Apple Engineer attempting to take trade secrets to China has been arrested. The theft was discovered after forensics was discovered on his laptop with download activity and confidential data.
Reported by Fortune
Malware has likely been added to another Linux distribution, Arch Linux, turning the machine into a pawn in a botnet. The Arch developers response points to the repo not being part of the main build but a user repository.
Reported by Nakedsecurity
Heartland is suing their security provider which did not detect malware or a breach that occurred over the course of two years. Despite multiple audits, they did not find malware and did not find fault with obvious gaps (lack of firewall and vendor passwords)
Reported by Bleeping Computer
Within 1 day, researchers discovered that iPhone’s still have a limited mechanism for brute force. Given certain devices attachments, while unlocked (within 1 hour), a password can still be brute forced.
Reported by Hackernews
Apple a new version of the software which allows the user to set the phone to USB restricted mode, erasing the device after failed attempts. The use of the USB cable to brute force a device has been a favorite of law enforcement to break into iPhone devices.
Reported by The Verge
Type font used as evidence that documents were forged by Mr. Sharif’ on financial documentation. Evidence provided showed the use of Calibri (created in 2007) with the document dated in 2006.
Reported by Globe and Mail
Macy’s has warned that customers information was stolen from an online data breach. Curiously the data was not taken from Macy’s but rather from a 3rd party warning of the dangers of password reuse.
Reported by Macy’s
The South African presidential site was taken down after hacktivists calling themselves Black Team X defaced it with a skull. The attribution and motives are still to be determined.
Reported by South African
The browser extension Stylish has started stealing internet history of over 2 million users. Problems reportedly started with the creator sold in 2016.
Reported by Robert Heaton
As more and more breaches occur, they are getting less coverage in the news and researchers using sentiment analysis show how people quickly move onto new topics. The concern is that fewer actions are being taken to secure personal data and few a breach as inevitable.
Reported by ABC