-
News - Data Connectors
-
The Internet: Looking Back and Forward 50 YearsNovember 18, 2019
The Internet turned 50 years old this year. So where are we heading in the next 50 years? Here’s a look at the excellent report from Pew Research and Elon University surveying global experts. BY DAN LOHRMANN / NOVEMBER 16, 2019 The numbers are staggering. More than 4.4 billion people now use the Internet. Collectively, we: Upload 4 […]
-
Alarm in Texas as 23 towns hit by ‘coordinated’ ransomware attackAugust 19, 2019
KEY POINTS Twenty-three Texas towns have been struck by a “coordinated” ransomware attack, according to the state’s Department of Information Resources. According to a weekend update by the deparment, the attacks started Friday morning and though the locations aren’t named, “The majority of these entities were smaller local governments.” The attacks come after state and […]
-
AT&T employees took bribes to plant malware on the company’s networkAugust 8, 2019
DOJ charges Pakistani man with bribing AT&T employees more than $1 million to install malware on the company’s network, unlock more than 2 million devices. AT&T employees took bribes to unlock millions of smartphones, and to install malware and unauthorized hardware on the company’s network, the Department of Justice said yesterday. These details come from […]
-
Do these six things to protect your company onlineJuly 15, 2019
Cyberattacks and data breaches have cost UK mid-market companies over £30 billion, yet organisations remain complacent about their cybersecurity capabilities – putting them at greater risk from hackers and cybercrime. Business and financial adviser Grant Thornton surveyed hundreds of mid-market organisations – those with £15m and £1bn per year and found that despite the threat […]
-
Why AI Is The Future Of CybersecurityJuly 15, 2019
ISTOCK 61% of enterprises say they cannot detect breach attempts today without the use of AI technologies. 48% say their budgets for AI in cybersecurity will increase by an average of 29% in Fiscal Year (FY) 2020. Breach attempts are proliferating with Cisco reporting that in 2018, they blocked seven trillion threats on behalf of […]
-
What’s the Difference Between Hackers, Malware, and Data Breaches?June 13, 2019
We’ve all read about various forms of cybercrime and its various levels of impact. Oftentimes we hear about a company whose network has been compromised, leading to the loss of sensitive information. But that’s just one scenario out of many. For example, just exactly who is a hacker and what’s the difference between malicious hacking […]
-
Federal cybersecurity agency on the way?May 31, 2019
As human activity migrates into the online space, keeping the bad guys from mucking it all up becomes paramount. Does that mean it’s time for a federal cybersecurity agency? Matt Wade (CC BY-SA 2.0) The departments and agencies within the United States government have evolved over time to address modern-day problems and meet the changing needs […]
-
11 Tips For Boosting Cybersecurity When You Have Remote WorkersMay 31, 2019
GETTY In today’s tech-driven business world, more and more companies are hiring partially or wholly remote workforces. Workers across the globe can collaborate with others, sharing skills and expertise in a real team, no matter where they’re located. However, since not every employee is sitting in the same place on the same network, you […]
-
Cyber hacks up 20% in 2018, cybersecurity panelists talk about better passwords, systemsMay 31, 2019
Panelists talked cyber security and other issues during the Hybrid Identity Protection Tech Day event held in Bentonville on Thursday, (May 30). Panelists are (left to right): Moderator Mickey Bresman, CEO of Semperis; Gil Kirkpatrick, CTO ViewDS; Ben Johnson, co-founder Obsidian Security; Sean Dueby, senior identity architect at Edgile and Darren Mar-Elia, head of product […]
-
Ransomware Cyberattacks Knock Baltimore’s City Services OfflineMay 22, 2019
Ashley Merson and her brother Kevin sit on the porch of the house Ashley is trying to buy in the Hampden neighborhood of Baltimore. A ransomware attack on the city’s digital services has delayed the home purchase. Emily Sullivan/WYPR Anonymous hackers breached the city of Baltimore’s servers two weeks ago. Since then, those servers’ […]
-
Why Are Businesses Struggling to Fill Cybersecurity Vacancies?May 20, 2019
