David Booth

5,554 Flips | 2 Magazines | 9 Likes | 3 Following | 427 Followers | @EssentialSecure | Keep up with David Booth on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “David Booth”

It costs only $1,000 for someone to track your every move

Research from the University of Washington shows how anyone can track what apps you use and where you’ve been — for just $1,000.<p>A team of computer …

The difference between cybersecurity and cybercrime, and why it matters

A Texas woman in her 50s, let’s call her “Amy,” met a man online calling himself “Charlie.” Amy, who lived in Texas, was in a bad marriage. Charlie …

South Africa’s biggest data breach affects over 30 million citizens — and nobody knows where it came from

“They’ve [Dracore] fucked up in a seriously large scale here. They’ve collected an enormous volume of data and I’m not sure the owners of that data ever gave their consent. That may still be legal, but the backlash will be severe. They then published that data to a web server with absolutely zero …

The KRACK Wi-Fi vulnerability, explained like you're five

Yesterday, we learned about KRACK (or Key Reinstallation Attack) – a security flaw in the WPA2 protocol, which could see an adversary break the encryption between a router and a device, allowing them to intercept and interfere with network traffic. Or, more succinctly, shit’s fucked.<p>But …

How Israel Caught Russian Hackers Scouring the World for U.S. Secrets

It was a case of spies watching spies watching spies: Israeli intelligence officers looked on in real time as Russian government hackers searched computers around the world for the code names of American intelligence programs.<p>What gave the Russian hacking, detected more than two years ago, such …

Cybersecurity

Australia launches critical infrastructure security reforms

Part 1: find out who owns what. Part 2: get them to take security seriously ... or elseSysadmin-in-chief of Australia's telecommunications industry, …

Cybersecurity

Computer virus hits US Predator and Reaper drone fleet

A computer virus has infected the cockpits of America's Predator and Reaper …<p>A computer virus has infected the cockpits of America’s Predator and …

'The nail in the coffin': Russia's top cyber firm may have made a 'catastrophic' mistake

Investigators believe that software from Russia's top cybersecurity firm, Kaspersky Lab, was involved in a theft of top-secret National Security Agency intelligence outlining how the US hacks its adversaries, The Wall Street Journal reported Thursday .<p>And depending on what was stolen, the breach …

Kaspersky Lab

The NSA Officially Has a Rogue Contractor Problem

The NSA is one of the world's most notoriously secretive and powerful government agencies, guarding its powerful hacking tools and massive caches of …

Russia just gave North Korea's internet a big boost

As the U.S. cracks down on North Korea, Russia is giving the rogue state a cyber lifeline.<p>Russian state-owned company TransTeleCom has provided a new internet connection to Kim Jong Un's regime, according to North Korea monitoring project 38 North. Cybersecurity experts have also confirmed the new …

North Korea

US pressured North Korea by overwhelming hackers with data traffic

The US is no stranger to hacking North Korea, but it's usually in a bid to directly thwart the country's military ambitions. Now, however, those attacks are being used as a diplomatic strategy. The <i>Washington Post</i> has learned that President Trump ordered a broad pressure campaign against North Korea …

Hackers Found a New Way to Rip Off ATMs

Ripping the faces off ATMs and injecting them with malware is great fun, sure, but not so much when you get caught by a security guard and tossed in …

State-backed Iranian hackers target aviation sector

The cyber-espionage group, known as APT 33, seems to be gathering intelligence on Saudi Arabia, its main rival in the Gulf.<p>Hackers who compromised a …

Wikileaks releases documents it claims detail Russia mass surveillance apparatus

Wikileaks has released a new cache of documents which it claims detail surveillance apparatus used by the Russian state to spy on Internet and mobile users. It’s the first time the organization has leaked (what it claims is) material directly pertaining to the Russian state.<p>As ever, nothing is …

EU war game simulates cyber attack on military operations

News Defence ministers gather in Estonia to test their ability to handle computer threats

Cybersecurity

Hackers lie in wait after penetrating US and Europe power grid networks

Intrusion into power companies' operational networks is a dramatic escalation.<p>Nation-sponsored hackers have penetrated the operational networks …

Albert Lim on LinkedIn: “The very much touted Estonian…

The very much touted Estonian digital ID system is now facing possible security risk affecting all its users. Despite a reassuring message by its …

Russian Election Hacking Efforts, Wider Than Previously Known, Draw Little Scrutiny

The calls started flooding in from hundreds of irate North Carolina voters just after 7 a.m. on Election Day last November.<p>Dozens were told they were ineligible to vote and were turned away at the polls, even when they displayed current registration cards. Others were sent from one polling place to …

Here’s how cyber criminals can target you in the real world

Hackers can get into your office using something as simple as a felt-tip pen.<p>Hacking isn't always digital; it can be physical, too. Your company could be attacked via a USB stick dropped in the lobby, a fake inspector, or even a felt-tip pen.<p>NCC Group's penetration testing team used what it calls …

Cybersecurity firm says Russian hacking group using new malware tool

A longstanding hacking group believed to be Russian intelligence is focusing on southeast European and former Soviet bloc political targets with a …

Spyware deployed in state-sponsored attacks against India and Pakistan

Security researchers have detected a state-sponsored spyware campaign that's leveraging the Ehdoor backdoor to target entities in India and …

One of 1st-known Android DDoS malware infects phones in 100 countries

Move over, IoT. Attackers are abusing a new widely used platform to knock out sites.<p>Last year, a series of record-setting attacks hitting sites …

Police Are Warning Against This Scary New Phone Scam

Earlier this month security experts warned of a highly effective phishing email that fooled many Gmail customers into divulging their login …

9/11 Level Cyber Attack Imminent: Warns President Trump’s National Infrastructure Advisory Council

President Trump’s National Infrastructure Advisory Council (NIAC) releases a report to the U.S. National Security Council (NSC) warning of an …

CIA uses a secret tool to spy on NSA, FBI and other intel partners

Apparently, nobody's exempt from the CIA's intelligence gathering, not even its own intelligence partners. According to a set of documents published by WikiLeaks, the CIA uses a tool called "ExpressLane" that hides behind a fake software update to collect information from agencies around the world …

All the Ways US Government Cybersecurity Falls Flat

Data breaches and hacks of US government networks, once novel and shocking, have become a problematic fact of life over the past few years. So it …

90% of Companies Get Attacked with Three-Year-Old Vulnerabilities

A Fortinet report released this week highlights the importance of keeping secure systems up to date, or at least a few cycles off the main release, …

New NIST draft embeds privacy into US govt security for the first time

Federal agency addresses the new world of Alexa, smart cameras and IoTA draft of new IT security measures by the US National Institute of Standards …

Petya ransomware: Cyberattack costs could hit $300m for shipping giant Maersk

June's cyberattack will cost the international shipping firm hundreds of millions of dollars in lost revenue.<p>Falling victim to the global Petya …

North Korea Hacking: US Defense Contractors Targeted By Hacking Group

Hackers with believed ties to the North Korean government have taken to targeting defense contractors working with the United States government, …