Thursday, May 26, 2016
Hire a DDoS Attack for as Little as Five Dollars
Hire a DDoS Attack for as Little as Five Dollars: Some DDoS attacks are small, some are large, and some cost as little as five dollars...
Wednesday, May 25, 2016
DMA Locker’s Latest Updates Improve Ransomware’s Maturity
DMA Locker’s Latest Updates Improve Ransomware’s Maturity: The malware authors behind DMA Locker have outfitted the ransomware with numerous updates that advance its maturity.[...]
Monday, May 23, 2016
Japan to Form New Cybersecurity Agency to Protect Its Critical Infrastructure
Japan to Form New Cybersecurity Agency to Protect Its Critical Infrastructure: Japanese officials plan to create a new agency tasked with protecting the country’s critical infrastructure prior to hosting the 2020 Tokyo Olympics.
Currently named the “Industrial Cybersecurity Promotion Agency” (ICPA), the envisaged public-private sector body would lead the development of human resources, including recruiting “white hat hackers” and conducting research.[...]
Currently named the “Industrial Cybersecurity Promotion Agency” (ICPA), the envisaged public-private sector body would lead the development of human resources, including recruiting “white hat hackers” and conducting research.[...]
Japanese Convenience Store ATM Heist Nabs $13M
Japanese Convenience Store ATM Heist Nabs $13M: Officials are investigating the theft of 1.4 billion yen (close to $13 million) in a heist that targeted 1,400 ATM machines across Japan earlier this month.[...]
Sunday, May 22, 2016
Gang Surrenders Key to TeslaCrypt Ransomware Kingdom
Gang Surrenders Key to TeslaCrypt Ransomware Kingdom.
Eset on Wednesday announced that it has fashioned a free tool that victims of all variants of the TeslaCrypt ransomware can use to unlock affected files.
After the criminal gang behind TeslaCrypt recently abandoned support of the malicious software, an Eset analyst contacted the group anonymously, using the channel TeslaCrypt's operators offered to ransomware victims, and asked for the universal master decryption key, the company said.[....]
Flaw Puts a Billion Wireless Mice at Risk
Flaw Puts a Billion Wireless Mice at Risk.
Wireless mice and keyboards are the perfect accessories for a world in which devices increasingly are shuffling off their connection coils, but those accessories -- especially untethered rodents -- also can create new threats for those who use them.
One such threat is Mousejack. The attack exploits a vulnerability found in 80 percent of wireless mice. With US$15 worth of off-the-shelf hardware and a few lines of simple code, a wireless mouse can be turned into a hacker's portal for all kinds of mischief[...]
Saturday, May 21, 2016
Social Media, Mobile Prove Too Much for Compliance Officers
Social Media, Mobile Prove Too Much for Compliance Officers: 40% of survey respondents believe too many or way too many messages are flagged for their review as part of the supervision process.
Japan to Form New Cybersecurity Agency to Protect Its Critical Infrastructure
Japan to Form New Cybersecurity Agency to Protect Its Critical Infrastructure: Japanese officials plan to create a new agency tasked with protecting the country’s critical infrastructure prior to hosting the 2020 Tokyo Olympics.
Hacking Team Hacker Steals $11K, Donates It to Rojava Plan
Hacking Team Hacker Steals $11K, Donates It to Rojava Plan: A hacker responsible for the Hacking Team leaks stole approximately US$11,000 in Bitcoin and donated it to the Rojava Plan.
Friday, May 20, 2016
New Decryption Tools Released for TeslaCrypt Ransomware
New Decryption Tools Released for TeslaCrypt Ransomware: Security researchers have released several new decryption tools for TeslaCrypt ransomware following the publication of its master decryption key.
Thursday, May 19, 2016
5 tips for better enterprise security.
Do your security policies and procedures actually promote better security, or is your company only looking for known malware and ignoring the human factor? It’s a tricky balancing act that trips up many organizations.
$7.5M Healthcare Data Breach Settlement for St. Joseph Health
$7.5M Healthcare Data Breach Settlement for St. Joseph Health...
The settlement revolved around a healthcare data breach from 2012 where PHI was made available via internet search engines.
Wednesday, May 18, 2016
Breach at Nulled.io Hacker Forum Exposes Over 500K Registered Users
Breach at Nulled.io Hacker Forum Exposes Over 500K Registered Users: A popular underground hacker forum used by cybercriminals to trade and purchase leaked data, stolen credentials and software cracks was recently breached.
Security Slice: The Zero-Day Arms Race
Security Slice: The Zero-Day Arms Race: According to a recent report by Symantec, attacks exploiting previously unknown (or zero-day) software vulnerabilities more than doubled last year.
Tuesday, May 17, 2016
Malware Links Bangladesh Bank Heist to Sony Hack, Find Researchers
Malware Links Bangladesh Bank Heist to Sony Hack, Find Researchers: Researchers have linked malware behind a heist at the Bangladesh Bank earlier this year to malicious software used in the 2014 Sony hack.
Friday, May 13, 2016
Adobe Patches Yet Another Flash Zero Day
Adobe Patches Yet Another Flash Zero Day: Adobe Patches Yet Another Flash Zero Day. Question marks raised again about software’s usefulness to the enterprise.
Banks on High Alert as Swift Reveals Second Attack
Banks on High Alert as Swift Reveals Second Attack: Banks on High Alert as Swift Reveals Second Attack. Bangladesh Bank hackers suspected of follow-up raid.
Brits Shun Brands Following Breaches
Brits Shun Brands Following Breaches: Brits Shun Brands Following Breaches. FireEye study finds data loss can have serious impact on customer loyalty.
Thursday, May 12, 2016
Monday, May 2, 2016
Banking and Cybersecurity: Can They Help Prevent the Next Terrorist Attack?
Banking and Cybersecurity: Can They Help Prevent the Next Terrorist Attack?: There is a need for banks and government agencies to have an integrated approach to be ahead of criminal minds.
Subscribe to:
Comments (Atom)
LinkedIn users targeted by hacking group
LinkedIn users targeted by hacking group with fake job offers https://t.co/mPKKLqzF5k via @SiliconANGLE
-
Python skills are incredibly useful for all kinds of information security personnel, from pen testers to cyber defenders to forensics pros...
-
All Versions of Windows affected by Critical Security Vulnerability
-
The non-profit organization behind TOR – the largest online anonymity network that allows people to ...