<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber Security News April 2019</title>
	<atom:link href="http://www.epanorama.net/blog/2019/04/01/cyber-security-news-april-2019/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2019/04/01/cyber-security-news-april-2019/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Mon, 13 Apr 2026 14:38:51 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/04/01/cyber-security-news-april-2019/comment-page-9/#comment-1637198</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 02 May 2019 11:52:13 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182073#comment-1637198</guid>
		<description><![CDATA[Exploits in the Wild for WordPress Social Warfare Plugin CVE-2019-9978
https://unit42.paloaltonetworks.com/exploits-in-the-wild-for-wordpress-social-warfare-plugin-cve-2019-9978/

On 21 March, researchers disclosed two vulnerabilities in Social Warfare, a very popular plugin in WordPress which adds social share buttons to a website or blog. One vulnerability is a Stored Cross-site Scripting Attack (XSS) vulnerability and the other is a remote code execution (RCE) vulnerability, both are tracked by CVE-2019-9978. Both vulnerabilities are present in versions 3.5.0-3.5.2 of Social Warfare: a fix was released on 21 March and is in version 3.5.3. Approximately 60,000 active installations were found at the time of writing]]></description>
		<content:encoded><![CDATA[<p>Exploits in the Wild for WordPress Social Warfare Plugin CVE-2019-9978<br />
<a href="https://unit42.paloaltonetworks.com/exploits-in-the-wild-for-wordpress-social-warfare-plugin-cve-2019-9978/" rel="nofollow">https://unit42.paloaltonetworks.com/exploits-in-the-wild-for-wordpress-social-warfare-plugin-cve-2019-9978/</a></p>
<p>On 21 March, researchers disclosed two vulnerabilities in Social Warfare, a very popular plugin in WordPress which adds social share buttons to a website or blog. One vulnerability is a Stored Cross-site Scripting Attack (XSS) vulnerability and the other is a remote code execution (RCE) vulnerability, both are tracked by CVE-2019-9978. Both vulnerabilities are present in versions 3.5.0-3.5.2 of Social Warfare: a fix was released on 21 March and is in version 3.5.3. Approximately 60,000 active installations were found at the time of writing</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/04/01/cyber-security-news-april-2019/comment-page-9/#comment-1637191</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 02 May 2019 11:47:06 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182073#comment-1637191</guid>
		<description><![CDATA[Oops. 228K Danish Passports Have Swapped Fingerprint Data
https://www.bleepingcomputer.com/news/security/oops-228k-danish-passports-have-swapped-fingerprint-data/

In a big oops, over 200,000 Danish passports were printed with the users&#039; fingerprints mistakenly swapped between the left and right hand.

Since October 2011, all new Danish passports contain chips that store biometric data such as the owner&#039;s digital photo, fingerprints, and signatures.]]></description>
		<content:encoded><![CDATA[<p>Oops. 228K Danish Passports Have Swapped Fingerprint Data<br />
<a href="https://www.bleepingcomputer.com/news/security/oops-228k-danish-passports-have-swapped-fingerprint-data/" rel="nofollow">https://www.bleepingcomputer.com/news/security/oops-228k-danish-passports-have-swapped-fingerprint-data/</a></p>
<p>In a big oops, over 200,000 Danish passports were printed with the users&#8217; fingerprints mistakenly swapped between the left and right hand.</p>
<p>Since October 2011, all new Danish passports contain chips that store biometric data such as the owner&#8217;s digital photo, fingerprints, and signatures.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/04/01/cyber-security-news-april-2019/comment-page-8/#comment-1637190</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 02 May 2019 11:46:39 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182073#comment-1637190</guid>
		<description><![CDATA[Uncovering CVE-2019-0232: A Remote Code Execution Vulnerability in Apache Tomcat
https://blog.trendmicro.com/trendlabs-security-intelligence/uncovering-cve-2019-0232-a-remote-code-execution-vulnerability-in-apache-tomcat/]]></description>
		<content:encoded><![CDATA[<p>Uncovering CVE-2019-0232: A Remote Code Execution Vulnerability in Apache Tomcat<br />
<a href="https://blog.trendmicro.com/trendlabs-security-intelligence/uncovering-cve-2019-0232-a-remote-code-execution-vulnerability-in-apache-tomcat/" rel="nofollow">https://blog.trendmicro.com/trendlabs-security-intelligence/uncovering-cve-2019-0232-a-remote-code-execution-vulnerability-in-apache-tomcat/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/04/01/cyber-security-news-april-2019/comment-page-8/#comment-1637188</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 02 May 2019 11:45:18 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182073#comment-1637188</guid>
		<description><![CDATA[Hackers Steal and Ransom Financial Data Related to Some of the World’s Largest Companies
https://motherboard.vice.com/en_us/article/d3np4y/hackers-steal-ransom-citycomp-airbus-volkswagen-oracle-valuable-companies

