Double-Top After Failing Close Above $12,000

Blockchain11 hours ago

DeFi Farmers Rush to Yam and Serum for Explosive Yields

Energy12 hours ago

Copper Foil Market Size Worth $10.3 Billion By 2027 | CAGR: 9.7%: Grand View Research, Inc.

Energy13 hours ago

Corundum Market Size Worth $3.5 Billion By 2027 | CAGR: 4.0%: Grand View Research, Inc.

AR/VR13 hours ago

Mozilla is Shuttering its XR Team Amidst Major Layoff, But ‘Hubs’ Will Continue

Energy13 hours ago

New Energy Challenger, Rebel Energy, Places Blue Prism Digital Workers at the Heart of its Launch Plans

Science13 hours ago

Teknosa grows by 580 percent in e-commerce and pulls its operating profit into positive territory in Q2, despite the pandemic

Science13 hours ago

Novo Ventures Portfolio Company F2G Closes US$60.8 Million Financing

Science13 hours ago

F2G Closes US$60.8 Million Financing to fund late stage development of novel mechanism antifungal agent

Blockchain14 hours ago

LocalCryptos Integrates Inbuilt Crypto-To-Crypto Exchanges, Powered by ChangeNOW

Publications14 hours ago

Putin’s plan for Russia’s coronavirus vaccine is at ‘high risk of backfiring,’ expert says

Publications14 hours ago

UK enters recession after GDP plunged by a record 20.4% in the second quarter

Gaming14 hours ago

Another Steam Game Festival Is Coming In October

Science14 hours ago

Top 25 Nationally Ranked Carr, Riggs & Ingram (CRI) Welcomes Cookeville-Based Firm, Duncan, Wheeler & Wilkerson, P.C.

Science14 hours ago

Avast plc Half Year Results For The Six-Months Ended 30 June 2020

Cyber Security14 hours ago

Russian hackers steal Prince Harry and Meghan Markle photos via Cyber Attack

Gaming14 hours ago

Oddworld: New ‘N Tasty Coming To Switch In October

Gaming14 hours ago

Linkin Park’s Mike Shinoda Is Writing A Song For Gamescom 2020

Cyber Security15 hours ago

Texas School District experiences DDoS Cyber Attack

Gaming15 hours ago

‘EVE: Echoes’ from CCP Games and Netease Is Now Available Early on the App Store, Servers Go Live Tomorrow

Gaming15 hours ago

Hans Zimmer Created An Extended Netflix “Ta Dum” Sound For Theatres

Cannabis15 hours ago

Everything you need to know about the Exxus Snap VV

Trending