Cybersecurity

Week in review: Leaking LastPass extensions, 300+ hackable Cisco switches

Here’s an overview of some of last week’s most interesting news, podcasts and articles:<p><b>Malware posing as Siemens PLC software is hitting industrial</b> …

Security

The U.S. government is stockpiling lists of “zero day” software bugs that let it hack into iPhones

By David Gilbert on Mar 26, 2017<p>When the U.S. government couldn’t force Apple to give it access to the iPhone used by the shooter in the San Bernardino massacre, it reportedly paid $1 million for a secret software vulnerability that gave it full access to the phone. These undiscovered software bugs …

Security

Silicon Valley Firm Coupa Hit by W-2 Fraudsters

sponsored by<p>Fraudsters Fake Out HR by Pretending to be the CEO as Related Attacks Continue Mathew J. Schwartz (euroinfosec) • March 23, 2017<p>Silicon …

Security

Germany warded off two cyberattacks by Russian hacking group Fancy Bear in 2016

"Germany remains in danger in the cyber arena since we are highly digitised," a top German official said.<p>Germany reportedly fended off two …

Cybercrime

How CISOs Can Create A Balanced Portfolio Of Cybersecurity Products

We’re entering a world of deepening complexity and far vaster breadth when it comes to security for the modern enterprise. With companies integrating legacy data centers, manufacturing facilities, and networks with the cloud and the Internet of Things (IoT), all connecting to an uncontrollable mass …

Security

The 3 best ways to protect your iCloud account

Hackers have obtained working iCloud passwords. Use these methods to make sure yours isn't at risk.<p>Despite a daily barrage of hacks, data breaches and malware attacks, millions of internet users still refuse to take some basic security precautions that could make their accounts nearly impervious -- …

Security

Hacker attacks: How Ohio Air Force base trains cyber army

Cyber hackers bent on chaos could potentially attack water treatment and chemical plants, power grids, financial institutions and disable weapon …

Security

North Korea’s Rising Ambition Seen in Bid to Breach Global Banks

When hackers associated with North Korea tried to break into Polish banks late last year they left a trail of information about their apparent intentions to steal money from more than 100 organizations around the world, according to security researchers.<p>A list of internet protocol addresses, which …

Cybercrime

The Management Of Cybersecurity: Who Owns It And Manages It?

As part of a series exploring cybersecurity and its impact on consumers, marketers, and marketing (see here for Part 1, Part 2, and Part 3), I talked with Holly Rollo, the CMO of RSA, a Dell Technologies business. RSA solutions enable customers worldwide to deliver business-driven security …

Security

How to turn cyber attacks to your advantage

Tax inspectors, the fraud squad, the regulator’s enforcement director. Latterly, chief executives have had to add a new group to the list of people …

Security

Hackers Threaten to Erase Millions of iPhones' Data

But Apple says they won't be able to do it.<p>A hacking group known as "Turkish Crime Family" is threatening to wipe the devices of millions of iPhone users on April 7, unless Apple pays them a hefty ransom, <i>Motherboard</i> reports. The hackers say that they have access to hundreds of millions of email …

Security

This Bitcoin Botnet is Vying to Be Future of Secure IoT

Strong claims need strong proof, so when the founders of NeuroMesh described their bitcoin-based product as an "unhackable botnet", there were a lot …

Bitcoin

Android Forums hack prompts password resets after users' email addresses and passwords stolen

Android Forums has reportedly confirmed that hackers compromised its servers, leading to a data breach. The forum, which is a highly popular platform …

Data Breach

1.4 million Illinois job seekers' personal information potentially compromised in major hack

The news comes days after Illinois Governor Bruce Rauner unveiled a $1bn state-wide cybersecurity plan.<p>The Illinois Department of Employment Security …

Data Breach

Kaine talks cybersecurity at Hampton University

Sen. Tim Kaine takes cybersecurity personally, and one reason is a voicemail inbox that was filled to overflowing the day after Wikileaks shared the …

Security

How to protect your Apple iCloud account

Worried about hackers destroying your iCloud music, pictures, and documents? Here are three things you should do right now.<p>Maybe the London-based …

iCloud

Sizing Up Trump’s Cyberwar Strategy

The United States is taking damage in the global cyberwar, and Trump won’t be able to fix that without help.<p>Two months into his presidency, we still …

Security

Double Agent: Critical zero-day security flaw turns all antivirus software against you

Attackers could seize control of Avast, AVG, Kaspersky, Norton, ESET and many other antivirus software.<p>Cybersecurity researchers have discovered a …

Malware

Who takes responsibility for cyber security in a hotel?

While hotels have a strong handle on the physical security of their guests, are they as dedicated to protecting these guests’ data?<p>According to a …

Security

Man charged with $100m ‘whaling’ attack on two US tech giants

US officials have charged a 48-year-old Lithuanian man in connection with attacks on two big US tech companies that cost them $100m.<p>Evaldas …

Cybercrime

The hackers in your yogurt

To read the news these days is to receive frequent reminders about how easily our technology can be turned against us. We know the CIA can spy on us through our smart TVs and that criminals can infiltrate millions of personal computers, wireless routers, and other smart devices. But the risks go …

Security

ISPs Can Now Sell Your Private Data: How to Protect Yourself

The Internet may seem like an apolitical entity, but the fact is, the United States government has a great deal of influence over it. On Thursday …

Net Neutrality

Next Steps for U.S. Cyber Command after Split with NSA

We all know it’s coming, and soon. There is significant momentum for elevating U.S. Cyber Command to a full combatant command. We should expect that …

Cyberwarfare

Instagram introduces two-factor authentication

Security feature enabled for all users to help protect accounts from being compromised by password reuse and phishing<p>Instagram has become the latest social network to enable two-factor authentication, a valuable security feature that protects accounts from being compromised due to password reuse or …

Security

Almost 1,000 Online Stores Under Attack from GiftGhostBot Botnet

A botnet specialized in gift card fraud is using the infrastructure of nearly 1,000 websites to check the balance of several types of electronic gift …

Security

Why America’s Current Approach to Cybersecurity Is So Dangerous

It’s not magic: As with health or safety education, we need to start with basic steps and repeatable behaviors—like hand-washing or looking both ways …

Security

Cyber Firm Rewrites Part of Disputed Russian Hacking Report

U.S. cybersecurity firm CrowdStrike has revised and retracted statements it used to buttress claims of Russian hacking during last year's American …

Cybercrime

Experts Doubt Hackers’ Claim Of Millions Of Breached Apple Credentials

Security experts say they are skeptical that a group of hackers called Turkish Crime Family actually possess a cache of hundreds of millions of Apple …

Data Breach

No Such Thing as a Cybersecurity Skills Shortage?

As technology rises and cybersecurity threats increase, businesses are more and more eager to hire information security professionals who can help …

Security

Did you know: Crimelords behind DDoS attacks offer customer loyalty points?

The DDoS attack business has advanced to the point that running an attack can cost as little as $7 an hour, while the targeted company can end up …

Security