The data was stolen from Citycomp, which provides internet infrastructure for dozens of companies including Oracle, Airbus, Toshiba, and Volkswagen.]]></description>
		<content:encoded><![CDATA[<p>Hackers Steal and Ransom Financial Data Related to Some of the World’s Largest Companies<br />
<a href="https://motherboard.vice.com/en_us/article/d3np4y/hackers-steal-ransom-citycomp-airbus-volkswagen-oracle-valuable-companies" rel="nofollow">https://motherboard.vice.com/en_us/article/d3np4y/hackers-steal-ransom-citycomp-airbus-volkswagen-oracle-valuable-companies</a></p>
<p>The data was stolen from Citycomp, which provides internet infrastructure for dozens of companies including Oracle, Airbus, Toshiba, and Volkswagen.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/04/01/cyber-security-news-april-2019/comment-page-8/#comment-1637146</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 02 May 2019 09:41:59 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182073#comment-1637146</guid>
		<description><![CDATA[Oh dear. Secret Huawei enterprise router snoop &#039;backdoor&#039; was Telnet service, sighs Vodafone
We all want to see hard proof of deliberate espionage. This is absolutely not it
https://www.theregister.co.uk/2019/04/30/huawei_enterprise_router_backdoor_is_telnet/]]></description>
		<content:encoded><![CDATA[<p>Oh dear. Secret Huawei enterprise router snoop &#8216;backdoor&#8217; was Telnet service, sighs Vodafone<br />
We all want to see hard proof of deliberate espionage. This is absolutely not it<br />
<a href="https://www.theregister.co.uk/2019/04/30/huawei_enterprise_router_backdoor_is_telnet/" rel="nofollow">https://www.theregister.co.uk/2019/04/30/huawei_enterprise_router_backdoor_is_telnet/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/04/01/cyber-security-news-april-2019/comment-page-8/#comment-1637082</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 May 2019 14:48:15 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182073#comment-1637082</guid>
		<description><![CDATA[&#039;One Ring&#039; Wireless Phone Scam
https://www.fcc.gov/consumers/guides/one-ring-wireless-phone-scam

If your phone rings once and then stops, think twice before returning the call. It may be a scam

Why Phone Fraud Starts With A Silent Call
https://www.npr.org/sections/alltechconsidered/2015/08/24/434313813/why-phone-fraud-starts-with-a-silent-call?t=1556689827658]]></description>
		<content:encoded><![CDATA[<p>&#8216;One Ring&#8217; Wireless Phone Scam<br />
<a href="https://www.fcc.gov/consumers/guides/one-ring-wireless-phone-scam" rel="nofollow">https://www.fcc.gov/consumers/guides/one-ring-wireless-phone-scam</a></p>
<p>If your phone rings once and then stops, think twice before returning the call. It may be a scam</p>
<p>Why Phone Fraud Starts With A Silent Call<br />
<a href="https://www.npr.org/sections/alltechconsidered/2015/08/24/434313813/why-phone-fraud-starts-with-a-silent-call?t=1556689827658" rel="nofollow">https://www.npr.org/sections/alltechconsidered/2015/08/24/434313813/why-phone-fraud-starts-with-a-silent-call?t=1556689827658</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/04/01/cyber-security-news-april-2019/comment-page-8/#comment-1637080</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 May 2019 14:43:20 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182073#comment-1637080</guid>
		<description><![CDATA[Editors’ picks for 2018: ‘The African Union headquarters hack and Australia’s 5G network
https://www.aspistrategist.org.au/editors-picks-for-2018-the-african-union-headquarters-hack-and-australias-5g-network/]]></description>
		<content:encoded><![CDATA[<p>Editors’ picks for 2018: ‘The African Union headquarters hack and Australia’s 5G network<br />
<a href="https://www.aspistrategist.org.au/editors-picks-for-2018-the-african-union-headquarters-hack-and-australias-5g-network/" rel="nofollow">https://www.aspistrategist.org.au/editors-picks-for-2018-the-african-union-headquarters-hack-and-australias-5g-network/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/04/01/cyber-security-news-april-2019/comment-page-8/#comment-1637078</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 May 2019 14:28:34 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182073#comment-1637078</guid>
		<description><![CDATA[Backdoors in Huawei Equipment Discovered by Vodafone Italy in 2009
https://gizmodo.com/backdoors-in-huawei-equipment-discovered-by-vodaphone-i-1834408368?utm_campaign=socialflow_gizmodo_facebook&amp;utm_source=gizmodo_facebook&amp;utm_medium=socialflow

