<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news October 2019</title>
	<atom:link href="http://www.epanorama.net/blog/2019/10/01/cyber-security-news-october-209/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2019/10/01/cyber-security-news-october-209/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 19 Apr 2026 21:53:56 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/10/01/cyber-security-news-october-209/comment-page-5/#comment-1657532</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 31 Oct 2019 11:08:10 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183820#comment-1657532</guid>
		<description><![CDATA[&quot;Worldwide  fraud networks have recently shifted to using CS:GO keys to liquidate  their gains. At this point, nearly all key purchases that end up being  traded or sold on the marketplace are believed to be fraud-sourced,&quot;  Valve says.
https://www.vice.com/en_us/article/8xw7nx/nearly-all-counter-strike-microtransactions-are-being-used-for-money-laundering]]></description>
		<content:encoded><![CDATA[<p>&#8220;Worldwide  fraud networks have recently shifted to using CS:GO keys to liquidate  their gains. At this point, nearly all key purchases that end up being  traded or sold on the marketplace are believed to be fraud-sourced,&#8221;  Valve says.<br />
<a href="https://www.vice.com/en_us/article/8xw7nx/nearly-all-counter-strike-microtransactions-are-being-used-for-money-laundering" rel="nofollow">https://www.vice.com/en_us/article/8xw7nx/nearly-all-counter-strike-microtransactions-are-being-used-for-money-laundering</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Grandad</title>
		<link>https://www.epanorama.net/blog/2019/10/01/cyber-security-news-october-209/comment-page-5/#comment-1657521</link>
		<dc:creator><![CDATA[Grandad]]></dc:creator>
		<pubDate>Thu, 31 Oct 2019 08:46:49 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183820#comment-1657521</guid>
		<description><![CDATA[I’m a long time user of Nordvpn, never had any issues while torrenting etc. I’ve read the full blog post about that &quot;hack&quot; and I’m leaning towards giving them the benefit of the doubt… it sounds like their response was the proper one. I feel even more safe now coz I know that they do not log anything]]></description>
		<content:encoded><![CDATA[<p>I’m a long time user of Nordvpn, never had any issues while torrenting etc. I’ve read the full blog post about that &#8220;hack&#8221; and I’m leaning towards giving them the benefit of the doubt… it sounds like their response was the proper one. I feel even more safe now coz I know that they do not log anything</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/10/01/cyber-security-news-october-209/comment-page-5/#comment-1657503</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 31 Oct 2019 05:58:33 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183820#comment-1657503</guid>
		<description><![CDATA[Beware! This Android Malware Can’t Be Removed Even After Factory Reset
https://fossbytes.com/android-malware-cant-removed-after-factory-reset/

 has affected 45,000 Android devices to date. The malware dubbed xHelper

Spread By Websites That Allow Sideloading Of Apps]]></description>
		<content:encoded><![CDATA[<p>Beware! This Android Malware Can’t Be Removed Even After Factory Reset<br />
<a href="https://fossbytes.com/android-malware-cant-removed-after-factory-reset/" rel="nofollow">https://fossbytes.com/android-malware-cant-removed-after-factory-reset/</a></p>
<p> has affected 45,000 Android devices to date. The malware dubbed xHelper</p>
<p>Spread By Websites That Allow Sideloading Of Apps</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/10/01/cyber-security-news-october-209/comment-page-5/#comment-1657499</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 31 Oct 2019 05:14:02 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183820#comment-1657499</guid>
		<description><![CDATA[Educational spyware company to school boards: hire us to spy on your kids and we&#039;ll help you sabotage teachers&#039; strikes
https://boingboing.net/2019/10/23/blame-bill-clinton.html?fbclid=IwAR0pcovb48cDF-_oNvFDTjDNw0x-S2TzIUEEt2gMNfHqsZ-f4E0Q6hrdcHE

Gaggle is one of a handful of creepy companies that sell surveillance software to school districts, which monitor every keystroke and click on school networks -- they&#039;re the latest evolution in spy-on-kids tech, which started off by promising that they&#039;d stop kids from seeing porn, then promised they could end bullying, and now advertise themselves as a solution for school shootings, under the banner of being a &quot;Safety Management Platform.&quot;

