article thumbnail

Poland and Lithuania fear that data collected via FaceApp could be misused

Security Affairs

Many security experts are warning of the risks of using the popular app, threat actors could be potentially interested in data collected by FaceApp. He pointed out that most of the photos collected by the users are deleted from its servers within 48 hours and that is not used for other purposes. Pierluigi Paganini.

article thumbnail

Twitter, Facebook, and Instagram blocked in Turkey as Idlib military crisis escalates

Security Affairs

Network data collected by the NetBlocks internet observatory confirm that Turkey has blocked access to social media as Idlib military crisis escalates. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->. Pierluigi Paganini.

Media 136
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CIRWA Project tracks ransomware attacks on critical infrastructure

Security Affairs

Data collected by the researchers are very interesting and very useful for future research projects on the security of the critical infrastructure. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->. . Pierluigi Paganini.

article thumbnail

Threat Report Portugal: Q2 2020

Security Affairs

The Threat Report Portugal: Q2 2020 compiles data collected on the malicious campaigns that occurred from April to Jun, Q2, of 2020. The Portuguese Abuse Open Feed 0xSI_f33d is an open sharing database with the ability to collect indicators from multiple sources, developed and maintained by Segurança-Informática.

article thumbnail

Operation North Star – North-Korea hackers targeted US defense and aerospace companies

Security Affairs

“The data collected from the target machine could be useful in classifying the value of the target. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->. These DLL implants were intended to gather basic information from the victims’ machines with the purpose of victim identification.”

article thumbnail

Russian spies are attempting to tap transatlantic undersea cables

Security Affairs

Attacks against undersea cables are not a novelty, in 2014 The Register published information on a secret British spy base located at Seeb on the northern coast of Oman, a strategic position that allows the British Government to tap to various undersea cables passing through the Strait of Hormuz into the Persian/Arabian Gulf.

Wireless 145
article thumbnail

UK new information security commissioner is John Edwards

CyberSecurity Insiders

United Kingdom has issued a press update on the appointment of its next information commissioner and reports are because it is going to be John Edwards, who’s currently serving as Privacy Commissioner for New Zealand since 2014.