Google flips switch on Chrome’s newest defensive technology

Google has switched on a defensive technology in Chrome that will make it much more difficult for Spectra-like attacks to steal information such as log-on credentials.

Called “Site Isolation,” the new security technology has a decade-long history. But most recently it’s been cited as a shield to guard against threats posed by Spectre, the processor vulnerability sniffed out by Google’s own engineers more than year ago.

Now, Google has switched on Site Isolation for the vast majority of Chrome users – 99% of them by the search giant’s account. “Many known issues have been resolved since (Chrome 63), making it practical to enable by default for all desktop Chrome users,” Charlie Reis, a Google software engineer, wrote in a post to a company blog.

To learn more click here.

Tags: , ,

Hackers threaten to reveal personal data of 90,000 BMO Bank Customers


Hackers have threatened to release personal information for nearly 100,000 customers of two Canadian banks unless the lenders pay a $1-million ransom for its safe return.

The thieves said they accessed information such as names, account numbers, passwords, security questions and answers, and even social insurance numbers and account balances, by exploiting weaknesses in the two banks’ security systems.

“We warned BMO and Simplii that we would share their customers informations if they don’t cooperate,” a Russian-based email purportedly from the thieves said Monday evening.

Tags: , ,

If you shopped at these 15 stores in the last year, your data might have been stolen

At least 15 separate security breaches occurred at retailers from January 2017 until now. Many of them were caused by flaws in payment systems, either online or in stores.

  1. Macy’s
  2. Adidas
  3. Sears
  4. Kmart
  5. Delta
  6. Best Buy
  7. Saks Fifth Avenue
  8. Lord & Taylor
  9. Under Armour
  10. Panera Bread
  11. Forever 21
  12. Sonic
  13. Whole Foods
  14. Gamestop
  15. Arby’s

To lean more about these breaches click here.

Tags: , ,

Social media memories app Timehop hacked

Timehop, the social network for those who like to reminisce — has revealed that it fell victim to a security breach on Independence Day. The attacker managed to access an internal database stole the personal data of 21 million users from Timehop’s Cloud Computing Environment.

The vast majority of those affected by the “security incident” (as Timehop refers to it) had their names and usernames exposed, but for nearly a quarter of them — 4.7 million — phone numbers were also exposed. The hacker also took access tokens which could be used to view users’ posts. To learn more click here.

Tags: , , ,

The U.S. has retaken first place in the Top500 list after five years of dominance by China.

The world’s fastest computer is now Summit, built by IBM for the DoE’s Oak Ridge National Laboratory, with a performance of 122.3 petaflops (floating point operations per second). It pushed China’s 93-petaflop Sunway TaihuLight into second place after two years at the top. In fact, it’s a double win for IBM because the company built another computer for the DoE, Sierra, and it’s taken third place, pushing another Chinese computer, Tianhe-2A into fourth. Both Summit and Sierra use IBM’s Power9 processors with Nvidia accelerators.

To learn more click here.

Tags: , , ,

How to Spot and Avoid Credit Card Skimmers

Skimmers are essentially malicious card readers attached to the real payment terminals so that they can harvest data from every person that swipes their cards. The thief often has to come back to the compromised machine to pick up the file containing all the stolen data, but with that information in hand he can create cloned cards or just break into bank accounts to steal money. Perhaps the scariest part is that skimmers don’t prevent the ATM or credit card reader from functioning properly.

When you approach an ATM, check for some obvious signs of tampering at the top of the ATM, near the speakers, the side of the screen, the card reader itself, and the keyboard. If something looks different, such as a different color or material, graphics that aren’t aligned correctly, or anything else that doesn’t look right, don’t use that ATM.

Tags: