<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security new December 2019</title>
	<atom:link href="http://www.epanorama.net/blog/2019/12/01/cyber-security-new-december-2019/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2019/12/01/cyber-security-new-december-2019/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 19 Apr 2026 21:53:56 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/12/01/cyber-security-new-december-2019/comment-page-4/#comment-1666466</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 31 Dec 2019 12:14:38 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183824#comment-1666466</guid>
		<description><![CDATA[US Coast Guard discloses Ryuk ransomware infection at maritime facility
https://www.zdnet.com/article/us-coast-guard-discloses-ryuk-ransomware-infection-at-maritime-facility/

Ransomware infection led to a disruption of camera and physical access control systems, and loss of critical process control monitoring systems.]]></description>
		<content:encoded><![CDATA[<p>US Coast Guard discloses Ryuk ransomware infection at maritime facility<br />
<a href="https://www.zdnet.com/article/us-coast-guard-discloses-ryuk-ransomware-infection-at-maritime-facility/" rel="nofollow">https://www.zdnet.com/article/us-coast-guard-discloses-ryuk-ransomware-infection-at-maritime-facility/</a></p>
<p>Ransomware infection led to a disruption of camera and physical access control systems, and loss of critical process control monitoring systems.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/12/01/cyber-security-new-december-2019/comment-page-4/#comment-1666453</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 31 Dec 2019 12:04:45 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183824#comment-1666453</guid>
		<description><![CDATA[Google Chrome impacted by new Magellan 2.0 vulnerabilities
Magellan 2.0 vulnerabilities were patched in Google Chrome 79.0.3945.79.
https://www.zdnet.com/article/google-chrome-impacted-by-new-magellan-2-0-vulnerabilities/

A new set of SQLite vulnerabilities can allow attackers to remotely run malicious code inside Google Chrome, the world&#039;s most popular web browser.

The vulnerabilities, five, in total, are named &quot;Magellan 2.0,&quot; and were disclosed today by the Tencent Blade security team.]]></description>
		<content:encoded><![CDATA[<p>Google Chrome impacted by new Magellan 2.0 vulnerabilities<br />
Magellan 2.0 vulnerabilities were patched in Google Chrome 79.0.3945.79.<br />
<a href="https://www.zdnet.com/article/google-chrome-impacted-by-new-magellan-2-0-vulnerabilities/" rel="nofollow">https://www.zdnet.com/article/google-chrome-impacted-by-new-magellan-2-0-vulnerabilities/</a></p>
<p>A new set of SQLite vulnerabilities can allow attackers to remotely run malicious code inside Google Chrome, the world&#8217;s most popular web browser.</p>
<p>The vulnerabilities, five, in total, are named &#8220;Magellan 2.0,&#8221; and were disclosed today by the Tencent Blade security team.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/12/01/cyber-security-new-december-2019/comment-page-4/#comment-1666448</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 31 Dec 2019 11:53:51 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183824#comment-1666448</guid>
		<description><![CDATA[20 Vulnerabilities to Prioritize Patching Before 2020
Researchers list the top 20 vulnerabilities currently exploited by attack groups around the world.
https://www.darkreading.com/threat-intelligence/20-vulnerabilities-to-prioritize-patching-before-2020/d/d-id/1336691]]></description>
		<content:encoded><![CDATA[<p>20 Vulnerabilities to Prioritize Patching Before 2020<br />
Researchers list the top 20 vulnerabilities currently exploited by attack groups around the world.<br />
<a href="https://www.darkreading.com/threat-intelligence/20-vulnerabilities-to-prioritize-patching-before-2020/d/d-id/1336691" rel="nofollow">https://www.darkreading.com/threat-intelligence/20-vulnerabilities-to-prioritize-patching-before-2020/d/d-id/1336691</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/12/01/cyber-security-new-december-2019/comment-page-4/#comment-1666447</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 31 Dec 2019 11:52:44 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183824#comment-1666447</guid>
		<description><![CDATA[DNSSEC still fueling DNS amplification attacks, TCP SYN flood attacks rise
https://www.helpnetsecurity.com/2019/12/19/dns-amplification-attacks-increase/

DNS amplification attacks continue to increase in number, growing 4,788% over Q3 2018, according to Nexusguard.

