Microsoft Collecting More Data of Windows 10 Users than Initially Thought

Microsoft Collecting More Data of Windows 10 Users than Initially Thought

After several controversial data mining and privacy invasion features within Microsoft’s newest operating system, Microsoft continued convincing its users that Windows 10 is not spying on anyone and that the company is not collecting more data than it needs.
In addition, Microsoft also updated its privacy policy in order to clear how and when Windows 10 utilizes users’ data.

See the full story here:

Computer hackers growing in numbers as security breaches increase

Computer hackers growing in numbers as security breaches increase

Partial transcript of a story from July 2015, click the link below for the full article at

TICKY FULLERTON: This week, customers using the Ashley Madison relationship cheating service got a nasty shock. Their personal details had been hacked. 30 million people held their breath including 1 million Australians apparently. But hackers aren’t just interested in people cheating on their partners, they’re increasingly attacking a growing number of databases holding highly sensitive personal information. In the US, health insurance details were stolen, in another case the hackers stole fingerprints held by the US Government. Margot O’Neil takes up the story.

2015 data breaches up by 0.8%, as compared to 2014

2015 data breaches up by 0.8%, as compared to 2014

According to the latest December 15, 2015 Identity Threat Resource Center (ITRC) data breach report—750 data breaches were recorded with more than 177 million records exposed. The ITRC breach list is a compilation of data breaches confirmed by various media sources and/or notification lists from state governmental agencies. This list is updated daily, and published each Tuesday.

The latest report indicates that hackers are concentrating on medical/healthcare sectors that account for 68.4 percent of all breaches, followed by government/military: 19.2 percent, business: 9.1 percent, banking/credit/financial: 2.8 percent, and educational: 0.4 percent. 2015 data breaches are up by 0.8 percent, as compared to 2014.

Cybercriminals are gearing up for the holidays

Cybercriminals are gearing up for the holidays

The upcoming holiday season could be a lucrative time for cybercriminals, according to a new ThreatMetrix Q3 Cybercrime Report. The digital identity company detected 45 million e-commerce attacks during Q3, a 25 percent increase over the previous quarter.  Login attacks were also up 40 percent more than in the previous quarter.

Nmap 7 is released!

Nmap 7 is released!

The Nmap Project is pleased to announce the immediate, free availability of the Nmap Security Scanner version 7.00 from It is the product of three and a half years of work, nearly 3200 code commits, and more than a dozen point releases since the big Nmap 6 release in May 2012. Nmap turned 18 years old in September this year and celebrates its birthday with 171 new NSE scripts, expanded IPv6 support, world-class SSL/TLS analysis, and more user-requested features than ever. We recommend that all current users upgrade.

Anonymous Group Leaks Identities of 1000 KKK Members

Anonymous Group Leaks Identities of 1000 KKK Members

The online hacktivist group Anonymous has followed through on its promise to disclose the identities of hundreds of Ku Klux Klan members. On Monday, Anonymous vowed to release the full info dump of about 1,000 alleged Ku Klux Klan members with a chosen date of 5th of this November.
As promised, Anonymous posted a link to a Pastebin account with the names, aliases, Google Plus profiles, Facebook accounts and other identifying information of roughly 1,000 individuals the group believes are members of the Ku Klux Klan. The hackers behind the leak tweeted a link to a Pastebin on a Twitter account, Operation KKK (@Operation_KKK) believed to be controlled by them.

New ransomware uses Remote Desktop to spread

New ransomware uses Remote Desktop to spread

Analysis of the ransomware was conducted by malware analyst, Nathan Scott. When the ransomware executable is run, it first scans all mapped drives, removable drives, and network drives for data files to encrypt. “When the ransomware executable is run it will scan all mapped drives, including removable and network drives, for data files to encrypt.  When it encounters a file that contains certain file extensions it will encrypt them using AES encryption and then add the oorr. string to the beginning of the file name.”

%d bloggers like this: