Claudiu Duma

521 Added | 1 Magazine | 5 Likes | 2 Followers | @ClaudiuDuma | Keep up with Claudiu Duma on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Claudiu Duma”

Swedish cyber security slip-up 'a complete failure': PM Stefan Löfven

"What has happened is a complete failure. It is very serious. It was in breach of the law and exposed Sweden and Swedish citizens to harm," Löfven …

Cybersecurity

There's a reason you should be terrified of iris scanners and iPhone facial recognition – but it's not the reason you think

I hate passwords. I forget them, I lose them, I agonise over someone stealing them. At work, I don’t change them when the system prompts me to. I get …

Wells Fargo accidentally leaks 1.4 gigabytes of information on high net worth clients

The latest high profile leak to make headlines wasn’t the result of an attack, a security breach, or even a bug. Rather, the leak of thousands of …

Finance

$20 antennas can now help breach 256-bit encryption standards

Security researchers have devised a method of defeating AES-256bit encryption in as little as five minutes, and most importantly, you don’t need an …

Information Systems

How To Steal A Phone Number (And Everything Linked To It)

Someone impersonating you to an AT&T or Verizon employee isn’t the only thing you need to worry about. Meet Signaling System 7, a hacker’s best friend.<p>Last spring, Dena Haritos Tsamitis left a work meeting to discover she was unable to get a signal on her cellphone. Even after rebooting the device, …

Customer Service

Google, Amazon And Deep Instinct Deploy AI To Fight Malware

Deep Instinct co-founder and Chief Technology Officer Eli David says the day when a computer is as smart as a human, or smarter, may be a lot closer than many think.<p>AI programs, “are on an accelerating path of growth in their capabilities. In the near future, they will reach near human or …

Artificial Intelligence

Kaspersky digs deep into North Koreas Lazarus Group

The Lazarus Group’s activity spans multiple years, going back as far as 2009. Its malware has been found in many serious cyberattacks, such as the …

North Korea

Cyber Firms Behaving Badly

<i>A version of this post originally appeared in the Cyber Saturday edition of Data Sheet,</i> Fortune<i>’s</i> <i>daily tech newsletter.</i><p>It’s been a rough week for two …

Cybersecurity

These Are 10 Cybersecurity Myths That Must Be Busted

Cybersecurity was huge in 2016. From ransomware to weaponized Internet of Things (IoT) devices to foreign hacking of elections – last year saw it all. But many of these threats aren’t new and will never really go away. Over the last 25 years, one of the most valuable things I’ve learned in …

Cybersecurity
Faceted Classification

Search the world's largest cybercrime library

The UN Cybersecurity Repository is a massive index of cyber-criminal case law and lessons learned used to train law enforcement officers, …

Cybersecurity

Two-factor authentication: How and why to use it

Find out how two-factor authentication works, why you should use it and how to set it up<p>You might not realize it, but you regularly use two-factor authentication. When you swipe your debit card and are asked to enter your PIN code or write a check and are asked to show your driver's license? Each …

Information Systems

What keeps cybersecurity experts up at night?

For Passcode’s last Influencers Poll, we asked an open-ended question: What’s the most urgent cybersecurity or privacy challenge right now, and …

Cybersecurity

RDP hijacking — how to hijack RDS and RemoteApp sessions transparently to move through an organisation

How you can very easily use Remote Desktop Services to gain lateral movement through a network, using no external software — and how to defend …

Russian hackers targeted just one Yahoo employee in order to breach 500M accounts

More details about the activities that led to one of the biggest data breaches in history are coming to light now that the Department of Justice has indicted four suspects for the 2014 Yahoo hack that affected more than 500 million accounts. An early report revealed how Russian spy operatives and …

U.S. Department of Justice

Russian hackers targeted just one Yahoo employee in order to breach 500M accounts

More details about the activities that led to one of the biggest data breaches in history are coming to light now that the Department of Justice has …

This is how Russian hackers broke into millions of Yahoo accounts without passwords, according to the FBI

You can read the announcement of the indictment here.<p>The breach involved more than 500 million stolen Yahoo accounts, representing one of the biggest hacks of all time.<p>So how did the hackers do it?<p>Essentially, the hackers managed to get hold of a secret directory that contained Yahoo usernames, …

U.S. Department of Justice

Hacker Lexicon: What Is an Attack Surface?

Amid so many recent high-profile hacks and data breaches, security experts are fond of pointing out that there's no such thing as perfect security. …

Understanding the threat from non-malware attacks

Every year seems to be “the year of” <b>something</b> in cybersecurity. For example, in 2013, it was “the year of the financial breach.” In 2014, the “year …

Cybersecurity

Hunting the DNC hackers: how Crowdstrike found proof Russia hacked the Democrats

Dmitri Alperovitch says there are two types of organisations: "Those that know they've been hacked, and those that don't know right now, but have …

Democratic National Committee

20 Video Examples From Cloud Security Solution, Services & Softwares

Cloud has given us the freedom and flexibility to work the way we want. For IT and network administrators the management of cloud environments to …

Videography

AWS blames a typo for Tuesday?s outage

Amazon Web Services said today its outage earlier this week that affected major websites and apps was caused by human error. Sites including Netflix, …

Cloud Computing

What You Can Learn About Getting Hacked From a Tiny Pie Shop in Missouri | Inc.com

Rebecca Miller of Peggy Jean's Pies, a bakery in Columbia, Missouri, woke up one morning last summer to a less-than-sweet surprise: Online searches for her shop's website were leading potential customers to an X-rated destination. "Not just porn--like, capital <i>P</i> porn," recalls Miller, a former …

Cybersecurity

How Bad Was CloudBleed? 1.2 Million Leaks Bad

Over the last few days, Cloudflare has been assessing the damage of the now-infamous CloudBleed bug that leaked memory from web servers across the internet. The numbers indicate a startling amount of data leakage, a sign that the vulnerability really was as nasty as Google researcher Tavis Ormandy …

Security

Yep, Amazon Broke The Internet on Tuesday, And Here's Why That's a Big Problem

Even "Is It Down Right Now?" went down.<p>A massive internet outage that took down thousands of popular websites on Tuesday was thanks to a technical …

Cloud Computing

Here's What You Need to Know About The Massive 'Cloudbleed' Data Breach

Now's a good time to change some passwords.<p>A huge data breach that may have exposed users' private information and log-in details for thousands of …

Security
Information Security

Database Ransom Attacks Have Now Hit MySQL Servers

After the ransacking of MongoDB, ElasticSearch, Hadoop, CouchDB, and Cassandra servers, attackers are now hijacking hundreds of MySQL databases, …

Databases

Removing User Admin Rights Mitigates 94% of All Critical Microsoft Vulnerabilities

Just by preventing access to admin accounts, a system administrator could safeguard all the computers under his watch and prevent attackers from …