Two separate vulnerabilities have been found in the Trusted Platform Module (TPM) 2.0 that could lead to information disclosure or escalation of privilege. At a basic level, TPM is a hardware-based technology providing secure cryptographic functions to the operating systems on modern computers, making them resistant to tampering. Affecting Revisions 1.59, 1.38 and 1.16 of the module’s reference implementation code, the flaws were first discovered by security researchers at Quarks Lab in November. Earlier this week, the company concluded a coordinated disclosure process with the CERT Coordination Center and Trusted Computing Group (TCG). The latter company is the publisher of the TPM 2.0 Library documentation.
Hackers breached a website that allows people to buy and sell guns, exposing the identities of its users, TechCrunch has learned. The breach exposed reams of sensitive personal data for more than 550,000 users, including customers’ full names, home addresses, email addresses, plaintext passwords and telephone numbers. Also, the stolen data allegedly makes it possible to link a particular person with the sale or purchase of a specific weapon.
MKS Instruments is expecting a 20% hit to quarterly revenue following a ransomware attack that disrupted its supply chain operations in February. The Feb. 3 ransomware attack materially impacted the company’s business systems, disrupting its ability to supply technology for semiconductor manufacturing and advanced electronics, President and CEO John Lee said Tuesday during the company’s quarterly earnings call. The incident also impacted the operation of its photonics and vacuum solutions divisions affecting its ability to process orders, ship products and provide customer service.
The Play ransomware gang has begun to leak data from the City of Oakland, California, that was stolen in a recent cyberattack. The initial data leak consists of a 10GB multi-part RAR archive allegedly containing confidential documents, employee information, passports, and IDs. “Private and personal confidential data, financial information. IDs, passports, employee full info, human rights violation information. For now partially published compressed 10gb,” stated the cybercriminals on their data leak site.
ATMs provide great convenience — but they’re also longtime targets of thieves. Some use skimmers to steal your account number, or stand nearby to rob customers. Now there’s a new kind of ATM fraud — and a warning to watch out if you use the “tap” function on your debit card. The tap feature uses radio waves to access your account — no need to insert your card. But some Chase Bank customers say thieves used the tap feature plus some ordinary glue to steal their money. Pamela Bongiorno shows 7 On Your Side how she got scammed at this ATM. “So I was using the ATM machine on the right hand side,” she said. “My partner was here, the guy next to him was here. I inserted my card, it didn’t work.”
Imane, who asked that her real name not be used for fear of repercussions from city officials, isn’t alone. Every year, thousands of people across Rotterdam are investigated by welfare fraud officers, who search for individuals abusing the system. Since 2017, the city has been using a machine learning algorithm, trained on 12,707 previous investigations, to help it determine whether individuals are likely to commit welfare fraud.