Saturday, 17 Nov 2018
Category: Cyberwarfare

Northwest fast food chain hack exposed customer credit cards

A beloved regional burger chain in the Pacific Northwest is the latest fast food company to suffer a major data breach. Burgerville, headquartered in Vancouver, Wash., disclosed today that any customers who used a credit or debit card from September 2017 to September 2018 at any of its locations may have had their card details […]

Outgoing Facebook CSO Alex Stamos will join Disrupt SF to talk cybersecurity

At Disrupt SF 2018, Facebook’s soon-to-be-former chief security officer Alex Stamos will join us to chat about his tenure in the top security role for the world’s biggest social network, how it feels to have weathered some of the biggest security and privacy scandals to ever hit the tech industry and securing U.S. elections in […]

Chinese “hackers” are sending malware via snail mail

In what amounts to one of the simplest but most baffling forms of social engineering, hackers from China have taken to sending CDs full of malware to state officials, leading the Multi-State Information Sharing and Analysis Center, a government security outfit, to release a warning detailing the scam. The trick is simple: a package arrives […]

Russian hackers already targeted a Missouri senator up for reelection in 2018

A Democratic senator seeking reelection this fall appears to be the first identifiable target of Russian hacking in the 2018 midterm race. In a new story on the Daily Beast, Andrew Desiderio and Kevin Poulsen reported that Democratic Missouri Senator Claire McCaskill was targeted in a campaign-related phishing attack. That clears up one unspecified target […]

A simple solution to end the encryption debate

David Gurle Contributor Share on Twitter David Gurle is the founder and chief executive of Symphony Comunication. Bill Harrington Contributor Bill Harrington is a former federal prosecutor and a partner at the law firm Goodwin Procter. Criminals and terrorists, like millions of others, rely on smartphone encryption to protect the information on their mobile devices. […]