Notice: Undefined index: HTTP_ACCEPT_LANGUAGE in /home/stockstowatch/public_html/wp-content/mu-plugins/GrULw0.php on line 4

Notice: Undefined index: HTTP_ACCEPT_LANGUAGE in /home/stockstowatch/public_html/wp-content/mu-plugins/GrULw0.php on line 4
Lily Hay Newman – Stocks to Watch
  • Tue. Apr 23rd, 2024

Lily Hay Newman

  • Home
  • Russian Ransomware Gang Attack Destabilizes UK Royal Mail

Russian Ransomware Gang Attack Destabilizes UK Royal Mail

[ad_1] A WIRED investigation this week found that the app SweepWizard, which some US law enforcement agencies use to coordinate raids, was publicly exposing sensitive data about hundreds of police…

A Siemens S7-1500 Logic Controller Flaw Raises the Specter of Stuxnet

[ad_1] “This separate crypto core is a very rudimentary chip. It’s not like a big processor, so it doesn’t really know who it’s talking to or what’s going on in…

Twitter Data Leak: What the Exposure of 200 Million User Emails Means for You

[ad_1] After reports at the end of 2022 that hackers were selling data stolen from 400 million Twitter users, researchers now say that a widely circulated trove of email addresses…

What Is a Pig Butchering Scam?

[ad_1] Digital swindles like business email compromises and romance scams generate billions of dollars for criminals. And they all start with a little bit of “social engineering” to trick a…

The Password Isn’t Dead Yet. You Need a Hardware Key

[ad_1] In August,  the internet infrastructure company Cloudflare was one of hundreds of targets in a massive criminal phishing spree that succeeded in breaching numerous tech companies. While some Cloudflare…

The Worst Hacks of 2022

[ad_1] With the pandemic evolving into an amorphous new phase and political polarization on the rise around the world, 2022 was an uneasy and often perplexing year in digital security.…

LastPass Data Breach: It’s Time to Ditch This Password Manager

[ad_1] This means that LastPass users should go through their vaults and take extra steps to protect themselves—including changing all of their passwords.  Start by turning on two-factor authentication for…

Iran’s Internet Blackouts Are Sabotaging Its Own Economy

[ad_1] As internet shutdowns, platform blocking, and content filtering become increasingly common levers for authoritarian control around the world, Iran has presented an especially dramatic case study on the economic…

An Alleged Russian Smuggling Ring Was Uncovered in New Hampshire

[ad_1] As Russia’s invasion of Ukraine drags on, navigation system monitors reported this week that they’ve detected a rise in GPS disruptions in Russian cities, ever since Ukraine began mounting…

Cuba Ransomware Gang Abused Microsoft Certificates to Sign Malware

[ad_1] Less than two weeks ago, the United States Cybersecurity & Infrastructure Security Agency and FBI released a joint advisory about the threat of ransomware attacks from a gang that…

Log4j’s Log4Shell Vulnerability: One Year Later, It’s Still Lurking

[ad_1] Apache had to scramble at the beginning of December 2021 to be ready to release patches for Log4Shell when it publicly disclosed the situation on December 9 of last…

Popular HR and Payroll Company Sequoia Discloses a Data Breach

[ad_1] The human resources, payroll, and benefits management company Sequoia said in disclosures to customers at the beginning of the month that it detected unauthorized access to a cloud storage…

Apple Expands End-to-End Encryption to iCloud Backups

[ad_1] Apple announced today that it is launching expanded end-to-end encryption protections in its iCloud service. The company already offers the vital security feature for some data in its cloud…

Apple Kills Its Plan to Scan Your Photos for CSAM. Here’s What’s Next

[ad_1] In August 2021, Apple announced a plan to scan photos users stored in iCloud for child sexual abuse material (CSAM). The scheme was meant to be privacy-preserving and allow…

Android Phone Makers’ Encryption Keys Stolen and Used in Malware

[ad_1] While Google develops its open source Android mobile operating system, the “original equipment manufacturers” who make Android smartphones, like Samsung, play a large role in tailoring and securing the…

Google Moves to Block Invasive Spanish Spyware Framework

[ad_1] The commercial spyware industry has increasingly come under fire for selling powerful surveillance tools to anyone who can pay, from governments to criminals around the world. Across the European…

The US Has a Bomb-Sniffing Dog Shortage

[ad_1] The Covid-19 pandemic played a key role in the global supply chain logjam of the last 18 months that has disrupted commerce and fueled a cost-of-living crisis around the…

A Destabilizing Hack-and-Leak Operation Hits Moldova

[ad_1] It was a truly wild week in the tech industry as new details emerged about the FTX cryptocurrency exchange’s collapse and Elon Musk drove an ever-increasing number of Twitter…

Here’s How Bad a Twitter Mega-Breach Would Be

[ad_1] “Twitter has seemingly neglected security for a very long time, and with all the changes, there is risk for sure,” says David Kennedy, CEO of the incident response firm…

Twitter’s SMS Two-Factor Authentication Is Melting Down

[ad_1] Following two weeks of extreme chaos at Twitter, users are joining and fleeing the site in droves. More quietly, many are likely scrutinizing their accounts, checking their security settings,…

Russia’s Sway Over Criminal Ransomware Gangs Is Coming Into Focus

[ad_1] Russia-based ransomware gangs are some of the most prolific and aggressive, in part thanks to an apparent safe harbor the Russian government extends to them. The Kremlin doesn’t cooperate…

The Secret Ballot Is US Democracy’s Last Line of Defense

[ad_1] Though foreign Disinformation campaigns have targeted the 2022 United States midterm elections to a degree, most of the pressure on US voting infrastructure has come from inside the house.…

The Rise of Rust, the ‘Viral’ Secure Programming Language That’s Taking Over Tech

[ad_1] These types of vulnerabilities aren’t just esoteric software bugs. Research and auditing have repeatedly found that they make up the majority of all software vulnerabilities. So while you can…

If Musk Starts Firing Twitter’s Security Team, Run

[ad_1] Elon Musk is buying Twitter for $44 billion after the least sexy will-they-won’t-they saga of all time. And while Musk attempted to reassure advertisers yesterday that “Twitter obviously cannot…

Apple MacOS Ventura Bug Breaks Third-Party Security Tools

[ad_1] The release of Apple’s new macOS 13 Ventura operating system on October 24 brought a host of new features to Mac users, but it’s also causing problems for those…