DNSSEC (Domain Name System Security Extensions) remains the main driver of growth of DNS amplification attacks in the quarter, yet analysts have detected a sharp and concerning rise in TCP SYN flood attacks.

TCP SYN flood is not a new method, but findings indicate that techniques have grown in sophistication and have emerged as the third most used attack vector, behind DNS amplification and HTTP flood attacks.]]></description>
		<content:encoded><![CDATA[<p>DNSSEC still fueling DNS amplification attacks, TCP SYN flood attacks rise<br />
<a href="https://www.helpnetsecurity.com/2019/12/19/dns-amplification-attacks-increase/" rel="nofollow">https://www.helpnetsecurity.com/2019/12/19/dns-amplification-attacks-increase/</a></p>
<p>DNS amplification attacks continue to increase in number, growing 4,788% over Q3 2018, according to Nexusguard.</p>
<p>DNSSEC (Domain Name System Security Extensions) remains the main driver of growth of DNS amplification attacks in the quarter, yet analysts have detected a sharp and concerning rise in TCP SYN flood attacks.</p>
<p>TCP SYN flood is not a new method, but findings indicate that techniques have grown in sophistication and have emerged as the third most used attack vector, behind DNS amplification and HTTP flood attacks.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/12/01/cyber-security-new-december-2019/comment-page-4/#comment-1666438</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 31 Dec 2019 11:33:26 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183824#comment-1666438</guid>
		<description><![CDATA[Uusi viranomainen alkaa välittää suomalaisten potilastietoja eteenpäin, mutta lupaa yksityisyyden suojan olevan turvattu
https://yle.fi/uutiset/3-11133001]]></description>
		<content:encoded><![CDATA[<p>Uusi viranomainen alkaa välittää suomalaisten potilastietoja eteenpäin, mutta lupaa yksityisyyden suojan olevan turvattu<br />
<a href="https://yle.fi/uutiset/3-11133001" rel="nofollow">https://yle.fi/uutiset/3-11133001</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/12/01/cyber-security-new-december-2019/comment-page-4/#comment-1666437</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 31 Dec 2019 11:32:52 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183824#comment-1666437</guid>
		<description><![CDATA[tietoliikennekatkos sairaaloissa – käyttäjän vahinko katkaisi yhteyden potilastietojärjestelmiin
https://yle.fi/uutiset/3-11138205

Satakunnassa erikoissairaanhoitoa tuottavan Satasairaalan tietoverkoissa oli maanantaina päivällä laaja ja erittäin vakavaksi kuvattu tietoliikennekatkos.

Tietohallintojohtaja Leena Ollonqvist sanoo, että yli tunnin kestänyt katkos johtui vahingosta: joku käyttäjä oli siirtänyt tietokoneensa toiseen paikkaan ja aiheuttanut verkkoon luupin, joka kuormitti koko järjestelmää. Ollonqvist kuvaa tilannetta erittäin vakavaksi.

