IN CASE YOU MISSED IT!

Myheritage, databreach, cybersecurity, infosec & much more…

Chatbots News Thursday, June 7

MyHeritage Data Breach – Data Of 92 Million Accounts Exposed

  • He found a file named as myheritage on an external server that contained email addresses and hashed passwords.
  • Being dubious, he shared the information with the security team of MyHeritage, which then confirmed that the data actually belonged to their users.
  • The file allegedly contained users email addresses and hashed passwords.
  • Fortunately, the firm never saves passwords of their users.
  • Although the leaked data had no sensitive information about their users, the organization seems concerned about their users privacy and have set up an investigative team to dig out the matter.

Tags:

MyHeritage Data Breach – Data Of 92 Million Accounts Exposed

Apple will let users run iOS apps on macOS

  • Apple is making it easier for mobile developers to port their iOS apps to the next-generation macOS Mojave desktop platforma major step in bringing the two platforms closer together.However, at the same time, the company straightforward denied the idea of merging the iPhone and Mac operating systems into one platform,…
  • So, Apple made it clear that iOS and macOS will continue to be separate products.Rumors of iOS apps coming to the Mac have been around since 2017, and yesterday at Apple’s WWDC 2018 event, Apple senior vice president of software engineering Craig Federighi just confirmed this while concluding his keynote.Though…
  • But that will change in 2019 when this feature will be made available to the third-party app developers.

Tags:

Apple will let users run iOS apps on macOS

Prowli Operation – Crooks already compromised over 40,000 servers and IoT Devices

  • The Prowli malware was spotted by researchers at GuardiCore, attackers composed the huge botnet by exploiting known vulnerabilities and brute-force attacks.
  • This campaign, dubbedOperation Prowli, aimed at servers and devices using the following arrack methods, including: – – Once attackers have compromised a server or an IoT device, theydetermine if they can use it for cryptocurrency mining operations.
  • Traffic monetizers, such as roi777, buy traffic from website operators such as the Prowli attackers and redirect it to domains on demand.
  • Hackedwebsites were used to host malicious code that redirects visitors to atraffic distribution system (TDS), with such kind of attack scheme crooks monetize their efforts by selling hijacked traffic.
  • Traffic monetizers, such as roi777, buy traffic from website operators such as the Prowli attackers and redirect it to domains on demand.

Tags:

Prowli Operation – Crooks already compromised over 40,000 servers and IoT Devices