Remove Communications Remove Financial Services Remove Healthcare Remove Security
article thumbnail

Google Yanks 106 ‘Malicious’ Chrome Extensions

Threatpost

Trojan Chrome browser extensions spied on users and maintained a foothold on the networks of financial services, oil and gas, media and entertainment, healthcare and pharmaceuticals and government organizations.

article thumbnail

Hundreds of malicious Chrome browser extensions used to spy on you!

Security Affairs

Malicious Chrome browser extensions were used in a massive surveillance campaign aimed at users working in the financial services, oil and gas, media and entertainment, healthcare, government organizations, and pharmaceuticals. ” reads the analysis published by Awake Security. appeared first on Security Affairs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Privacy and Cybersecurity Top 10 for 2018

Data Matters

In Carpenter , the government obtained months’ worth of a suspect’s cell phone location records pursuant to the Stored Communications Act (SCA). And the robot Sophia, which can communicate with realistic facial expressions and process emotional data, was granted citizenship in Saudi Arabia, raising issues of the legal status of AI.

article thumbnail

The Week in Cyber Security and Data Privacy: 4 – 10 March 2024

IT Governance

Source (New) Transport USA Yes 3,815 Okta Source 1 ; source 2 (Update) Cyber security USA Yes 3,800 Shah Dixit & Associates, P.C. million for security failings relating to a 2018 cyber attack on its mobile banking platform. UniCredit fined €2.8 about the recent rise in Facebook and Instagram account takeovers by scammers.

article thumbnail

Ten Years Later, New Clues in the Target Breach

Krebs on Security

When serious stolen payment card shop vendors wish to communicate that a batch of cards is uniquely their handiwork or that of their immediate crew, they refer to it as “our base.” ru — sold a variety of consulting services, including IT security assessments, code and system audits, and email marketing.