Security Links


Articles of Interest


Man has only 2 guesses left to retrieve 200 million in Bitcoin
Using Windows Sysmon to detect malware This article also defines process hollowing and process herpaderping techniques.
NTFS flaw single line command to corrupt entire file system, without elevated privileges.
iPhone vulnerability allowed hack without user interaction.
Russian intelligence officers charged.
Unpatchable INTEL chip-set flaw.
More Chinese milatary hackers indicted. This time for the Equifax hack.
Top 10 exploits hackers used in 2019.
Ring doorbell surveils your door and it surveils you as well.
What Jeff Bezos can teach about phone security.
FBI seizes WeLeakInfo.com.
Microsoft Data Breach 250 million records exposed.
Hacker leaks more than 500,000 passwords.
Snake Ransomware.
Most Telephone Companies are susceptible to the SIM swap scam.
Chinese hackers bypass two factor authentication.
Programming languages and vulnerabilities.
Top 25 most dangerous vulnerabilities.
Gas station Point of Sale attacks.
Spear phishing has doubled in last year.
Ransomeware reboots in Safe mode to avoid antivirus.
Largest ever bounty for a cyber criminal.
FBI recommends IoT devices be on a separate network.
Linux bug allows hijacking VPNs.
The popularity of recycling passwords.
Charging your device with USB at an airport may get you malware.
Discovery of a text message siphoning malware in telcos..
21M logins for sale..
FBI warns of common skimming attacks..
Alexa and Google Home malware to make into spies..
Brians Club, stolen credit card marketplace, was hacked - 26 million cards recovered..
Ways to defeat multi-factor authentication are increasing..
Securing a new laptop..
Evil Lightning Cable spies on iPhones..
Most destructive botnet returns..
Is SimJacker monitoring you through your phone?.
WikiPedia and a massive DDoS.
Most email attacks require user to click..
Price for iOS vulnerabilities drops with flood of reports..
iPhone hack undetected for two years..
Your password does not matter..
Charges filed in cryptocurrency $850M fraud..
ExtraPulsar backdoor based on leaded NSA code..
DNS over HTTPS seems to be coming.
Ancient WinRAR vulnerability produces 100s of attacks.
Toyota breach - possibly 3 million customers exposed.
Italian government spyware in Google Play. What else is there?
MicroSoft shuts down domains used by Iranian hacker Group..
FBI crackdown on DDoS-for-hire sites led to 85% slash in attack sizes..
Enigma, Bombe and Typex encryption device emulators. and the Github site.
Iranian-backed hackers ransacked Citrix..
Mobile Device Malware..
DNS Attacks Continue..
DNS Hijacking Explained..
Stuxnet and the Iranian nuclear site
Not enough security experts.

Last time I updated this page: January 15, 2021.

By Curt Hill
Send Comments and Suggestions to Curt Hill (Curt.Hill@vcsu.edu).

Return to Curt's home.