recommended reading

Hackers Say ‘Yo, Musk,’ Poison, Cause iPhone Heartbleed Failure

A screenshot of the Yo app on an iPhone.

A screenshot of the Yo app on an iPhone. // Yo

In case you missed our coverage this week in ThreatWatchNextgov’s regularly updated index of cyber breaches: reroutes readers to malware-laced site

Hackers compromised the homepage of the widely read Ziff Davis publication to redirect visitors to other domains that deliver “Caphaw” malicious code, which can overtake a victim’s computer.

Hackers breach Montana government server housing 1.3 million health records

Only about 1 million individuals live in the state. The affected individuals include residents, people who no longer reside in Montana and people who have died.

Syrian Electronic Army strikes Reuters again – this time through third-party advertiser

Articles on the news agency’s site rerouted readers to a message by the pro-Assad group, after the hackers apparently compromised an ad service used by many major news outlets.

Employee iPhones at UK insurance giant suffer Heartbleed failure

A mobile device management system at Aviva was plundered, purportedly by hackers who exploited the Heartbleed vulnerability, although the system provider denies the bug played a role. 

App that simply says Yo now hacked to say a lot more

Georgia Tech students say they can pose as any user -- like a celebrity -- and send the one-word greeting to other, unwitting users. “We can get any Yo user’s phone number (I actually texted the founder, and he called me back.) We can spoof Yos from any users, and we can spam any user with as many Yos as we want. We could also send any Yo user a push notification with any text we want (though we decided not to do that.),” one of the hackers said.

Threatwatch Alert

User accounts compromised

1 Million Online Gaming Accounts Exposed

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.


When you download a report, your information may be shared with the underwriters of that document.