Some users have recently had their accounts hijacked. It seems that the now defunct EVGA forums might have compromised your password there and seems many are using the same PW here. We would suggest you UPDATE YOUR PASSWORD and TURN ON 2FA for your account here to further secure it. None of the compromised accounts had 2FA turned on.
Once you have enabled 2FA, your account will be updated soon to show a badge, letting other members know that you use 2FA to protect your account. This should be beneficial for everyone that uses FSFT.
The Department of Justice has formally acknowledged the role that computer security researchers play in testing the safety of networks, devices, and online services. The DOJ has announced that the Computer Fraud and Abuse Act (CFAA) has been revised to recognize the importance of good-faith...
computer fraud and abuse act
computer security
cybersecurity
department of justice
ethics
government
hacker
malicious
security
security research
usa
white hat
The Department of Homeland Security (DHS) has issued a cybersecurity warning that documents vulnerabilities in the Medtronic Conexus Radio Frequency Telemetry Protocol. Medtronic makes cardio-defibrillators that are planted into a patient's chest and can be read and programmed by trained medical...
Microsoft Defender ATP for Mac brings the same robust protection from Windows Defender to the Mac platform. Microsoft has created a "cross-platform next-generation protection and endpoint detection and response coverage" heterogeneous solution that will help Microsoft reach its goal of securing...
In a new blog post entitled "Keeping Passwords Secure" Facebook VP Engineering, Security and Privacy Pedro Canahuati explains how the social media giant accidentally stored Facebook user's passwords on internal data storage systems in plain text. Pedro explains how "these passwords were never...
In a Senate report, Equifax is accused of neglecting its own cybersecurity policies which ultimately led to the 2017 data breach that exposed personally identifiable information (PII) of 145 million Americans . The company's key Senior Managers didn't attend cybersecurity meetings and an audit...
Today, the NSA released its free "GHIDRA" software reverse engineering tool. It can be used to analyze malicious code and malware like viruses. Cybersecurity professionals can use it to better understand potential vulnerabilities in their networks and systems. NSA will be making Ghidra available...
Troy Hunt is a Microsoft Regional Director and is the owner and creator of Have I Been Owned (HIBP). Today he alerted the security community to a massive 87GB data breach that the hacker community calls "Collection #1." It contains 773 million unique email addresses, 1.1 billion unique...
account
credential stuffing
cybercrime
cybersecurity
data breach
email address
hacker
have i been pwned
hibp
injection
mega
password manager
passwords
technology
troy hunt
Magecart Group 12 is suspected of compromising an ad agency that delivers advertising to eCommerce websites. By directly injecting payment skimming code into JavaScript libraries provided by French online advertising company, Adverline to its eCommerce customers, it enabled all websites embedded...
According to a new report from the Pentagon's Inspector General (PDF Warning), which was spotted by Motherboard, the Department of Defense still has some glaring cybersecurity issues. While the Pentagon has apparently made some great strides since 2017, there are still "266 open...
The Idaho National Laboratory is known as one of the primary cybersecurity facilities in the United States. It has a premier cybersecurity research and development lab that is currently getting a $85 million expansion complete with 20 laboratories and separately housed supercomputers. These...
Dell has announced that its cybersecurity team foiled an unauthorized intrusion into its network that attempted to extract Dell.com customer information; limited to names, email addresses and hashed passwords. The Dell security team stopped the hackers by immediately implementing...
What's your flavor?
Here's mine:
FortiGate 60E NGFW (if you're in the industry you can get these free from Fortinet at various events/etc. - watch for them and sign up - the common combo is an 8 port managed switch, this, and an AP) - pfSense is great if you're a roll your own guy/open source...
A study by the U.S. Government Accountability Office (GAO) has shown how vulnerable U.S. weapon systems under the control of the Department of Defense (DOD) have become. This is due to the weapon systems becoming more networked and software dependent and the DoD is still in the early stages of...
Three hackers aged 21, 22, and 22 all received 5 years of probation and 62 1/2 weeks of community service in the U.S. District Court in Anchorage. Josiah White, Paras Jha, and Dalton Norman all pleaded guilty to computer fraud charges in December. They were ordered to pay $127,000 in...
33 tech companies have pledged to never help governments launch cyberattacks in what the New York Times calls the "Digital Geneva Accord." Inquisitr summarizes the pledge dubbed the "Cybersecurity Tech Accord," which in addition to not helping governments launch a cyber attack, pledges to have...
Gamers may be good candidates for cybersecurity jobs according to a new report from McAfee. McAfee surveyed hundreds of cybersecurity professionals and managers at major corporations and most of the respondents said the current generation of gamers are strong candidates for cybersecurity jobs...
The SEC has issued an interpretive release that further clarifies guidance concerning disclosure of cybersecurity risks. The SEC wants companies to put policies in place that result in timely notification of breaches to the public, and better yet, policies that prevent executives from trading...
Great Britain’s biggest Internet and telecoms provider British Telecommunications PLC (BT) has secured a patent for its proposed cybersecurity system for Blockchain protection in late October. Based on the patent, one use case involving the patent is the so-called “majority control attacks” or...
Cybersecurity researchers at the Georgia Institute of Technology are working to automate the process that investigators use to pinpoint how intruders enter a network, what data they took, and which computer were compromised. It's known as Refinable Attack INvestigation (RAIN) and it will...
Mass produced consumer drones have been used by the Army for quite some time now, but that has come to a screeching halt as of two days ago. DJI drones mass produced in China, not secure? Whodathunkit?
Document here.
If you are into drones and security, this hour long video will tell you...
In a classified briefing with FBI and Homeland Security officials, the U.S. Senate Intelligence Committee reportedly discussed growing concerns in relation to cybersecurity firm Kaspersky Lab. The Moscow, Russia-based company has created these concerns in the Senate due to apparent previous...