– Koneita ei saisi itse siirtää paikasta toiseen. Nyt syntynyt vika on erittäin kriittinen. Vastaavia on vain noin kerran viidessä vuodessa, Ollonqvist sanoo.]]></description>
		<content:encoded><![CDATA[<p>tietoliikennekatkos sairaaloissa – käyttäjän vahinko katkaisi yhteyden potilastietojärjestelmiin<br />
<a href="https://yle.fi/uutiset/3-11138205" rel="nofollow">https://yle.fi/uutiset/3-11138205</a></p>
<p>Satakunnassa erikoissairaanhoitoa tuottavan Satasairaalan tietoverkoissa oli maanantaina päivällä laaja ja erittäin vakavaksi kuvattu tietoliikennekatkos.</p>
<p>Tietohallintojohtaja Leena Ollonqvist sanoo, että yli tunnin kestänyt katkos johtui vahingosta: joku käyttäjä oli siirtänyt tietokoneensa toiseen paikkaan ja aiheuttanut verkkoon luupin, joka kuormitti koko järjestelmää. Ollonqvist kuvaa tilannetta erittäin vakavaksi.</p>
<p>– Koneita ei saisi itse siirtää paikasta toiseen. Nyt syntynyt vika on erittäin kriittinen. Vastaavia on vain noin kerran viidessä vuodessa, Ollonqvist sanoo.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/12/01/cyber-security-new-december-2019/comment-page-4/#comment-1666435</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 31 Dec 2019 11:30:33 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183824#comment-1666435</guid>
		<description><![CDATA[News
    Politics
    Sport
    Football
    Celebs
    TV
    Film
    Royals
    Weird News
    Tech
    Money
    Travel
    Fashion
    Mums
    Competitions
    Quizzes
    Got a Story?

    Shop
    Voucher Codes
    Offers
    Bingo
    Dating
    Jobs
    Funeral Notices
    Horoscopes
    Cartoons
    Crosswords

    HomeTechnologyGoogle

Google warns of scams targeting elderly users - how to keep your loved ones safe online
https://www.mirror.co.uk/tech/google-warns-scams-targeting-elderly-21121887

EXCLUSIVE: Google has issued a warning about online scams that specifically target elderly users, and gives its top tips to keep your loved ones safe online

While older people are often thought of as ‘technophobes’, 60+ year-olds are slowly but surely embracing technology into their lives.

But Google has issued a warning about online scams that specifically target elderly users.

Speaking to Mirror Online, Elijah Lawal, online safety communications manager at Google, explained: “No matter how long you’ve been using the internet, the online world continues to present increasingly sophisticated security threats, from manipulative scammers to advanced password hackers.

“It’s certainly a concern for older internet users — 75% of Brits over 60 report having worried about online safety in the past year.”

Here are Google’s top tips to help seniors stay safe online this Christmas.
1. Keep strong, unique passwords
2. Be careful who you trust
3. Take care when sharing]]></description>
		<content:encoded><![CDATA[<p>News<br />
    Politics<br />
    Sport<br />
    Football<br />
    Celebs<br />
    TV<br />
    Film<br />
    Royals<br />
    Weird News<br />
    Tech<br />
    Money<br />
    Travel<br />
    Fashion<br />
    Mums<br />
    Competitions<br />
    Quizzes<br />
    Got a Story?</p>
<p>    Shop<br />
    Voucher Codes<br />
    Offers<br />
    Bingo<br />
    Dating<br />
    Jobs<br />
    Funeral Notices<br />
    Horoscopes<br />
    Cartoons<br />
    Crosswords</p>
<p>    HomeTechnologyGoogle</p>
<p>Google warns of scams targeting elderly users &#8211; how to keep your loved ones safe online<br />
<a href="https://www.mirror.co.uk/tech/google-warns-scams-targeting-elderly-21121887" rel="nofollow">https://www.mirror.co.uk/tech/google-warns-scams-targeting-elderly-21121887</a></p>
<p>EXCLUSIVE: Google has issued a warning about online scams that specifically target elderly users, and gives its top tips to keep your loved ones safe online</p>
<p>While older people are often thought of as ‘technophobes’, 60+ year-olds are slowly but surely embracing technology into their lives.</p>
<p>But Google has issued a warning about online scams that specifically target elderly users.</p>
<p>Speaking to Mirror Online, Elijah Lawal, online safety communications manager at Google, explained: “No matter how long you’ve been using the internet, the online world continues to present increasingly sophisticated security threats, from manipulative scammers to advanced password hackers.</p>
<p>“It’s certainly a concern for older internet users — 75% of Brits over 60 report having worried about online safety in the past year.”</p>
<p>Here are Google’s top tips to help seniors stay safe online this Christmas.<br />
1. Keep strong, unique passwords<br />
2. Be careful who you trust<br />
3. Take care when sharing</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/12/01/cyber-security-new-december-2019/comment-page-4/#comment-1666432</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 31 Dec 2019 11:23:44 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183824#comment-1666432</guid>
		<description><![CDATA[Londoner who tried to blackmail Apple with 300m+ iCloud account resets was reusing stale old creds
Community service for &#039;Turkish Crime Family&#039; wannabe big dog
https://www.theregister.co.uk/2019/12/24/kerem_albayrak_apple_icloud_blackmail_sentenced/

