CyberSecurity

By shornik | A collection of stories related to technology vulnerabilities, exploits and preventive controls by Dr. Steven Hornik as curated by University of Central Florida Advanced Accounting Information System graduate students.

Cash Converters is HACKED: Cyber criminals hold UK customer credit card numbers, addresses and passwords to ransom after major security breach

• <b>Cash Converts reportedly received an email from hackers behind the attack</b>• <b><br>The affected website was put out of action when it was replaced earlier this</b> …

Analysis: Home Depot Breach Details

sponsored by<p>Why Anti-Virus Didn't Stop POS Malware Attack Mathew J. Schwartz (euroinfosec) • September 16, 2014<p>New allegations have emerged about …

Identity Theft

A rocket scientist hacks the cybersecurity labor crisis

You don't have to be a rocket scientist to fill jobs. But it takes one to figure out how the world will fill its 3.5 million cybersecurity jobs that …

Cybersecurity

Cyber and physical security are inseparable

A comprehensive approach that brings together analyses of people, places and patterns might be the best hope for establishing secure environments – …

Cybersecurity

Blockchain ID Schemes Could Kill the Data Breach, But How Soon?

Awareness of the serious drawbacks of centralized identity services is growing.<p>Spurred by the Equifax breach earlier this year, the problem isn't …

Bitcoin

Scientists testing sweat analysis for cybersecurity authentication

Imagine unlocking your cellphone with a drop of sweat?<p>Dr. Jan Halámek, a biochemist and assistant professor at the University of Albany, and his team …

Aminoacids

Cybersecurity expert claims he was able to hack into a parked Boeing 757

Experts working with Homeland Security remotely hacked into a Boeing 757 parked at a New Jersey airport — stunning a group of pilots who had no idea …

Aviation

Young adults 'putting themselves at fraud risk by sharing details online'

Young adults' willingness to share personal information with others online could be putting them at greater risk of fraud, a report warns.<p>While older …

Birmingham, UK

Atlanta cybercrime experts investigating Equifax hack

Cybercrime teams share insights about the difficulties of cybercrime cases

Security

New Research Confirms that the Cybersecurity Skills Shortage as an Existential Threat

I’ve been writing about the cybersecurity skills shortage for 7 years, clucking like a digital ‘chicken little’ to anyone who would listen. If you’ve …

Cybersecurity

North Korea cyber attacks will get more destructive, says UK's former top spy - Mirror Online

North Korea will launch more cyber attacks on Britain next year, the UK’s former chief spook has warned.<p>The rogue state has already been blamed for …

North Korea

Are company cars a new target for cyber crime?

<b>The government’s plans to tighten up the law on data protection and stiffen penalties for breaches will have prompted many firms to review their IT</b> …

Cybersecurity

Chrome Has a Malware Problem, and Google Needs to Fix It

Google's Chrome browser has been praised for continuously upgrading its own security. Chrome OS, which is based on the browser, is one of the safest …

Chrome Web Store

Apple FaceID Tricked With $150 Mask

Security researchers have broken Apple's FaceID security system using a mask they said takes around a few days to make and costs only $150.<p>The …

Face ID

Companies turn to AI for Cybersecurity

In our previous report on BlackBerry, we highlighted the major shortage of cybersecurity workforce. A workforce of just 200,000 employees in total, …

Cybersecurity

ADT Expands Cybersecurity Business with Purchase of Datashield

Home and business security giant launches ADT Cybersecurity to offer managed detection and response (MDR) service.<p>Physical security firm ADT today …

Cybersecurity

3D printing presents cyber security risks for aircraft manufacturers, says Atlantic Council report

The Atlantic Council, a Washington, D.C. think-tank has released a new report which outlines the benefits and risks of 3D printing within the …

Cybersecurity

Cyber threats not just aimed at big businesses

For the thousands of small businesses across Central Massachusetts, dealing with the overwhelming issue of cybersecurity might be low on the priority …

Cybersecurity

Cybersecurity firm seemingly dupes iPhone X’s Face ID using cheap mask

There’s absolutely no reason you should go to bed wearing protective facewear of some sort to stay safe from unauthorized iPhone X unlocking …

Cybersecurity

Texas Paid Hundreds of Thousands to Spy on Cellphones With Surveillance Planes

Last year, military surveillance aircraft in Texas were outfitted with devices designed to spy on cellphones, including their location, numbers …

Surveillance

Hackers of top nine countries help Pentagon fix cyber security glitches

The Pentagon has fixed more than 2,800 security problems after hackers from more than 50 countries, responded to the department’s vulnerability …

Cybersecurity

US Government Hacked a 757 on an Airport Runway Without the Pilot Knowing. How Long Before the Hack Is Public?

The U.S. Department of Homeland Security, while in the presence of Boeing officials, remotely hacked a Boeing 757 on the runway at the Atlantic City …

U.S. Government

Huddle's 'highly secure' work tool exposed KPMG and BBC files

Technology reporter<p><b>The BBC has discovered a security flaw in the office collaboration tool Huddle that led to private documents being exposed to unauthorised parties.</b><p>A BBC journalist was inadvertently signed in to a KPMG account, with full access to private financial documents.<p>Huddle is an online …

Security

How Many Ways Might iPhone X's Face ID Go Wrong? | Smartphones

When Apple unveiled its iPhone X on Tuesday, officials highlighted the device's advanced functionality, including what truly could be a game changing …

Face ID

8 Security Tips from the HBGary Hack

Thanks to Ars Technica and H-online.com, we now have intimate details of the Anonymous attack against security research company HBGary. There are no surprises in how the attacks where carried out, but we can draw many morals from the story, even if we've heard them time and time before.<p>Here's an …

Security

New exploit uses antivirus software to help spread malware

One of the most basic rules of safe web browsing is to use antivirus software in order to keep your computer safe. While it’s a good idea to make use …

Malware

Cybersecurity firm claims to have beaten the iPhone X's Face ID technology using a $150 mask

Barely ten days into the market, Apple's flagship smartphone, <b>iPhone X</b>' face recognition technology or the Face ID is being challenged by a …

Face ID

What's Worse for Your Account: a Data Breach or a Phishing Attack?

Google looked at the root causes behind online account hijacking and found phishing attacks and third-party data breaches can pose serious …

Identity Theft

PayPal suspends TIO service due to 'security vulnerabilities'

XPTIO is a public trading company PayPal acquired in July 2017<p>Paypal has announced TIO Networks (TIO), a public trading company PayPal acquired in …

Security