Author Archives: Zeljka Zorz

Norsk Hydro cyber attack: What happened?

“Hydro subject to cyber-attack,” warned Oslo-headquartered Norsk Hydro ASA, one of the world’s biggest aluminum producers, on Tuesday. “Hydro has isolated all plants and operations and is switching to manual operations and procedures as far as possible. Hydro’s main priority is to continue to ensure safe operations and limit operational and financial impact. The problem has not led to any safety-related incidents,” the company added. In the most recent update on the situation, published an … More

The post Norsk Hydro cyber attack: What happened? appeared first on Help Net Security.

Mirai variant picks up new tricks, expands list of targeted devices

Mirai, the infamous malware that turns Linux-based IoT devices into remotely controlled bots, has been updated to target new devices and device types. Among these are LG SuperSign TVs (TV solutions meant to be installed in public areas and display information, images, video aimed at customers and employees) and WePresent WiPG-1000 Wireless Presentation systems, both of which are intended for use in business settings. About this newest Mirai variant Since it’s initial and spectacular entry … More

The post Mirai variant picks up new tricks, expands list of targeted devices appeared first on Help Net Security.

G Suite admins can now disable SMS and voice 2FA

G Suite administrators can now prevent enterprise users from using SMS and voice codes as their second authentication/verification factor for accessing their accounts. The ability to disable those two options will be made available in the next two weeks to admins using any of the G Suite editions. Why and how? It has been known for quite a while that additional authentication via SMS and voice codes is the least secure option for 2-factor authentication, … More

The post G Suite admins can now disable SMS and voice 2FA appeared first on Help Net Security.

Cryptojacking of businesses’ cloud resources still going strong

In the past year or so, many cybercriminals have turned to cryptojacking as an easier and more low-key approach for “earning” money. While the value of cryptocurrencies like Bitcoin and Monero has been declining for a while now and Coinhive, the most popular in-browser mining service, has stopped working, cryptojacking is still a considerable threat. After all, attackers need to expand very little effort and are using someone else’s resources for free. Cybercrooks going after … More

The post Cryptojacking of businesses’ cloud resources still going strong appeared first on Help Net Security.

Android Q will come with improved privacy protections

Android Q, the newest iteration of Google’s popular mobile OS, is scheduled to be made available to end users at the end of August. While we still don’t know what its official release name will be, the first preview build and accompanying information released by Google give us a peek into some of the privacy improvements that we can look forward to. Stronger protections for user privacy 1. The platform will stop keeping track of … More

The post Android Q will come with improved privacy protections appeared first on Help Net Security.

Unsecured Gearbest server exposes millions of shoppers and their orders

Chinese e-commerce giant Gearbest has exposed information and orders of millions of its customers through an unsecured Elasticsearch server, security researcher Noam Rotem and his team have found. What kind of data was exposed? According to Rotem, the server was not protected with a password and anyone could access it and search the data. Also, despite assurances from the company that sensitive data is encrypted, most of the contents of the database were decidedly not. … More

The post Unsecured Gearbest server exposes millions of shoppers and their orders appeared first on Help Net Security.