More stories

  • in

    This Linux-targeting malware just got more powerful

    Image: Getty A cryptomining malware campaign that targets systems and cloud-computing instances running on Linux has added trojan malware to its capabilities – something that could make attacks more dangerous.  Detailed by cybersecurity researchers at Trend Micro, such as several other cryptomining campaigns, this one is secretly compromising Linux systems, using their computing power to mine […] More

  • in

    Android Private Compute Core: Google explains the “important” new privacy infrastructure

    Image: MS_studio/Shutterstock Google has shed more light on how it’s using private data from sensors on your Android phone to update its machine-learning features, such as Live Translate, without sending private data to its cloud servers.  Google last September introduced Live Caption, Now Playing and Smart Reply as features within Android’s Private Compute Core (PCC), […] More

  • in

    You've got Mastodon questions, I've got answers

    If you decide that the original instance where you created an account isn’t working out for you and you’ve identified a new instance that you want to move to, follow these steps to make the move. Note that moving to a new instance migrates your followers but not your posts.Start at the new instance. Go to Preferences > Account > Account Settings. Under the heading “Moving from a different account,” click Create An Account Alias. (As a shortcut, you can go directly to https:///settings/aliases.) Enter the handle for the account you want to move from, in the format username@domain, and then click Create Alias.Now go to the old instance, the one you want to move from. Open the Account Settings page and, under the heading “Move to a different account,” click Configure It Here. (As a shortcut, you can go directly to https:///settings/aliases.) Enter the handle of the new account, in the format username@domain, along with the current password. Read the notes carefully, and then click Move Followers.If you want to migrate the list of accounts you’ve followed, blocked, or muted, go to Preferences > Import and Export. Export data in CSV format from the old account and import it using the new account. More

  • in

    This evasive new cyberattack can bypass air-gapped systems to steal data from the most sensitive networks

    Image: Getty/Manuel Breva Colmeiro Cybersecurity researchers have demonstrated a novel method of cyberattack that could allow malicious hackers to steal information from some of the most well-protected computers. Air-gapped systems are isolated from the internet due to the nature of the information they handle. The idea is that by being completely removed from both the […] More

  • in

    Medibank systems back online after weekend shutdown for security update

    Medibank’s systems are back online after they were shut down over the weekend for a security upgrade. The move was part of efforts to bolster its resilience following the October data breach that impacted 9.7 million customers. The Australian insurance group said its IT systems were taken offline for planned “maintenance” works that involved IT security advisors from Microsoft. The rollout had taken place at Medibank’s headquarters in Melbourne. “Given the complexity of the maintenance activities and the requirement to take our systems offline, this operation has been in the planning stages for several weeks,” the company said in a statement. All customer-facing platforms were tested and IT systems brought back online ahead of schedule on Saturday, operating with enhanced security features, it added. Customers regained access to Medibank’s website and apps, which went offline during the upgrade, but its retail outlets and call centres remained shut until Monday. The Australian company noted that no suspicious activities were detected inside its systems since the data breach was announced on October 12. It said it had implemented several measures to enhance its security since the incident, including two-factor authentication at its contact centres when customers call for support and additional detection and forensics features. It also expanded analytics capabilities through third-party specialists. Medibank said it still was analysing data released by cybercriminals on the dark web, noting that no additional files had been released since December 1 when hackers released six zipped folders containing compromised customer data. The folders reportedly contained all remaining data that was stolen in the breach, prior to which hackers involved in the theft had released the files in batches alongside demands for ransom. Medibank had said it would not pay any ransom.The October security breach affected 9.7 million current and former customers, including 1.8 million international customers, and leaked data such as names, dates of brith, phone numbers, and email addresses. Health claims data of some customers also were accessed, including locations where they had received medical services and codes linked to diagnoses and procedures administered. According to Medibank, there was no indication financial or banking details had been compromised and the stolen data alone was insufficient to facilitate identity or financial fraud. RELATED COVERAGE More

  • in

    The 18 best Amazon security camera holiday deals: Ring and Blink on sale

    Current price: $60Original price: $100This is Ring’s most popular video doorbell: the 2020-release, battery-operated model. Featuring 1080p HD video, Alexa voice control, two-way talk, night vision, and advanced motion detection, this video doorbell is at the lowest price we’ve ever seen it before — even lower than during Amazon’s July and October Prime Day sales events.The built-in rechargeable battery makes for an easy installation, since there is no wiring involved, making it a perfect fit for anyone looking to upgrade their current doorbell setup. However, if you prefer a wired installation, this doorbell is also equipped for installation using your existing doorbell’s wiring. Also: What are the best home security systems and do they require Wi-Fi? More