Month: July 2017

Exposed IoT servers let hackers unlock prison cells, modify pacemakers

Read full post A researcher has found an often-misconfigured protocol puts sex toys, heart monitors, and even oil pipelines and particle accelerators at risk being easily hacked.

/ July 31, 2017

Ransomware Attack on Merck Caused Widespread Disruption to Operations

Read full post Pharmaceutical giant’s global manufacturing, research and sales operations have still not be full restored since the June attacks.

/ July 31, 2017

Iranian Hackers Ensnared Targets via Phony Female Photographer

Read full post US, Indian, Saudi Arabian, Israeli, Iraqi IT, security, executives in oil/gas and aerospace swept up in elaborate social media ruse used for cyber espionage operations.

/ July 31, 2017

Anthem Hit with Data Breach of 18,580 Medicare Members

Read full post Third-party service provider for the insurer discovered one of its employees allegedly engaged in identity theft of thousands of Anthem Medicare members.

/ July 31, 2017

News in brief: Roomba data not for sale; thief-catching wallet; Windows Bounty Program

Read full post Your daily round-up of some of the other stories in the news!

/ July 31, 2017

Should Adobe make Flash open source? [POLL]

Read full post Some of us are counting down to the end of Flash; others are trying to give it life after death. Who’s right? Have your say…

/ July 31, 2017

Healthcare Execs Report Rise in Data Breaches and HIPAA Violations

Read full post IT executives, however, increasingly believe they are “completely ready” to withstand a cybersecurity attack on their healthcare system.

/ July 31, 2017

DevOps Security & the Culture of ‘Yes’

Read full post Communication, collaboration, and the use of production data to drive decisions are essential for security work in a DevOps world.

/ July 31, 2017

Dark Web criminals caught after reusing passwords

Read full post Dark web encryption can’t save you from yourself

/ July 31, 2017

The New York gas pumps that steal your credit card

Read full post The GSM skimmers are hooked up to the pumps’ own power

/ July 31, 2017

Cyber Threats to Small Businesses, a CISO’s View (Pt. 1)

Read full post This past May, Webroot surveyed more than 600 IT decision-makers at medium-sized companies (with between 100 and 499 employees) in the U.S., U.K., and Australia. The survey focused on how these small businesses perceived new threats facing...

/ July 31, 2017

Monday review – the hot 32 stories of the week

Read full post Get yourself up to date with everything we’ve written in the last seven days – it’s weekly roundup time.

/ July 31, 2017

iOS VPN apps removed from Apple’s Chinese App Store

Read full post Apple has bowed to pressure from the regime in Beijing, and removed some VPN apps from the Chinese version of its iOS App Store. The post iOS VPN apps removed from Apple’s Chinese App Store appeared first...

/ July 29, 2017

DEF CON Rocks the Vote with Live Machine Hacking

Read full post Jeff Moss, founder of the hacker conference, is planning to host a full-blown election and voting system for hacking in 2018 at DEF CON, complete with a simulated presidential race.

/ July 28, 2017

Cyber News Rundown: Edition 7/28/17

Read full post The Cyber News Rundown brings you the latest happenings in cyber news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst, and a guy with a passion for all things security. Any more questions?...

/ July 28, 2017

Become a sysadmin – learn how to fit right in [VIDEO]

Read full post In one short #SysAdminDay video, we can’t teach you how to *play* the part of a sysdmin, but we can help you *look* the part!

/ July 28, 2017

Wannacry Inpires Worm-like Module in Trickbot

Read full post The malware is being primarily distributed via email spam in the form of spoofed invoices from an international financial services com, says Flashpoint.

/ July 28, 2017

Wannacry Inpires Worm-like Module in Trickbot

Read full post The malware is being primarily distributed via email spam in the form of spoofed invoices from an international financial services com, says Flashpoint.

/ July 28, 2017

Lethal Dosage of Cybercrime: Hacking the IV Pump

Read full post At Def Con, a researcher demonstrated how to attack a popular model of infusion pump used in major hospitals around the world.

/ July 28, 2017

These were the best hacks at Black Hat and Def Con this year

Read full post If you weren’t in Las Vegas for the heat and hacking, we’ve got you covered.

