With recent news that PageUp has suffered a major data breach, Dr Guy Bunker, SVP of Products at data security company, Clearswift, commented below.
Today is the day that, after months of delays, the FCC’s repeal of net neutrality finally takes effect. But if you’re expecting broadband providers to suddenly feast on their customers and institute every now-legal impediment they can on free expression, I’m afraid you’ll be disappointed. What comes next isn’t internet hell but legal purgatory.
To better track advanced hacking groups, U.S.-based companies should watch for signals in human behavior instead of changing tactics, according to Casey Kahsen, an IT specialist at the Department of Homeland Security.
When your computer or mobile device (and now, even your IoT device) is hijacked to secretly mine cryptocurrencies, it’s been cryptojacked and becomes a coinmining zombie. Its CPU, memory, disk, and power are enlisted in varying degrees in the service of the mining botnet, which labors on behalf of those who use it, with other zombies, to make money in the currency. Cryptojacking not only increases the wear and tear on your PC or Mac; if it’s a mobile device it can overheat and swell the battery, even destroy the device itself. Not a good payment for all that service!
You can tell a lot by the company someone keeps. This is one of many reasons we are so proud to have been invited to present at an Amazon event today.
China allegedly exfiltrated classified information pertaining to US Navy projects after a successful cyber-attack on an unspecified Navy contractor resulted in the loss 614 gigabytes of sensor data, cryptographic information, submarine electronic warfare, and the exposure of a classified project known as Sea Dragon.
It’s no secret that expecting security controls to block every infection vector is unrealistic. For most organizations, the chances are very high that threats have already penetrated their defenses and are lurking in their network.
One of the greatest challenges that enterprises face is prioritizing vulnerabilities for remediation. Trying to determine which vulnerabilities pose a true imminent risk deserving of immediate attention can feel like a game of Whac-A-Mole due to the sheer volume of critical vulnerabilities.
Woohoo! The World Cup is coming! That’s what I would say if I wasn’t a stereotypical American who knows almost nothing about football (soccer to us Americans). Or a stereotypical security geek who knows almost nothing about our own handegg sporting events. I’m not really interested in either form of football. However, I am interested in understanding an event that draws interest from around the Internet and what it means to the security of the event, the organizations supporting it, and all the properties that have nothing to do with the event, yet somehow draw an attacker’s ire anyway.
You know banks and related financial institutions are primary targets for cyberattacks and other security threats. In fact, notorious 20th-century bank robber Willie Sutton famously said he robbed banks “because that’s where the money is.”
DNA testing application MyHeritage announced that it has fallen victim to a cyberattack. It appears a security researcher allegedly found online, on a private server, a database containing over 92 million user emails and hashed passwords stolen by a mysterious hacker.
By David Shear & Mike Mimoso, Flashpoint
Job listing and recruitment portals have been an attraction for cybercriminals given the volume of personal information uploaded to those sites in the form of resumes, cover letters and other data specific to individuals.
A previously unknown piece of complex malware with spying capabilities was recently discovered by researchers at cybersecurity firm ESET. The spyware is dubbed InvisiMole and is regarded as an advanced cyber espionage tool most likely designed for attacks on nation-state and financial targets.
As the shining lights of the information security industry descend on London, Red Sift, a data-driven cybersecurity platform, has uncovered the disconcerting reality that three quarters of these industry leaders are falling short on essential email authentication measures, leaving their trusted brands open to email spoofing.
The top companies of generations ago didn’t have to worry about cybersecurity because the internet didn’t exist yet. Because it’s so prevalent in our society now, criminals turn to the online realm to wage war against victims — and often target entire organizations in the process.
Spooked crypto investors unloaded $46bn (£34.3bn) worth of cryptocurrencies after the South Korean exchange platform Coinrail announced that it had been hacked over the weekend, prompting bitcoin to drop to a two-month low. Bitcoin prices are currently at $6,757 according to Coindesk, down from around $7,200 earlier on Sunday, which brings this year’s bitcoin recession to more than 50 per cent after analysts have had hopes that bitcoin would more than double in value by the end of the year.
Corporate extortion and ransomware are the biggest security threats facing companies this year. A study of hundreds of chief information officers (CIOs) carried out by Logicalis, the Irish company, also identified application vulnerabilities as a significant worry. The survey, which polled 890 CIOs in 23 countries, including 34 from Ireland, found that just under three quarters of respondents pinpointed corporate extortion and ransomware as the most significant risks to businesses. Attacks targeting corporate systems and possible application weaknesses were the second-highest concern, cited by 60 per cent of CIOs.