Vodafone Italy discovered backdoors in its Huawei home internet routers and software between 2009 and 2011 according to a new report from Bloomberg News. The backdoors have reportedly been fixed, but the revelations are still bad news for Huawei as the Chinese tech giant tries to secure contracts to build 5G infrastructure around the world.]]></description>
		<content:encoded><![CDATA[<p>Backdoors in Huawei Equipment Discovered by Vodafone Italy in 2009<br />
<a href="https://gizmodo.com/backdoors-in-huawei-equipment-discovered-by-vodaphone-i-1834408368?utm_campaign=socialflow_gizmodo_facebook&#038;utm_source=gizmodo_facebook&#038;utm_medium=socialflow" rel="nofollow">https://gizmodo.com/backdoors-in-huawei-equipment-discovered-by-vodaphone-i-1834408368?utm_campaign=socialflow_gizmodo_facebook&#038;utm_source=gizmodo_facebook&#038;utm_medium=socialflow</a></p>
<p>Vodafone Italy discovered backdoors in its Huawei home internet routers and software between 2009 and 2011 according to a new report from Bloomberg News. The backdoors have reportedly been fixed, but the revelations are still bad news for Huawei as the Chinese tech giant tries to secure contracts to build 5G infrastructure around the world.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/04/01/cyber-security-news-april-2019/comment-page-8/#comment-1636936</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 30 Apr 2019 12:00:42 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182073#comment-1636936</guid>
		<description><![CDATA[GDPR Conformance Does Not Excuse Companies from Vicarious Liability
https://www.securityweek.com/gdpr-conformance-does-not-excuse-companies-vicarious-liability

The UK supermarket chain Morrisons&#039; legal battle with 5,500 of its own employees over vicarious liability introduces a new threat element to the already complex and confusing demands of the EU&#039;s General Data Protection Regulation (GDPR).]]></description>
		<content:encoded><![CDATA[<p>GDPR Conformance Does Not Excuse Companies from Vicarious Liability<br />
<a href="https://www.securityweek.com/gdpr-conformance-does-not-excuse-companies-vicarious-liability" rel="nofollow">https://www.securityweek.com/gdpr-conformance-does-not-excuse-companies-vicarious-liability</a></p>
<p>The UK supermarket chain Morrisons&#8217; legal battle with 5,500 of its own employees over vicarious liability introduces a new threat element to the already complex and confusing demands of the EU&#8217;s General Data Protection Regulation (GDPR).</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/04/01/cyber-security-news-april-2019/comment-page-8/#comment-1636935</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 30 Apr 2019 12:00:21 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182073#comment-1636935</guid>
		<description><![CDATA[Facebook to Fund Research on Social Media Impact on Elections
https://www.securityweek.com/facebook-fund-research-social-media-impact-elections

Facebook announced Monday its first research grants to academics studying the impact of social media on elections, part of an effort to prevent manipulation of social platforms.

The leading social network said some 60 researchers from 30 academic institutions across 11 countries were selected under a review process by the Social Science Research Council and the independent group Social Science One.]]></description>
		<content:encoded><![CDATA[<p>Facebook to Fund Research on Social Media Impact on Elections<br />
<a href="https://www.securityweek.com/facebook-fund-research-social-media-impact-elections" rel="nofollow">https://www.securityweek.com/facebook-fund-research-social-media-impact-elections</a></p>
<p>Facebook announced Monday its first research grants to academics studying the impact of social media on elections, part of an effort to prevent manipulation of social platforms.</p>
<p>The leading social network said some 60 researchers from 30 academic institutions across 11 countries were selected under a review process by the Social Science Research Council and the independent group Social Science One.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
