Krause said giving apps access to the camera will let them take images without your consent, record you at any time, and upload the footage to a company server.
Experts from cyber firm Check Point, who dubbed the flaws "HomeHack", were able to use the flaws to take control of LG user accounts which, by extension, gave them access.
The revelations come amid the ongoing multiple congressional investigations into Russian interference in the 2016 election and alleged ties between Trump's team and Russia.
The scam involves hackers tricking victims into divulging their wallet account passwords, which they would then use to clear out the victims' wallets.
Dark web vendors are selling credentials to hacked Remote Desktop Protocol (RDP) servers, which allow hackers to spy on and steal data from companies, without using malware.
The news comes nearly a year after disclosures from the Panama Papers shook the global political elite and triggered investigations into prominent figures worldwide.
The data of Tarte Cosmetics' customers was left publicly exposed via two unsecured MongoDB databases, which were later accessed by the Cru3lty ransomware gang.
The hackers reportedly had control over Coinhive's domain name for around six hours.
The botnet has now been christened "Reaper" and is said to be expanding at a rapid pace, using unpatched vulnerabilities to infect millions of devices.
According to Group-IB, a cybersecurity firm, the virus now spreading is dubbed "BadRabbit" and is a form of ransomware that locks down machines and demands bitcoin.
The malware is capable of stealing victims' contacts, reading and sending SMS messages and locking out users from accessing their phones.
The London Bridge Plastic Surgery confirmed the hack and the data theft, adding that it is still working on determining what kind of data was compromised.
So far, the ongoing FBI investigation has resulted in three cases against defendants across the US.
NCSC head Ciaran Martin confirmed that "hostile" nation-state hackers had hit Northern Ireland infrastructure in "significant" attacks.
Experts from ESET, a Slovakian antivirus company, said this week (23 October) that both Google and the real Poloniex crypto exchange have been notified.
The Anonymous group is known to use distributed denial of service (DDoS) cyberattacks in order to overwhelm website servers with traffic and force them offline.
The two-page file, lifted from the conference's website, was created on 4 October and researchers from Cisco Talos said attacks peaked three days later.
The DHS and FBI said in a joint report that the threat actors are "actively pursuing their ultimate objectives over a long-term campaign".
Hackers infected the installers of the Eltima Player and Folx apps with the Proton malware, which in turn was downloaded by unsuspecting users.
Pompeo said "the world has moved" and pledged that the CIA will now refine how it works to combat "non-state threats" and "state intelligence adversaries."
Research suggested that the new botnet is evolving at a rapid pace, and could soon be weaponised to launch cyberattacks in the same fashion as "Mirai" last year.
The programme encourages researchers to scour for bugs in select popular apps created by Google as well as third-party developers,
"According to our intelligence services, the Russian government has made a project of turning Americans against each other," Bush said.
The zero-day vulnerability, which was previously exploited by the BlackOasis group, was made public and patched on 16 October.
Malaysian technology website Lowyat reported that the files were offered for sale by an unknown user of its forums.
Don Meij insisted that the firm does not store credit card information on its systems and stressed: "No financial data was accessed in this incident."
The leaked records contained citizen ID numbers, names, genders, martial statuses, home ownership information, employment details and income data.
The hacker group has been active since 2014 and is particularly interested in naval industries, primarily focusing on targets in the US, Western Europe and the South China Sea.
Ad buyers can choose the demography, what apps they want to cover, and the location that they want their ads to appear in.
Symantec researchers said these infected apps were downloaded between 600,000 and 2.6 million times.