Lostar - Information Security

By Murat Lostar | Information security related news and innovations by Lostar.com

Internet Of Things On Pace To Replace Mobile Phones As Most Connected Device In 2018

• Internet of Things (IoT) sensors and devices are expected to exceed mobile phones as the largest category of connected devices in 2018, growing at a 23% compound annual growth rate (CAGR) from 2015 to 2021.<br>• By 2021 there will be 9B mobile subscriptions, 7.7B mobile broadband subscriptions, and 6.3B …

Internet of Things

Twitter CEO Jack Dorsey's account was compromised by hackers

We suppose it was inevitable, but the latest hacking of a high-profile Twitter account has occurred, and it's hit the company's CEO Jack Dorsey. After the hackers posted a few benign video clips, a tweet went up at 2:50AM ET saying "Hey, its OurMine,we are testing your security" and linking to …

Social Media

Sources: Trump Hotels Breached Again

Banking industry sources tell KrebsOnSecurity that the <b>Trump Hotel Collection</b> — a string of luxury properties tied to business magnate and Republican …

Donald Trump

$10 switches cost Bangladesh’s central bank $81 million

There may be a time and a place for frugality, but not when it comes to bank security. This was made shockingly clear in a case where $10 switches …

Upgrade Coming to Grid Cybersecurity in U.S.

The hackers who unplugged 225,000 people from the Ukrainian electricity grid in December—the first confirmed cyber-takedown of a power system—have …

429 Calm down

If malware that holds the files on your computer to ransom isn’t bad enough, news that there’s a new variant in the wild that locks down the whole of your computer by taking over the boot process just made the situation a whole lot worse.<p>Called ‘Petya’, the new threat bypasses looking for the most …

Security

Cybersecurity experts warn about ModPOS malware aimed at retailers

Just as millions of Americans are steeling themselves for the holiday shopping season, cybersecurity researchers are warning about a stealthy malware aimed at stealing credit card and debit card numbers from retailers.<p>Cybersecurity firm iSight Partners revealed research about the malware, dubbed …

Cybersecurity

FBI seeks hacker controlling 1.2 billion stolen logins

The FBI believes a single hacker has hold of 1.2 billion internet logins, and EL James fans be warned, he's known as Mr Grey.<p>The logins for sites …

Security

A hacker has allegedly been terrorizing this Illinois family for years

Imagine getting phone calls every hour, all day and night, threatening to kill you and burn your house down.<p>Imagine strangers from all parts of the world calling your phone and visiting your house after they heard you were giving away free Tesla cars.<p>Imagine getting endless food deliveries you …

Security

Why the CIA is smearing Edward Snowden after the Paris attacks

Decent people see tragedy and barbarism when viewing a terrorism attack. American politicians and intelligence officials see something else: opportunity.<p>Bodies were still lying in the streets of Paris when CIA operatives began exploiting the resulting fear and anger to advance long-standing …

National Security Agency (NSA)

25-GPU cluster cracks every standard Windows password in <6 hours | Ars Technica

All your passwords are belong to us.<p>A password-cracking expert has unveiled a computer cluster that can cycle through as many as 350 billion guesses …

Apple already blocked the first malware for non-jailbroken iPhones

With certain exceptions, most iOS-focused malware targets jailbroken devices whose compromised security makes them easy prey. However, there's been concerns that a recent strain of malware, YiSpecter, can attack even 'pure' devices running stock iOS. Do you have to worry about catching a bug online …

iOS

10 cutting-edge security threats

Ker-Ching: One Group of Hackers Was Apparently Making $30 Million a Year

That’s a serious payday.<p>Even the biggest fish in cybercrime have to raise their eyebrows at this one: Security researchers say they've found proof that a hacker or group of hackers is making $30 million a year from their operation.<p>Cybersecurity company Cisco announced today that had traced use of …

Information Security

"SANS ThreatConnect DFIR Threat Intelligence Sharing Community Announced"

ARLINGTON, Va.-(BUSINESS WIRE)-ThreatConnect Inc., creator of the most widely adopted Threat Intelligence Platform (TIP), today announceda …

Security

Blackphone 2 protects you from snooping governments and hackers

You're alone at a decrepit bus stop, just outside of town. Rain is pouring, and you're waiting. Finally, your phone buzzes: It's the coordinates. Next to the rows of numbers you're supposed to permanently implant in your brain is a fiery icon and a warning: This message will self-destruct in one …

Phones

One billion Android smartphones can be hacked with just a song

Second coming of Stagefright vulnerability discovered by researchers can infect almost every Android smartphone on the planet<p>A billion Android smartphones and tablets are at risk from a new bug that can infect devices when they preview audio or video files, a team of security experts have …

Information Security

HP to use Professor Sal Stolfo's host-based defense technology for embedded devices

Computer Science Professor Sal Stolfo and his former student Ang Cui PhD'15, whose cybersecurity research has discovered dozens of serious flaws, …

Hackers sent Hillary Clinton fake speeding tickets to access her email account

Hackers with links to Russia reportedly attempted to break into Hillary Clinton's personal email account on five occasions when she was secretary of …

Shifu banking trojan is officially spreading to the UK

The researchers at Security Intelligence announced that Shifu banking trojan is officially spreading to the UK targeting Banks and Wealth Management …

Your New Credit Card Security Measure Is…A Selfie?

America is switching over to chip-based credit cards. And this means big, big changes for credit card security.<p>If you’re an American with a credit card, the odds are good you received a replacement card in the mail lately. These cards, with an embedded chip inside referred to as an EMV, are part of …

Banking

Experian shares fall sharply after T-Mobile data breach

The stock tumbled after it emerged that the personal details of 15 million customers were hacked<p>Experian, the world’s biggest consumer credit monitoring firm, is poised for its worst trading session in 18 months after it revealed a massive data breach on Thursday night.<p>Almost 15 million people, …

Identity Theft

Hackers steal 5.6 million fingerprints of U.S. government workers

Chinese President Xi Jinping comes to the U.S. this week to speak to President Obama about cyberespionage, something China has repeatedly been …

Five things to know to avoid getting hacked

Cyber attacks are now so common that many people are desensitized about the danger of their personal data falling in the hands of criminals.<p>That’s …

Apple removes apps after App Store hit with first major malware attack

Dozens of iOS apps in Apple's App Store were infected with malware in recent days, including hugely popular Chinese social networking apps, in what appears to be the first major case of hackers breaching Apple's highly controlled mobile software ecosystem.<p>Apple said Sunday it had removed apps from …

Information Security

Three types of cybersecurity threats (and two employees) to worry about most

ASPEN, Colo.—For corporations, the cybersecurity landscape has changed. The threats are coming from new places. They're aiming at different targets. …

75% of employees want HR more involved in information security

Three quarters of employees see information security as an HR issue and want companies to develop better personnel policies to help safeguard private …

A Russian hacker just admitted his role in the largest known data breach the US ever prosecuted

The Department of Justice announced on Tuesday that a Russian national admitted his role in the largest known data breach conspiracy prosecuted within the US.<p>According to prosecutors, 34-year-old Vladimir Drinkman admitted to participating in a "worldwide hacking and data breach scheme that …

Security