article thumbnail

2012 Dropbox hack worse than realized, 68M passwords leaked

Tech Republic Security

According to a recent report, a 2012 hack on cloud file sharing company DropBox put millions of users at risk. It also highlights the importance of good security hygiene for every employee.

Hacking 117
article thumbnail

Faulty DoD Cybersecurity Leaves U.S. At Risk of Missile Attacks

Adam Levin

exposed to greater risks unless actions are taken to improve security and reduce the. weapons systems developed between 2012 and 2017 are vulnerable to cyberattacks, despite regular warnings from government watchdogs. . At Risk of Missile Attacks appeared first on Adam Levin. The post Faulty DoD Cybersecurity Leaves U.S.

Risk 199
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SecureMySocial Issued 5th US Patent For Social Media Security Technology

Joseph Steinberg

The patent was issued by the United States Patent Office on September 6th, 2022, with a priority date going back over a decade, to June of 2012. The granting of this patent follows the patent office’s granting of four other related patents going back to the same priority date in June of 2012.

Media 269
article thumbnail

Microsoft Issues Emergency Fix for IE Zero Day

Krebs on Security

Satnam Narang , senior research engineer at Tenable , said the vulnerability affects the following installations of IE: Internet Explorer 11 from Windows 7 to Windows 10 as well as Windows Server 2012, 2016 and 2019; IE 9 on Windows Server 2008; and IE 10 on Windows Server 2012.

Internet 255
article thumbnail

Chinese Antivirus Firm Was Part of APT41 ‘Supply Chain’ Attack

Krebs on Security

One of the alleged hackers was first profiled here in 2012 as the owner of a Chinese antivirus firm. One of the men indicted as part of APT41 — now 35-year-old Tan DaiLin — was the subject of a 2012 KrebsOnSecurity story that sought to shed light on a Chinese antivirus product marketed as Anvisoft. Image: FBI. Image: DOJ.

Antivirus 363
article thumbnail

Identifying People Using Cell Phone Location Data

Schneier on Security

But way back in 2012, the Canadian CSEC—that’s their NSA—did some top-secret work on this kind of thing. He is based in a rural area, so he can’t risk making his ransom calls from that area. Nowadays, it seems like an obvious thing to do—although the search is probably unconstitutional.

article thumbnail

Identifying People by Their Browsing Histories

Schneier on Security

This work replicates and extends the 2012 paper Why Johnny Can't Browse in Peace: On the Uniqueness of Web Browsing History Patterns [ 48 ]. reproduce those results and extend the original work to detail the privacy risk posed by the aggregation of browsing histories.