Graphus

1,494 Flips | 1 Magazine | 1,587 Followers | @GraphusInc | CyberSecurity 

Endpoint security is only one piece of the puzzle

Like many of you, I attended RSAC in February. Wading through the crowd of more than 43,000 people, I was interested to see how many new and improved …

Operating Systems

Tens of millions of hacked Gmail and Yahoo email accounts are being sold on the dark web

Over 25 million Gmail and Yahoo accounts are being sold online, according to a new report.<p>They’re available for purchase on the dark web, with the …

How to keep hackers out of your smart devices

These days, we have to give internet connectivity to things we didn’t even know needed to get online. With such rapidly growing networks of “smart” …

Wildfire ransomware code cracked: Victims can now unlock encrypted files for free

Victims of a ransomware campaign aimed at Dutch speakers don't have to pay hackers after the No More Ransom project cracked its cipher.<p>Victims of the …

NSA Targeted Chinese Firewall Maker Huawei, Leaked Documents Suggest

American companies like Cisco, Fortinet and Juniper weren’t the only hacking targets revealed in the Shadow Brokers’ dump.<p>When the mysterious Shadow Brokers dumped a cache of hacking tools used by an NSA-linked group last week, researchers quickly identified a number of the spy agencies' targets, …

FBI investigating cyberattack on New York Times in Moscow

Hackers suspected to be working for Russian intelligence agencies have targeted a number of US news outlets, including the New York Times, according …

Hacking

Over 25 million accounts stolen after Mail.ru forums hacked

Two hackers were able to steal email addresses and easily crackable passwords from three separate forums in this latest hack.<p>Over 25 million accounts …

How Bitcoin helped fuel an explosion in ransomware attacks

Secure payment system Bitcoin has many legitimate uses, but like other technologies, it's also been beneficial to cybercriminals seeking new ways to …

Now WikiLeaks is distributing malware

Author:<p>Published<p>in Link list, Malware 6<p>Veteran anti-virus researcher Vesselin Bontchev has discovered that there are thousands of samples of malware …

Jonathan Aberman: The one void that could slow our cybersecurity dreams

By Jonathan Aberman<p>More and more people agree: cybersecurity is in our region’s DNA and can continue to be a boom for greater Washington.<p>But venture capital is pivotal in providing the accelerant for rapid growth of technology companies, and it I fear that the lack of sufficient risk capital is …

Venture Capital

How adware invades your computer and steals your personal data

It's happened to everyone: You go to download some kind of new software, and before you do, a long list of terms and conditions in tiny font pops up. …

Malware attacks on businesses are down – but it's no time to be complacent

Check Point has released its latest threat intelligence report on malware which is targeting businesses, and the good news is that the overall level …

Cybersecurity

Darknet: Where Your Stolen Identity Goes to Live

Almost everything is available on the Darknet -- drugs, weapons, and child pornography -- but where it really excels is as an educational channel for …

Identity Theft

Shopped in an Eddie Bauer store recently? Your card's probably gone. It's just gone

Clothing chain Eddie Bauer has admitted the payment terminals in more than 350 of its stores have been siphoning customers' bank card details to …

Identity Theft

Cybersecurity Is Broken And The Hacks Are Going To Just Keep Coming

“No one in the industry is incentivized to actually fix it.”<p>LAS VEGAS — The three CEOs sharing fruity cocktails are at the head of cybersecurity companies that bring in roughly $2 billion a year. But despite all the money their companies’ services bring annually, not one of them blinked an eye when …

How the NSA got hacked

On Monday, a group of hackers dubbing themselves the Shadow Brokers took to the web with an audacious offer: For 1 million bitcoin, they would hand …

'Massive' Locky ransomware campaign targets hospitals

FireEye researchers have spotted a surge in cyberattacks on hospitals in the US -- and they're using a new infection technique.<p>A massive …

The NSA's hoard of cyber weapons makes some experts nervous

The disclosure this week of a cache of files supposedly stolen from the National Security Agency has put a spotlight on secret cyber weapons the NSA has been holding -- and whether they should be disclosed.<p>Security researchers have been poring over a sample set of hacking tools that may have been …

Banking system SWIFT was anything but on security, ex-boss claims

You'd think, with the amount of money the SWIFT inter-bank payment system transfers every day, that the group would be strong on security. Not so, …

San Francisco

Dridex Returns To Action For Smaller, More Targeted Attacks

Cerber ransomware operation exposed... and boy is it lucrative!

Affiliate system makes Cerber one of the most lucrative RaaS platforms in the world<p>Author:<p>Published<p>in Malware, Ransomware, Vulnerability 1<p>Researchers …

Shark bosses sink teeth into booming ransomware market

If Cerber can do it...Cybercrooks are harnessing the “ransomware-as-a-Service” (RaaS) business model to mount a new scam.

Ransomware

Hackers Use Google’s Ad Network To Spread “Fake Login” Malware

So-called “overlay malware,” which impersonates other apps’ login screens, is becoming increasingly prevalent.<p>For years, security firms have warned of keystroke logging malware that surreptitiously steals usernames and passwords on desktop and laptop computers.<p>In the past year, a similar threat has …

Apps

Tech support scammers mess with hacker's mother, so he retaliated with ransomware

Vengeful security boffin Ivan Kwiatkowski has infected the computer of an Indian tech support scammer with the Locky ransomware.<p>Kwiatkowski inflicted …

Ransomware

Linux flaw puts 1.4 billion Android devices at risk of spying attack, experts warn

A Linux flaw that lets attackers hijack internet traffic also affects nearly 80 percent of Android devices, security researchers warned this week.<p>Mobile security company Lookout reports that the recently discovered Linux flaw could impact around 1.4 billion Android devices. “The vulnerability lets …

A hacker only needs 25 minutes to break into your organization’s computer systems, report finds

Let’s say there’s a hacker who wants to worm his or her way into your organization’s computer systems. How long, on average, would it take for the …

Hackers Say They Hacked NSA-Linked Group, Want 1 Million Bitcoins to Share More

A mysterious group claims to have stolen some hacking tools allegedly belonging to the NSA.<p>A mysterious hacker or hackers going by the name "The Shadow Brokers" claims to have hacked a group linked to the NSA and dumped a bunch of its hacking tools. In a bizarre twist, the hackers are also asking …

Wikileaks Published Dozens of Malware Links in Email Dump

WikiLeaks published more than 80 variants of malware in the second email dump from Turkey’s ruling political party (AKP), according to anti-virus …