/ July 28, 2017

News in brief: beware the hacked carwash; man sentenced over Mirai attack; farewell to the iPod

Read full post Your daily round-up of some of the other stories in the news

/ July 28, 2017

Lipizzan spyware linked to cyberarms firm plunders SMS, logs and photos

Read full post SophosLabs takes a look under the hood of a piece of Android malware that Google says contains references to a cyberarms company

/ July 28, 2017

Throw Out the Playbooks to Win at Incident Response

Read full post Four reasons why enterprises that rely on playbooks give hackers an advantage.

/ July 28, 2017

Are you a Sysadmin? Find out now for free!

Read full post Even on #SysAdminDay, it’s hard to get agreement on who is a sysadmin. NO PROBLEM: our 5-question quiz will find out the truth at once.

/ July 28, 2017

Russian Operator of Bitcoin Exchange Charged with Money Laundering

Read full post Alexander Vinnik and Bitcoin exchange BTC-e have been charged in a 21-count indictment for money laundering and related crimes.

/ July 28, 2017

Police crack seized phones of inauguration day protesters

Read full post The unencrypted devices have offered up a bonanza of data to police – what would your phone reveal about you?

/ July 28, 2017

Facebook joins heavy hitters to fund group standing up to post-truth

Read full post Facebook is joining executives from Google as well as former head of the NSA and Hillary Clinton, among others, to support the body that looks like a version 2.0 upgrade to fact-checking

/ July 28, 2017

Are smartphones threatening the security of our IoT devices?

Read full post The number of IoT devices is set to surpass 20 billion by 2020. We take a look at how connected things threaten our security as cybercriminals exploit weaknesses in the smartphones that control them. The post Are...

/ July 28, 2017

Today’s the day – celebrate your sysadmin superheroes!

Read full post We’ve barely put away the bunting from last year’s Sysadmin Day and it’s come round again – join us in celebrating our superheroes!

/ July 28, 2017

Going on holiday? Here are our tips for a security-minded trip

Read full post From taking care with hotel WiFi to keeping your cellphone safe, we’ve got some advice as you head off on holiday

/ July 28, 2017

Black Hat: Hacking the firmware, the next frontier

Read full post Trick the firmware and you have access to the whole system. Here at Black Hat, there are a lot of people doing just that. The post Black Hat: Hacking the firmware, the next frontier appeared first on...

/ July 28, 2017

ESET’s Anton Cherepanov picks up Pwnie for Best Backdoor

Read full post Anton Cherepanov, a malware researcher at ESET, has picked up a Pwnie Award for Best Backdoor at this year’s ceremony at Black Hat USA 2017 in Las Vegas. The post ESET’s Anton Cherepanov picks up Pwnie for...

/ July 28, 2017

How to hack a Sysadmin – jump the IT support queue every time!

Read full post Celebrate #SysAdminDay by learning how to win friends and influence syadmins – and how to jump those pesky IT queues.

/ July 28, 2017

The Lazy Habits of Phishing Attackers

Read full post Most hackers who phish accounts do little to hide their tracks or even mine all of the data they can from phished accounts, mostly because they can afford to be lazy.

/ July 27, 2017

Researchers Release Free Tool to Analyze ICS Malware

Read full post CrashOverride/Industroyer malware used against Ukraine’s power grid the inspiration for the reverse-engineering tool.

/ July 27, 2017

Broadcom Chipset Bug in Android, iOS Smartphones Allows Remote Attack

Read full post Security researcher found a common flaw in Android and iOS smartphone chipsets that could allow a remote exploit to be unleashed on millions of devices.

/ July 27, 2017

Inside the Investigation and Trial of Roman Seleznev

Read full post The officials who convicted the credit card thief discussed the investigation, evidence, trial, and challenges involved in his case.

/ July 27, 2017

Inside the Investigation and Trial of Roman Seleznev

Read full post The officials who convicted the credit card thief discussed the investigation, evidence, trial, and challenges involved in his case.

/ July 27, 2017

Get Ready for the 2038 ‘Epocholypse’ (and Worse)

Read full post A leading security researcher predicts a sea of technology changes that will rock our world, including the Internet of Things, cryptocurrency, SSL encryption and national security.

/ July 27, 2017