A 22-year-old Londoner has been given 300 hours of community service and a State-enforced bedtime after trying to blackmail Apple with hundreds of millions of previously compromised login credentials.

Kerem Albayrak, 22, demanded Apple give him $75,000 in crypto-currency or a thousand $100 iTunes gift cards. If the maker of shiny white electronic stuff didn&#039;t comply, Albayrak said he would factory-reset 319 million iCloud accounts and &quot;dump his databases online if his demands were not met,&quot; according to the National Crime Agency.]]></description>
		<content:encoded><![CDATA[<p>Londoner who tried to blackmail Apple with 300m+ iCloud account resets was reusing stale old creds<br />
Community service for &#8216;Turkish Crime Family&#8217; wannabe big dog<br />
<a href="https://www.theregister.co.uk/2019/12/24/kerem_albayrak_apple_icloud_blackmail_sentenced/" rel="nofollow">https://www.theregister.co.uk/2019/12/24/kerem_albayrak_apple_icloud_blackmail_sentenced/</a></p>
<p>A 22-year-old Londoner has been given 300 hours of community service and a State-enforced bedtime after trying to blackmail Apple with hundreds of millions of previously compromised login credentials.</p>
<p>Kerem Albayrak, 22, demanded Apple give him $75,000 in crypto-currency or a thousand $100 iTunes gift cards. If the maker of shiny white electronic stuff didn&#8217;t comply, Albayrak said he would factory-reset 319 million iCloud accounts and &#8220;dump his databases online if his demands were not met,&#8221; according to the National Crime Agency.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/12/01/cyber-security-new-december-2019/comment-page-4/#comment-1666426</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 31 Dec 2019 09:21:18 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183824#comment-1666426</guid>
		<description><![CDATA[Yahoo News: 	
Overview of the ongoing efforts by the US to modernize its spy operations, to contain the damage from the 2014 OPM breach, be more resilient to tracking, more  —  When hackers began slipping into computer systems at the Office of Personnel Management in the spring of 2014 … 

&#039;Shattered&#039;: Inside the secret battle to save America&#039;s undercover spies in the digital age
https://news.yahoo.com/shattered-inside-the-secret-battle-to-save-americas-undercover-spies-in-the-digital-age-100029026.html?guccounter=1&amp;guce_referrer=aHR0cHM6Ly93d3cudGVjaG1lbWUuY29tLw&amp;guce_referrer_sig=AQAAABM0DO3JdyhBOXQZo4rHwntoZX_47sIjr2QQI_sFeYVDCSGGj2KlOOSW7xHl7oXTMtRKVhLjNd3PU72z7-Iks6j7HGYmjICNcK4J4Qi83DZkS-aR5PjTgoKj46DuAMZbg3GvuInobcDtu6mRWWadsEOV2VkDhN_w9fNiVSbbuBlB

When hackers began slipping into computer systems at the Office of Personnel Management in the spring of 2014, no one inside that federal agency could have predicted the potential scale and magnitude of the damage. Over the next six months, those hackers — later identified as working for the Chinese government — stole data on nearly 22 million former and current American civil servants, including intelligence officials.

