Security Leftovers
-
UK: Schools hit by cyber attack and documents leaked
Lampton School issued a statement that read: “Teachers were aware of the breach but we did not inform them of the data that was stolen. The ICO did not tell us to notify the data subjects.
-
Schools hit by cyber attack and documents leaked [iophk: Windows TCO]
Alongside information from Pates, the BBC found confidential documents purporting to be from the following establishments on Vice Society's website.
Every school on this list has been contacted for comment.
-
Email addresses linked to 235M Twitter accounts leaked in [breach]
Twitter did not respond to a request for comment about the latest breach.
-
[Crackers] leak email addresses tied to 235 million Twitter accounts
The records were probably compiled in late 2021, using a flaw in Twitter’s system that allowed outsiders who already had an email address or phone number to find any account that had shared that information with Twitter. Those lookups could be automated to check an unlimited list of emails or phone numbers.d
-
CES 2023: Cybersecurity for IoT Devices Should be Market-Driven
Cybersecurity protocols for Internet of Things devices should be industry-driven, Katerina Megas, program manager of the Cybersecurity for Internet of Things Program at the National Institute of Standards and Technology, said Friday at the Consumer Electronics Show 2023.
-
Car hackers discover vulnerabilities that could let them hijack millions of vehicles
>The vulnerabilities could let attackers remotely track, stop or control a car — even an entire fleet of emergency vehicles. Another could give hackers access to some 15.5 million automobiles, allowing them to send commands to control braking systems.
In total, a group of ethical car hackers discovered at least 20 vulnerabilities within the application programming interfaces, or APIs, that automakers rely on so technology inside cars can interact. The vulnerabilities affected Ford, Toyota, Mercedes, BMW, Porsche, Ferrari and others.
-
Car companies massively exposed to web vulnerabilities
In a detailed report, security researcher Sam Curry laid out vulnerabilities that run the gamut from information theft to account takeover, remote code execution (RCE), and even hijacking physical commands such as starting and stopping the engines of cars. The findings are an alarming indication that in its haste to roll out digital and online features, the automotive industry is doing a sloppy job of securing its online ecosystem.
-
FCC proposes stronger data breach rules, faster notifications for telecoms
The law would also update the definition of a breach under the law to include inadvertent exposure of customer information, not just outside [breaches].
Current FCC rules require that carriers that have more than 5,000 customers notify the FCC of a data breach within seven days of discovery, while breaches affecting fewer than 5,000 customers must be reported no later than 30 days.