The threat facing U.S. health care systems is no longer theoretical, with several important health care providers getting hit by ransomware attacks in recent months.
Category: Vulnerabilities
FCC Reveals ‘Royal Tiger’ Robocall Campaign
An example of a transcript of a call that Royal Tiger feeds its victims is as follows: “This is an important call regarding illegal enforcement action being executed under your name for suspicious and fraudulent activities carried out using your identity.
Hackers Can Abuse Apple’s Wi-Fi Positioning System
A recent study by security researchers has revealed a major privacy vulnerability in Apple’s Wi-Fi Positioning System (WPS) that allows hackers to track the locations of Wi-Fi access points and their owners globally.
Google guru roasts useless phishing tests, calls for fire drill-style overhaul • The Register
The main argument against current phishing tests is “there is no evidence that the tests result in fewer incidences of successful phishing campaigns,” said Linton.
Teslas Can Still Be Stolen With a Cheap Radio Hack—Despite New Keyless Tech | WIRED
For at least a decade, a car theft trick known as a “relay attack” has been the modern equivalent of hot-wiring: a cheap and relatively easy technique to steal hundreds of models of vehicles.
Phishing statistics that will make you think twice before clicking – Help Net Security
This article includes excerpts from various reports that offer statistics and insights into the current phishing landscape.