Cloud Consultancy News
Apple AirTags hidden in wheels and children’s backpacks so men could find ex-partners, lawsuit claims
Two women are suing Apple after they claimed AirTag devices made it easier for their ex-partners to track them down. Apple said it had made the devices "stalkerproof" - but a proposed class action lawsuit filed in San Francisco alleges this is not the case. Starting...
Tech contractor who uses an umbrella company? UK tax is coming after them
Britain's tax collection agency is clamping down on umbrella companies used by contractors to pay their dues, with 10,000 outstanding tribunal cases waiting to be heard. This is according to legal eagles at Pinsent Mason, which says the number of specific instances...
Netherlands urges citizens to prepare survival kits in case hackers target critical infrastructure
Dutch citizens have been urged to prepare emergency disaster kits in case a cyber attack or natural disaster hits the country. The campaign to prepare the kits is being pushed by the country's national coordinator for security and counterterrorism (NCTV) Pieter-Jaap...
LastPass Suffers Another Security Breach; Exposed Some Customers Information
Popular password management service LastPass said it's investigating a second security incident that involved attackers accessing some of its customer information. "We recently detected unusual activity within a third-party cloud storage service, which is currently...
Cyberattackers Selling Access to Networks Compromised via Recent Fortinet Flaw
Fortinet customers that have not yet patched a critical authentication bypass vulnerability that the vendor disclosed in October in multiple versions of its FortiOS, FortiProxy, and FortiSwitch Manager technologies now have an additional reason to do so quickly. At...
How to transfer contacts from Android to iPhone
How to transfer contacts from Android to iPhone Below June Wan has listed three simple methods to transfer your contacts from Android to iOS, with the first one being my go-to if you're just starting to set up your iPhone. 1. Transfer contacts via 'Move to iOS' The...
5.4 million Twitter users’ stolen data leaked online — more shared privately
Over 5.4 million Twitter user records containing non-public information stolen using an API vulnerability fixed in January have been shared for free on a hacker forum. Another massive, potentially more significant, data dump of millions of Twitter records has also...
U.K. Police Arrest 142 in Global Crackdown on ‘iSpoof’ Phone Spoofing Service
A coordinated law enforcement effort has dismantled an online phone number spoofing service called iSpoof and arrested 142 individuals linked to the operation. The websites, ispoof[.]me and ispoof[.]cc, allowed the crooks to "impersonate trusted corporations or...
Top passwords used in RDP brute-force attacks
Specops Software released research analyzing the top passwords used in live attacks against Remote Desktop Protocol (RDP) ports. This analysis coincides with the latest addition of over 34 million compromised passwords to the Specops Breached Password Protection...
US Offshore Oil and Gas Infrastructure at Significant Risk of Cyberattacks
The offshore oil and gas infrastructure faces cybersecurity risks that the Department of Interior should immediately address, the US Government Accountability Office (GAO) notes in a new report. Consisting of more than 1,600 facilities, the offshore oil and gas...