Ronnie Vink

84 Flips | 1 Magazine | 1 Follower | @ronnievink2014 | Keep up with Ronnie Vink on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Ronnie Vink”

Emulating and Exploiting Firmware binaries

This is the third post in the “Offensive IoT Exploitation” blog post series. In the previous one, we learned about how we can get started with …

Linux malware enslaves Raspberry Pi to mine cryptocurrency

It's time to update your Raspberry Pi devices or risk them being infected with cryptocurrency mining malware.<p>Someone has developed a simple Linux …

Raspberry Pi

A malware is masquerading in the form of a PowerPoint file through dodgy e-mails

Users do not even have to click on the link to execute the malicious code.<p>A newly discovered malware infection is masquerading in the form of a …

56 Out of 100 Employees at This Firm Failed a Ransomware 'Phishing' Test

How would your employees do?<p>By now, you're familiar with the giant ransomware attacks that have been hammering companies around the world and caused countless interruptions in business and services, including a shutdown of the U.K.'s national health system.<p>If not, a quick ransomware recap: it's a …

Employment

Verizon Says Phishing Still Drives 90% of Cybersecurity Breaches

Verizon’s analysis of 1600 cybersecurity incidents and 800 breaches found that phishing was involved in 90% of successful attacks. Despite years of …

Cybersecurity

Patches Available for Linux Sudo Vulnerability

A high-severity vulnerability in sudo has been patched in a number of Linux distributions; the flaw allows local attackers to elevate privileges to …

CryptoNote Currency Bug Allowed Creation of Unlimited Number of Coins

Advertisement<p>Recently, the team behind Monero (XMR), the anonymous cryptocurrency that saw its price surge after darknet market AlphaBay started …

Cryptocurrency

British Airways aims to resume flights after major IT failure saw systems crash across the world and caused travel chaos in airports

A GLOBAL computer crash grounded British Airways flights from Heathrow and Gatwick airports — sparking chaos for 200,000 holidaymakers.<p>The airline's …

404 Page

Explore Opportunity<p>Internet researchers can work as Independent Research Consultants or with individuals or companies to gather, synthesize and …

You've been hacked

Cyberattacks cost Canadian companies billions of dollars each year in cleanup costs. So why aren't more of them trying to prevent breaches in the first place? Here's a crash course in the mysterious, frightening, sometimes arcane, but absolutely vital world of penetration testing<p>In early March, an …

With one year to go, UK firms have no time to waste in preparing for the GDPR

The General Data Protection Regulation (GDPR) is the biggest change to data protection law in a generation.<p>While it builds on the previous …

Data Protection

One year until The EU General Data Protection Regulation (GDPR): The business world speaks out about the biggest ever overhaul of data legislation

Exactly one year from today, “the most lobbied piece of legislation in history” – the EU’s General Data Protection Regulation (GDPR) – will be …

GDPR

Attackers exploited SS7 flaws to empty Germans' bank accounts

Cyber criminals have started exploiting a long-known security vulnerabilities in the SS7 protocols to bypass German banks’ two-factor authentication …

Information Security

Cyberspies tap free tools to build powerful malware framework

Over the past year, a group of attackers has managed to infect hundreds of computers belonging to government agencies with a malware framework …

How to remote hijack computers using Intel's insecure chips: Just use an empty login string

<b>Code dive</b> Exploit to pwn systems using vPro and AMTYou can remotely commandeer and control computers that use vulnerable Intel chipsets by sending …

Cybercrime on the high seas: the new threat facing billionaire superyacht owners

Buyers at London superyacht conference shown the ease with which hackers can take control of vessels – and even procure private photos<p>Within a few hours of mooring up and opening his laptop, Campbell Murray had taken complete control of a nearby multimillion-dollar superyacht.<p>He could easily have …

superrich

How the Dun & Bradstreet Hack Increases Small Business Spear Phishing Risk

Dun & Bradstreet was hacked. So what? Lots of businesses are hacked. Why should I care about yet another cybersecurity breach? Well, this one very …

Spearphishing

Over Half of Businesses Paying Ransomware Ransoms May Not Be Getting Their Data Back

If you don't protect your data it could be gone forever - even if you pay a ransom.<p>Ransomware is a form of cyber-attack in which criminals install malware (or trick victims into installing malware) on someone's computer that prevents the victim from accessing his or her files until he or she pays a …

systemssecurity

HideMyAss! privilege escalation flaws exposed

Updated: The researcher on the case says the VPN provider will not be fixing them.<p>A set of serious security flaws in the HideMyAss! proxy service …

Information Security

Behold, the spear phish that just might be good enough to hook you

Attackers are coming up with creative ways to trick you into opening malicious files.<p>To understand why Carbanak is one of the Internet's most skilled …

Bank data breaches are up, and it's an insider job

<i>This story was delivered to BI Intelligence "Fintech Briefing" subscribers. To learn more and subscribe, please click here.</i><p>There have been many high-profile bank breaches in the news of late, and much of the blame has been laid on these institutions' legacy operating systems, and their inability to …

Shodan can now find malware command and control servers

Over 3,000 command and control servers serving ten remote access trojans have been found already.<p>Finding the servers that control botnets is about to …

Information Security

Yikes! Antivirus Software Fails Basic Security Tests

Suppose that you're a feudal lord, riding high on the hog of exploiting your multitudinous peasants. You’ve done so well that you’ve built a castle, …

Information Systems

Cyber Security Marketing Tactics That Actually Work

Whether you want to attribute it to the rise of interconnected devices in the IoT revolution or just the growing instances of cybercrime, the cyber …

Data breaches cost US businesses an average of $7 million — here’s the breakdown

This post is sponsored by Dell Technologies and Intel® - partners in hardware-enabled security solutions. Intel Inside®. Powerful Productivity Outside. Learn more at delltechnologies.com.<p>The impact of cyber threats is rising in the US, with the average cost of a data breach now over $7 million …

Capture the Flag: It's a game for hack...I mean security professionals

Last weekend I attended BSides Iowa, a smaller security conference taking place in Des Moines, and competed in my first capture the flag competition …

PassFreely Attack Bypasses Oracle Database Authentication

Equation Group Exploit Could Potentially Target More Than SWIFT Users Mathew J. Schwartz (euroinfosec) • April 26, 2017<p>Warning: A dumped Equation …

Information Security

XMR Squad Is Charging German Companies €250 for "DDoS Tests"

A group calling itself XMR Squad has spent all last week launching DDoS attacks against German businesses and then contacting the same companies to …

'Nederland staat in Europese top drie van ransomware-infecties'

Beveiligingsbedrijf Symantec heeft zijn jaarlijkse 'Internet Security Threat'-rapport uitgebracht. Daarin schrijft het dat Nederland in Europa op de …

As Dubai focuses on future, cybersecurity a growing concern

DUBAI, United Arab Emirates (AP) — As Dubai races toward a future of self-driving cars and drones filling up its high-rise-studded skyline, …