Gaggle has plenty of competition from the likes of Securely and Goguardian.]]></description>
		<content:encoded><![CDATA[<p>Educational spyware company to school boards: hire us to spy on your kids and we&#8217;ll help you sabotage teachers&#8217; strikes<br />
<a href="https://boingboing.net/2019/10/23/blame-bill-clinton.html?fbclid=IwAR0pcovb48cDF-_oNvFDTjDNw0x-S2TzIUEEt2gMNfHqsZ-f4E0Q6hrdcHE" rel="nofollow">https://boingboing.net/2019/10/23/blame-bill-clinton.html?fbclid=IwAR0pcovb48cDF-_oNvFDTjDNw0x-S2TzIUEEt2gMNfHqsZ-f4E0Q6hrdcHE</a></p>
<p>Gaggle is one of a handful of creepy companies that sell surveillance software to school districts, which monitor every keystroke and click on school networks &#8212; they&#8217;re the latest evolution in spy-on-kids tech, which started off by promising that they&#8217;d stop kids from seeing porn, then promised they could end bullying, and now advertise themselves as a solution for school shootings, under the banner of being a &#8220;Safety Management Platform.&#8221;</p>
<p>Gaggle has plenty of competition from the likes of Securely and Goguardian.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/10/01/cyber-security-news-october-209/comment-page-5/#comment-1657498</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 31 Oct 2019 04:59:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183820#comment-1657498</guid>
		<description><![CDATA[Hackers hijacked the capital’s surveillance cameras days before Trump’s inauguration and said it was easy
But they didn’t cover their tracks
https://www.theverge.com/2019/10/30/20939885/surveillance-hack-trump-inauguration-ransomware-hackers-washington-dc

An article from The Wall Street Journal details how hackers Alexandru Isvanca and Eveline Cismaru seized control of Washington, DC’s surveillance cameras right before Trump’s inauguration. 

 In the end, they controlled 126 out of 186 DC police computers, which in turn controlled the surveillance cameras.

The Hapless Shakedown Crew That Hacked Trump’s Inauguration
https://www.wsj.com/articles/the-hapless-shake-down-crew-that-hacked-trumps-inauguration-11572014333

Days before the big event, hackers seized control of the capital’s surveillance cameras and demanded a ransom. Then everything spiraled out of control.]]></description>
		<content:encoded><![CDATA[<p>Hackers hijacked the capital’s surveillance cameras days before Trump’s inauguration and said it was easy<br />
But they didn’t cover their tracks<br />
<a href="https://www.theverge.com/2019/10/30/20939885/surveillance-hack-trump-inauguration-ransomware-hackers-washington-dc" rel="nofollow">https://www.theverge.com/2019/10/30/20939885/surveillance-hack-trump-inauguration-ransomware-hackers-washington-dc</a></p>
<p>An article from The Wall Street Journal details how hackers Alexandru Isvanca and Eveline Cismaru seized control of Washington, DC’s surveillance cameras right before Trump’s inauguration. </p>
<p> In the end, they controlled 126 out of 186 DC police computers, which in turn controlled the surveillance cameras.</p>
<p>The Hapless Shakedown Crew That Hacked Trump’s Inauguration<br />
<a href="https://www.wsj.com/articles/the-hapless-shake-down-crew-that-hacked-trumps-inauguration-11572014333" rel="nofollow">https://www.wsj.com/articles/the-hapless-shake-down-crew-that-hacked-trumps-inauguration-11572014333</a></p>
<p>Days before the big event, hackers seized control of the capital’s surveillance cameras and demanded a ransom. Then everything spiraled out of control.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/10/01/cyber-security-news-october-209/comment-page-5/#comment-1657477</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 30 Oct 2019 19:32:59 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183820#comment-1657477</guid>
		<description><![CDATA[45,000 Android devices infected by new unremovable xHelper malware
https://thenextweb.com/security/2019/10/30/45000-android-devices-infected-by-new-unremovable-xhelper-malware/

A new kind of Android malware capable of reinstalling itself even after being manually removed has reportedly infected more than 45,000 Android devices over the last six months 

https://www.symantec.com/blogs/threat-intelligence/xhelper-android-malware]]></description>
		<content:encoded><![CDATA[<p>45,000 Android devices infected by new unremovable xHelper malware<br />
<a href="https://thenextweb.com/security/2019/10/30/45000-android-devices-infected-by-new-unremovable-xhelper-malware/" rel="nofollow">https://thenextweb.com/security/2019/10/30/45000-android-devices-infected-by-new-unremovable-xhelper-malware/</a></p>
<p>A new kind of Android malware capable of reinstalling itself even after being manually removed has reportedly infected more than 45,000 Android devices over the last six months </p>
<p><a href="https://www.symantec.com/blogs/threat-intelligence/xhelper-android-malware" rel="nofollow">https://www.symantec.com/blogs/threat-intelligence/xhelper-android-malware</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/10/01/cyber-security-news-october-209/comment-page-5/#comment-1657476</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 30 Oct 2019 19:28:16 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183820#comment-1657476</guid>
		<description><![CDATA[So earlier they were not accepting it but now finally they did. 


