Ukrainian authorities are investigating a potential security breach at a local nuclear power plant after employees connected parts of its internal network to the internet so they could mine cryptocurrency. The investigation is being led by the Ukrainian Secret Service (SBU), who is looking at the incident as a potential breach of state secrets due to the classification of nuclear power plants as critical infrastructure. Investigators are examining if attackers might have used the mining rigs as a pivot point to enter the nuclear power plant's network and retrieve information from its systems, such as data about the plant's physical defenses and protections. MINING RIG SEIZED IN JULY According to authorities, the incident took place in July at the South Ukraine Nuclear Power Plant...
It seems as though we can’t escape a single day without hearing about a new widespread security exploit that puts us all at risk. Today, the new attack taking center stage is called Simjacker, and it was revealed by the folks at AdaptiveMobile Security. Simjacker is a potential cyber threat to all mobile operators and subscribers across the globe What exactly is Simjacker? It is a kind of software exploit which helps track down the mobile location of users of mobile networks through malicious SMS messages. This vulnerability is said to be found in 30 countries (unnamed), whose total population exceeds one billion. Here’s how the Simjacker works: Although Simjacker is quite an intricately-executed exploit, I’ll try to give you a simple overview of how it claims its victims. First of
Bangladesh ordered telecommunications companies to stop selling SIM cards and shut down mobile phone services to almost one million Rohingya refugees living in sprawling refugee camps. The order resonated across the camps on Monday, where it threatened to disconnect Rohingya from several settlements that stretch for kilometres in the border district of Cox's Bazar. The communication blackout will also isolate Rohingya from family still in Myanmar from where they fled a brutal military crackdown. Telecommunications operators have seven days to submit reports to the government on the actions they took to shut down networks in the camps, said Zakir Hossain Khan, spokesman for the Bangladesh Telecommunication Regulatory Commission. "Many refugees are using mobile phones in the camps. ...
“The Global Mobile Phone Insurance Market has seen various technological advancements in the past couple of years and is foreseen to turn out to be a lot further in the midst of the figure time allotment 2019-2025. The study presents a detailed assessment of the Mobile Phone Insurance showcase and contains historical and present growth factors. Additionally, the report comprises current growth factors, industry specialists opinions, convictions, chronicled data, and reinforced and industry affirmed advertise data. Request your Sample PDF Report: @ https://www.alexareports.com/report-sample/36013 The mobile phone insurance market is US$ 16,962.7 Mn in 2017 and is estimated to reach US$ $ 43,448 Mn by 2025. The global mobile phone insurance market is experiencing an intense growth with
The Global Mobile Phone Tracking Market Size, Status And Forecast 2019-2025 The report provides a valuable source of insightful data for business strategists. It provides the industry overview with growth analysis and historical & futuristic cost, revenue, demand and supply data (as applicable). The research analysts provide an elaborate description of the value chain and its distributor analysis. This market study provides comprehensive data which enhances the understanding, scope and application of this report. The report presents the market competitive landscape and a corresponding detailed analysis of the major vendor/key players in the market. Top Companies in the Global Mobile Phone Tracking Market: Ericsson, ROHDE&SCHWARZ, Topcon Positioning Systems, Zebra Tech
Data breaches and invasion of privacy are rarely discussions that captivate the majority of Zimbabwean audiences but last year there was one invasion that seemed to stir up the hornet’s nest. During the 2018 campaign season, ZANU-PF decided it would be a very good idea to send some mobile network subscribers very personal SMSs which seemed to indicate the party had knowledge of where these candidates in particular stayed. People were pissed off and ZANU-PFs excuse that the messages were sent to party members who had registered to receive them at party meetings didn’t really cut it as most of the people (myself included) had not been to any party meeting. With all this in mind, it will come as a relief to many that a bill has been passed making it illegal for poli
We have often talked about other versions of WhatsApp and the risks associated with using them. We have read, heard or seen one of the most compelling arguments that the end to end encryption on WhatsApp makes it almost impossible for anyone to hack your WhatsApp. A few days ago, I learnt that a serious hacker just needed a video call to hack into your phone at one point. Facebook fixed the bug sometime in October 2018 after it had been discovered in August by some sites. This has made me realise that nothing is perfect. And no matter what we are made to believe, these 4 reasons will always make WhatsApp partially secure 1.Bugs Ever since I learnt about the Video call Bug, that could allow a hacker to access my phone, I have been wondering what other bugs may hackers take advantage of....
(ISC)²’s Cyber Security Workforce Study for 2018 had some interesting revelations regarding the state of the cybersecurity workforce. There might a be a cybersecurity crisis on the horizon is action isn’t taken anytime soon. There’s also a pretty sweet silver lining. Worldwide there’s a shortage of nearly 3 million workers in cybersecurity. Europe, Africa and the Middle East could do with over 140 thousand workers in this space, whilst in the biggest demand lies in Asia which was found lacking 2.14 million cybersecurity workers. 59% of organizations surveyed indicated that their organization is at extreme or moderate risk due to cybersecurity staff shortage. Unfortunately, 39% of companies studied said they didn’t expect to make any changes regarding their cybersecurity staff. What’s th
When authorities in Benin turned off the country’s internet during parliamentary elections Sunday, they became the ninth African government to restrict access this year. The outages last hours or days and may target specific services — or the entire internet. Governments don’t often explain the outages, but when they do, they focus on the need for security and civil order. The shutdowns usually accompany protests, demonstrations and elections. But data from The NetBlocks Group, a nonpartisan organization that tracks global internet freedom and monitors outages, indicate the serious economic and social impacts of even a short outage. 'A blunt violation' In Benin, a one-day shutdown costs the country $1.54 million, according to d
The malware, dubbed Exodus, was discovered by Security Without Borders, who first found it in Android smartphones. Hacker (Image: Getty) A terrifying new strain of malware has been discovered in both Android and iOS apps, that can steal all your personal data.The malware, dubbed Exodus, was discovered by Security Without Borders, who first found it in Android smartphones . It was hidden inside files in several apps on the Google Play Store, which once installed on a smartphone, could infect the smartphones.The infected app firstly collects basic details about the phone, such as the phone number and IMEI number. Android logo (Image: Bloomberg) This information is then sent to a control server, which launches multiple binary packages aimed at tracking the devi