The data breach, which included fingerprints, personnel records and security clearance background information, shook the intelligence community to its core. Among the hacked information’s other uses, Beijing had acquired a potential way to identify large numbers of undercover spies working for the U.S. government.]]></description>
		<content:encoded><![CDATA[<p>Yahoo News:<br />
Overview of the ongoing efforts by the US to modernize its spy operations, to contain the damage from the 2014 OPM breach, be more resilient to tracking, more  —  When hackers began slipping into computer systems at the Office of Personnel Management in the spring of 2014 … </p>
<p>&#8216;Shattered&#8217;: Inside the secret battle to save America&#8217;s undercover spies in the digital age<br />
<a href="https://news.yahoo.com/shattered-inside-the-secret-battle-to-save-americas-undercover-spies-in-the-digital-age-100029026.html?guccounter=1&#038;guce_referrer=aHR0cHM6Ly93d3cudGVjaG1lbWUuY29tLw&#038;guce_referrer_sig=AQAAABM0DO3JdyhBOXQZo4rHwntoZX_47sIjr2QQI_sFeYVDCSGGj2KlOOSW7xHl7oXTMtRKVhLjNd3PU72z7-Iks6j7HGYmjICNcK4J4Qi83DZkS-aR5PjTgoKj46DuAMZbg3GvuInobcDtu6mRWWadsEOV2VkDhN_w9fNiVSbbuBlB" rel="nofollow">https://news.yahoo.com/shattered-inside-the-secret-battle-to-save-americas-undercover-spies-in-the-digital-age-100029026.html?guccounter=1&#038;guce_referrer=aHR0cHM6Ly93d3cudGVjaG1lbWUuY29tLw&#038;guce_referrer_sig=AQAAABM0DO3JdyhBOXQZo4rHwntoZX_47sIjr2QQI_sFeYVDCSGGj2KlOOSW7xHl7oXTMtRKVhLjNd3PU72z7-Iks6j7HGYmjICNcK4J4Qi83DZkS-aR5PjTgoKj46DuAMZbg3GvuInobcDtu6mRWWadsEOV2VkDhN_w9fNiVSbbuBlB</a></p>
<p>When hackers began slipping into computer systems at the Office of Personnel Management in the spring of 2014, no one inside that federal agency could have predicted the potential scale and magnitude of the damage. Over the next six months, those hackers — later identified as working for the Chinese government — stole data on nearly 22 million former and current American civil servants, including intelligence officials.</p>
<p>The data breach, which included fingerprints, personnel records and security clearance background information, shook the intelligence community to its core. Among the hacked information’s other uses, Beijing had acquired a potential way to identify large numbers of undercover spies working for the U.S. government.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/12/01/cyber-security-new-december-2019/comment-page-4/#comment-1666425</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 31 Dec 2019 09:19:23 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=183824#comment-1666425</guid>
		<description><![CDATA[Cyber Attack Forces Airline to Cancel Flights in Alaska
https://www.securityweek.com/cyber-attack-forces-airline-cancel-flights-alaska

RavnAir canceled at least a half-dozen flights in Alaska on Saturday — at the peak of holiday travel — following what the company described as “a malicious cyber attack” on its computer network.

The cancellations affected around 260 passengers, according to company spokeswoman Debbie Reinwand.

The regional carrier canceled all flights involving its Dash 8 aircraft until noon “because the cyber attack forced us to disconnect our Dash 8 maintenance system and its back-up,”]]></description>
		<content:encoded><![CDATA[<p>Cyber Attack Forces Airline to Cancel Flights in Alaska<br />
<a href="https://www.securityweek.com/cyber-attack-forces-airline-cancel-flights-alaska" rel="nofollow">https://www.securityweek.com/cyber-attack-forces-airline-cancel-flights-alaska</a></p>
<p>RavnAir canceled at least a half-dozen flights in Alaska on Saturday — at the peak of holiday travel — following what the company described as “a malicious cyber attack” on its computer network.</p>
<p>The cancellations affected around 260 passengers, according to company spokeswoman Debbie Reinwand.</p>
<p>The regional carrier canceled all flights involving its Dash 8 aircraft until noon “because the cyber attack forced us to disconnect our Dash 8 maintenance system and its back-up,”</p>
]]></content:encoded>
	</item>
</channel>
</rss>