News link : https://www.indiatoday.in/india/story/kudankulam-nuclear-power-plant-dtrack-north-korea-atms-1614200-2019-10-30]]></description>
		<content:encoded><![CDATA[<p>So earlier they were not accepting it but now finally they did. </p>
<p>News link : <a href="https://www.indiatoday.in/india/story/kudankulam-nuclear-power-plant-dtrack-north-korea-atms-1614200-2019-10-30" rel="nofollow">https://www.indiatoday.in/india/story/kudankulam-nuclear-power-plant-dtrack-north-korea-atms-1614200-2019-10-30</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/10/01/cyber-security-news-october-209/comment-page-5/#comment-1657398</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 30 Oct 2019 05:44:58 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183820#comment-1657398</guid>
		<description><![CDATA[EU data watchdog raises concerns over Microsoft contracts

https://www.euractiv.com/section/digital/news/eu-data-watchdog-raises-concerns-over-microsoft-contracts/

Microsoft’s contracts with European Union institutions do not fully protect data in line with EU law, the European Data Protection Supervisor (EDPS) said in initial findings published on Monday (21 October).]]></description>
		<content:encoded><![CDATA[<p>EU data watchdog raises concerns over Microsoft contracts</p>
<p><a href="https://www.euractiv.com/section/digital/news/eu-data-watchdog-raises-concerns-over-microsoft-contracts/" rel="nofollow">https://www.euractiv.com/section/digital/news/eu-data-watchdog-raises-concerns-over-microsoft-contracts/</a></p>
<p>Microsoft’s contracts with European Union institutions do not fully protect data in line with EU law, the European Data Protection Supervisor (EDPS) said in initial findings published on Monday (21 October).</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/10/01/cyber-security-news-october-209/comment-page-5/#comment-1657377</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 29 Oct 2019 20:04:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183820#comment-1657377</guid>
		<description><![CDATA[New cyberattacks targeting sporting and anti-doping organizations
https://blogs.microsoft.com/on-the-issues/2019/10/28/cyberattacks-sporting-anti-doping/

Today we’re sharing that the Microsoft Threat Intelligence Center has recently tracked significant cyberattacks originating from a group we call Strontium, also known as Fancy Bear/APT28, targeting anti-doping authorities and sporting organizations around the world. As the world looks forward with anticipation to the Tokyo Summer Games in 2020, we thought it important to share information about this new round of activity.

At least 16 national and international sporting and anti-doping organizations across three continents were targeted in these attacks which began September 16th]]></description>
		<content:encoded><![CDATA[<p>New cyberattacks targeting sporting and anti-doping organizations<br />
<a href="https://blogs.microsoft.com/on-the-issues/2019/10/28/cyberattacks-sporting-anti-doping/" rel="nofollow">https://blogs.microsoft.com/on-the-issues/2019/10/28/cyberattacks-sporting-anti-doping/</a></p>
<p>Today we’re sharing that the Microsoft Threat Intelligence Center has recently tracked significant cyberattacks originating from a group we call Strontium, also known as Fancy Bear/APT28, targeting anti-doping authorities and sporting organizations around the world. As the world looks forward with anticipation to the Tokyo Summer Games in 2020, we thought it important to share information about this new round of activity.</p>
<p>At least 16 national and international sporting and anti-doping organizations across three continents were targeted in these attacks which began September 16th</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/10/01/cyber-security-news-october-209/comment-page-5/#comment-1657372</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 29 Oct 2019 19:23:51 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183820#comment-1657372</guid>
		<description><![CDATA[FireEye: “APT41 compromised company behind TeamViewer – which enabled them to access *any* system with TeamViewer installed”
https://meterpreter.org/fireeye-apt41-compromised-company-behind-teamviewer-which-enabled-them-to-access-any-system-with-teamviewer-installed/

The well-known remote control software TeamViewer was hacked many years ago, and some of the user computers were controlled by hackers and installed backdoors to steal data. But even now the company does not admit that the server was attacked. On the contrary, the developers said that users were attacked mainly by leaking remote IDs and passwords. However, it is shocking that the security company has once again revealed that TeamViewer has been hacked. 

Recently, the leading security company FireEye, Chief Security Architect, Christopher Glyer wrote the news on Twitter that TeamViewer was hacked and leaked the user’s account password. This hacker group is known as APT41,

https://mobile.twitter.com/cglyer/status/1182413194360508419]]></description>
		<content:encoded><![CDATA[<p>FireEye: “APT41 compromised company behind TeamViewer – which enabled them to access *any* system with TeamViewer installed”<br />
<a href="https://meterpreter.org/fireeye-apt41-compromised-company-behind-teamviewer-which-enabled-them-to-access-any-system-with-teamviewer-installed/" rel="nofollow">https://meterpreter.org/fireeye-apt41-compromised-company-behind-teamviewer-which-enabled-them-to-access-any-system-with-teamviewer-installed/</a></p>
<p>The well-known remote control software TeamViewer was hacked many years ago, and some of the user computers were controlled by hackers and installed backdoors to steal data. But even now the company does not admit that the server was attacked. On the contrary, the developers said that users were attacked mainly by leaking remote IDs and passwords. However, it is shocking that the security company has once again revealed that TeamViewer has been hacked. </p>
<p>Recently, the leading security company FireEye, Chief Security Architect, Christopher Glyer wrote the news on Twitter that TeamViewer was hacked and leaked the user’s account password. This hacker group is known as APT41,</p>
<p><a href="https://mobile.twitter.com/cglyer/status/1182413194360508419" rel="nofollow">https://mobile.twitter.com/cglyer/status/1182413194360508419</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
