BayPay Members Blogs

This additional resource is sponsored by The BayPay Forum.

Intel's Latest Spoiler: A Spectre-Style Hardware Exploit That Leaks Private Data

9980xe with mug
core i9 9900k box
Just when we thought that the worst was over with respect to  speculative execution hardware exploits  like Spectre, we get hit with another whopper. Such is the case with a new...
Continue reading
  0 Comments
0 Comments

Intel's Latest Spoiler: A Spectre-Style Hardware Exploit That Leaks Private Data

9980xe with mug
core i9 9900k box
Just when we thought that the worst was over with respect to  speculative execution hardware exploits  like Spectre, we get hit with another whopper. Such is the case with a new...
Continue reading
  0 Comments
0 Comments

18 Percent Of Americans Admit To Having Their Identity Stolen

I was walking in San Francisco yesterday and noticed a number of strangely-dressed, odd-looking people whose eyes kept moving rapidly left and right, as if they were watching Serena Williams. And...
Continue reading
  0 Comments
0 Comments

18 Percent Of Americans Admit To Having Their Identity Stolen


Five IT security questions any executive should know how to answer If you can't answer these basic questions, your company's security could be at risk. Read more: https://zd.net/2MGD4ly I was walking...
Continue reading
  0 Comments
0 Comments

Adi Shamir Couldn't Get US Visa To Attend RSA Conference Named For Him

Adi Shamir

Adi Shamir Gabriel Bouys/Getty Images A co-founder of cybersecurity company RSA who also co-developed its public key cryptography algorithm couldn't make it to the RSA Conference in San Francisco this year....
Continue reading
  0 Comments
0 Comments

Adi Shamir Couldn't Get US Visa To Attend RSA Conference Named For Him

Adi Shamir

Adi Shamir Gabriel Bouys/Getty Images A co-founder of cybersecurity company RSA who also co-developed its public key cryptography algorithm couldn't make it to the RSA Conference in San Francisco this year....
Continue reading
  0 Comments
0 Comments

Czech Cyber Watchdog Says Its Huawei Warning Took U.S. By Surprise

image
PRAGUE (Reuters) - The Czech cyber-security watchdog was not pressured by the United States or anyone else into issuing its warning about the possible security risks posed by Chinese telecoms equipment...
Continue reading
  0 Comments
0 Comments

Czech Cyber Watchdog Says Its Huawei Warning Took U.S. By Surprise

image
PRAGUE (Reuters) - The Czech cyber-security watchdog was not pressured by the United States or anyone else into issuing its warning about the possible security risks posed by Chinese telecoms equipment...
Continue reading
  0 Comments
0 Comments

Chinese Hackers Fish For Naval Secrets

Sailors on the USS Ronald Reagan
Image copyright AFP Image caption Sailors on board the US Navy's USS Ronald Reagan aircraft carrier Chinese hackers are alleged to have targeted universities around the world in a bid to...
Continue reading
  0 Comments
0 Comments

Chinese Hackers Fish For Naval Secrets

Sailors on the USS Ronald Reagan
Image copyright AFP Image caption Sailors on board the US Navy's USS Ronald Reagan aircraft carrier Chinese hackers are alleged to have targeted universities around the world in a bid to...
Continue reading
  0 Comments
0 Comments

Addressing the Cyber Threat

March 6, 2019 With cyber threats to the United States and across globe reaching unprecedented levels, the FBI uses a full spectrum of expertise, technology, and partnerships to root out cyber...
Continue reading
  0 Comments
0 Comments

Mystery As Quadriga Crypto-Cash Goes Missing

Gerald Cotten
Image copyright Facebook/Quadriga Image caption QuadrigaCX founder Gerald Cotten died without passing on passwords for his laptop Efforts to recover millions in crypto-cash from the digital wallets of a man who...
Continue reading
  0 Comments
0 Comments

Mystery As Quadriga Crypto-Cash Goes Missing

Gerald Cotten
Image copyright Facebook/Quadriga Image caption QuadrigaCX founder Gerald Cotten died without passing on passwords for his laptop Efforts to recover millions in crypto-cash from the digital wallets of a man who...
Continue reading
  0 Comments
0 Comments

Controversial NSA Phone Data Collection Program Shut Down?

Detail of an internal "NSA presentation slide" published by the Washington Post. The sketch shows where the public Internet meets the private cloud maintained by Google, and points out that the data within the cloud is unencrypted (though Google is now wo
The NSA has ceased a controversial program that analyzed Americans' phone calls and texts, a senior aide says. Declan McCullagh/CNET The National Security Agency has quietly discontinued a controversial program put...
Continue reading
  0 Comments
0 Comments

Controversial NSA Phone Data Collection Program Shut Down?

Detail of an internal "NSA presentation slide" published by the Washington Post. The sketch shows where the public Internet meets the private cloud maintained by Google, and points out that the data within the cloud is unencrypted (though Google is now wo
The NSA has ceased a controversial program that analyzed Americans' phone calls and texts, a senior aide says. Declan McCullagh/CNET The National Security Agency has quietly discontinued a controversial program put...
Continue reading
  0 Comments
0 Comments

WordPress Accounted For 90 Percent Of All Hacked CMS Sites In 2018

Hacked CMSs in 2018
Outdated CMSs
Outdated CMSs
Malware on hacked CMSs
Malware on hacked CMSs
Image: Sucuri Roughly 90 percent of all the hacked content management systems (CMSs) Sucuri investigated and helped fix in 2018 were WordPress sites. In a distant second, third, and fourth came...
Continue reading
  0 Comments
0 Comments

WordPress Accounted For 90 Percent Of All Hacked CMS Sites In 2018

Hacked CMSs in 2018
Outdated CMSs
Outdated CMSs
Malware on hacked CMSs
Malware on hacked CMSs
Image: Sucuri Roughly 90 percent of all the hacked content management systems (CMSs) Sucuri investigated and helped fix in 2018 were WordPress sites. In a distant second, third, and fourth came...
Continue reading
  0 Comments
0 Comments

Exposed Docker Hosts Can Be Exploited For Cryptojacking Attacks

screenshot-2019-03-05-at-13-12-17.png
Researchers have uncovered thousands of Docker containers exposed online and ripe for attack for the purposes of illicit cryptocurrency mining. Docker containers are forms of virtualization technology which can be used...
Continue reading
  0 Comments
0 Comments

Exposed Docker Hosts Can Be Exploited For Cryptojacking Attacks


screenshot-2019-03-05-at-13-12-17.png
L0rdix, the Swiss Army knife of Windows hacking, available for purchase in the Dark Web The new tool combines data theft and cryptocurrency mining as a go-to product for attacking Windows...
Continue reading
  0 Comments
0 Comments

Who Faces Biggest Financial Risks From Cyberattacks?

Who Faces Biggest Financial Risks From Cyberattacks?
image
Cybercrime , Cyberwarfare / Nation-state attacks , Data Breach Moody's Says Hospitals, Banks Among Those That Have the Most Significant Potential Impact( HealthInfoSec ) • March 4, 2019     Four...
Continue reading
  0 Comments
0 Comments