Cloud Consultancy News
Samsung Galaxy S22 hacked twice on first day of Pwn2Own Toronto
Contestants have hacked the Samsung Galaxy S22 smartphone twice during the first day of the Pwn2Own Toronto 2022 hacking competition, the 10th edition of the consumer-focused event. The STAR Labs team was the first to successfully exploit a zero-day on Samsung's...
Vice Society Ransomware Attackers Targeted Dozens of Schools in 2022
The Vice Society cybercrime group has disproportionately targeted educational institutions, accounting for 33 victims in 2022 and surpassing other ransomware families like LockBit, BlackCat, BianLian, and Hive. Other prominent industry verticals targeted include...
Apple AirTags hidden in wheels and children’s backpacks so men could find ex-partners, lawsuit claims
Two women are suing Apple after they claimed AirTag devices made it easier for their ex-partners to track them down. Apple said it had made the devices "stalkerproof" - but a proposed class action lawsuit filed in San Francisco alleges this is not the case. Starting...
Tech contractor who uses an umbrella company? UK tax is coming after them
Britain's tax collection agency is clamping down on umbrella companies used by contractors to pay their dues, with 10,000 outstanding tribunal cases waiting to be heard. This is according to legal eagles at Pinsent Mason, which says the number of specific instances...
Netherlands urges citizens to prepare survival kits in case hackers target critical infrastructure
Dutch citizens have been urged to prepare emergency disaster kits in case a cyber attack or natural disaster hits the country. The campaign to prepare the kits is being pushed by the country's national coordinator for security and counterterrorism (NCTV) Pieter-Jaap...
LastPass Suffers Another Security Breach; Exposed Some Customers Information
Popular password management service LastPass said it's investigating a second security incident that involved attackers accessing some of its customer information. "We recently detected unusual activity within a third-party cloud storage service, which is currently...
Cyberattackers Selling Access to Networks Compromised via Recent Fortinet Flaw
Fortinet customers that have not yet patched a critical authentication bypass vulnerability that the vendor disclosed in October in multiple versions of its FortiOS, FortiProxy, and FortiSwitch Manager technologies now have an additional reason to do so quickly. At...
How to transfer contacts from Android to iPhone
How to transfer contacts from Android to iPhone Below June Wan has listed three simple methods to transfer your contacts from Android to iOS, with the first one being my go-to if you're just starting to set up your iPhone. 1. Transfer contacts via 'Move to iOS' The...
5.4 million Twitter users’ stolen data leaked online — more shared privately
Over 5.4 million Twitter user records containing non-public information stolen using an API vulnerability fixed in January have been shared for free on a hacker forum. Another massive, potentially more significant, data dump of millions of Twitter records has also...
U.K. Police Arrest 142 in Global Crackdown on ‘iSpoof’ Phone Spoofing Service
A coordinated law enforcement effort has dismantled an online phone number spoofing service called iSpoof and arrested 142 individuals linked to the operation. The websites, ispoof[.]me and ispoof[.]cc, allowed the crooks to "impersonate trusted corporations or...