{"id":26943,"date":"2019-02-15T09:13:02","date_gmt":"2019-02-15T16:13:02","guid":{"rendered":"https://www.webroot.com/blog/?p=26943"},"modified":"2019-03-20T17:05:09","modified_gmt":"2019-03-20T23:05:09","slug":"cyber-news-rundown-photography-site-breached","status":"publish","type":"post","link":"https://www.webroot.com/blog/2019\/02\/15\/cyber-news-rundown-photography-site-breached\/","title":{"rendered":"Cyber News Rundown: Photography Site Breached"},"content":{"rendered":"\n<h2>Popular Photography Site Breached<\/h2>\n\n\n\n<p>A major photography site, <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/millions-affected-by-500px-data-1\/\">500px<\/a>,\nrecently discovered they had suffered a data breach in July of last year. Data\nranging from name and email addresses, to birthdates and user locations, were\ncomprised. While the company did confirm no customer payment data is stored on\ntheir servers, all 15+ million users are receiving a forced password reset to\nensure no further accounts can be compromised. <\/p>\n\n\n\n<h2>Nigerian Scammers Target \u2018Lonely\u2019 Victims<\/h2>\n\n\n\n<p>&nbsp;A recent email\ncampaign by a criminal organization known as <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/the-scarlet-widow-gang-entraps-victims-using-romance-scams\/\">Scarlet\nWidow<\/a> has been focusing on matchmaking sites for people they consider to be\nlonelier, elderly, or divorced. By creating fake profiles and gaining the trust\nof these individuals, the scammers are not only attempting to profit\nfinancially, but also causing emotional harm to already vulnerable people.&nbsp; In some cases these victims have been tricked\ninto sending thousands of dollars in response to false claims of needing\nfinancial assistance, with one victim sending over $500,000 in a single year.<\/p>\n\n\n\n<h2>VFEmail Taken Down by Hackers<\/h2>\n\n\n\n<p>The founder of <a href=\"https:\/\/arstechnica.com\/information-technology\/2019\/02\/catastrophic-hack-on-email-provider-destroys-almost-two-decades-of-data\/?comments=1\">VFEmail<\/a>\nwatched as nearly 20 years-worth of data was destroyed by hackers in an attack\nthat began Monday morning. Just a few hours after servers initially went down,\na Tweet from a company account announced that all of the servers and backups\nhad been formatted by a hacker traced back to Bulgarian hosting services. The\nmotivation for the attack is still unclear, though given the numerous security\nmeasures the hacker successfully bypassed, it appears to have been a\nsignificant effort. <\/p>\n\n\n\n<h2>Urban Electric Scooters Vulnerable to Attacks<\/h2>\n\n\n\n<p>With the introduction of <a href=\"https:\/\/www.zdnet.com\/article\/xiaomi-electric-scooters-vulnerable-to-remote-hijacking\/\">electric\nscooters<\/a> to many major cities, some are curious about the security measures\nkeeping customers safe. One researcher was able to wirelessly hack into a\nscooter from up to 100 yards and use his control to brake or accelerate the\nscooter at will, leaving the victim in a potentially dangerous situation.\nWithout a proper password authentication system for both the scooter and the\ncorresponding application, anyone can take control of the scooter without\nneeding a password. <\/p>\n\n\n\n<h2>Phishing Campaign Stuffs URL Links with Excessive Characters<\/h2>\n\n\n\n<p>The latest <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/weird-phishing-campaign-uses-links-with-almost-1-000-characters\/\">phishing campaign<\/a> to gain popularity has brought with it a warning about accounts being blacklisted and a confirmation link containing anywhere from 400 to 1,000 characters. Fortunately for observant recipients, the link should immediately look suspicious and serve as an example of the importance of checking a URL before clicking on any links. <\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Popular Photography Site Breached A major photography site, 500px, recently discovered they had suffered a data breach in July of last year. Data ranging from name and email addresses, to birthdates and user locations, were comprised. While the company did confirm no customer payment data is stored on their servers, all 15+ million users are [&hellip;]<\/p>\n","protected":false},"author":47,"featured_media":27275,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[22457,21936,23945,21943],"yst_prominent_words":[4953,3881,4983,3769,3493,24139,4933,3713,6779,24137,24133,11051,24135,22441,4417,4371,24141,3927,3989,18327],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/26943"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=26943"}],"version-history":[{"count":2,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/26943\/revisions"}],"predecessor-version":[{"id":26949,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/26943\/revisions\/26949"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/27275"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=26943"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=26943"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=26943"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=26943"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}