If you were to ask CIOs and CSOs which positions they have most difficulty filling, they wouldn’t respond with network engineer, system administrator, or developer. Instead, it is cybersecurity professionals and executives with cybersecurity expertise who are the hardest to hire. There are two main reasons businesses struggle to fill cybersecurity vacancies. The first […]
-
6 Ways Poor Cybersecurity Hurts BusinessesMay 20, 2019
Cybersecurity is more than a buzzword today, and that’s for a good reason. Failing to have adequate cybersecurity measures could harm your business in ways you don’t expect. Here are six examples: Poor Security Has a Broad and Adverse Effect on Clients and Markets Your initial impression may be that weak cybersecurity only […]
-
Why some of the world’s top cybersecurity hackers are being paid millions to use their powers for goodMay 20, 2019
KEY POINTS There is a shortfall of cybersecurity workers for available jobs that could reach as high as 3.5 million unfilled roles by 2021. A start-up called Synack provides crowdsourced security and hires freelance hackers to help companies find vulnerabilities. These freelance hackers are earning high salaries due to increasing demand. Participant hold their […]
-
Machine Learning for Cybersecurity 101May 14, 2019
The considerable number of articles cover machine learning for cybersecurity and the ability to protect us from cyberattacks. Still, it’s important to scrutinize how actually Artificial Intelligence (AI),Machine Learning (ML),and Deep Learning (DL) can help in cybersecurity right now, and what this hype is all about. First of all, I have to disappoint you. Unfortunately, […]
-
Cybersecurity Experts Share Tips And Insights For World Password DayMay 2, 2019
ASSOCIATED PRESS Today is World Password Day! World Password Day falls on the first Thursday in May each year and is intended to raise awareness of password best practices and the need for strong passwords. It seems like we all have even more passwords with each passing year, though, and there are some conflicting […]
-
Hacker Finds He Can Remotely Kill Car Engines After Breaking Into GPS Tracking AppsApril 29, 2019
“I can absolutely make a big traffic problem all over the world,” the hacker said. A hacker broke into thousands of accounts belonging to users of two GPS tracker apps, giving him the ability to monitor the locations of tens of thousands of vehicles and even turn off the engines for some of them […]
-
AI And The Cybersecurity Workforce: A Whole New WorldApril 26, 2019
GETTY Billions of people were affected by data breaches and cyberattacks last year – $765 million in damages was in the months of April, May and June alone. It, therefore, comes as no surprise that demand for cybersecurity expertise is higher than ever. The demand has increased to the point where unfilled positions in the cybersecurity sector […]
-
What your laptop-holding position says about youApril 19, 2019
They walk among us in just about every office: People with their laptops open, bound for conference rooms and common areas, many keeping their devices ajar to avoid losing those precious few seconds of computer wake-up time. While we cloak our phones in shock-proof plastic and their screens with tempered-glass shields, laptops rarely get similar […]
-
Game of Thrones Guide to Cybersecurity: Preparing for Battle During a Staffing ShortageApril 19, 2019
Faced with an overwhelming adversary, Game of Thrones heroes Daenerys Targaryen and Jon Snow have a lot in common with today’s beleaguered CISOs. Strong similarities exist between the precarious plight of Daenerys Targaryen and that of modern security leaders. First off, both are outnumbered by their rivals — on paper, at least. North of the […]
-
Artificial Intelligence for CybersecurityApril 17, 2019
The next generation of cybersecurity products are increasingly incorporating Artificial Intelligence (AI) and Machine Learning (ML) technologies. By training AI software on large datasets of cybersecurity, network, and even physical information, cybersecurity solutions providers aim to detect and block abnormal behavior, even if it does not exhibit a known “signature” or pattern. Experts anticipate […]
-
Identifying threats 60 times faster, AI is changing the game for cybersecurityApril 15, 2019
AI for Cybersecurity As cyberattacks grow in volume and complexity, artificial intelligence (AI) is helping under-resourced security operations analysts stay ahead of threats. Curating threat intelligence from millions of research papers, blogs and news stories, AI provides instant insights to help you fight through the noise of thousands of daily alerts, drastically reducing response times. […]
-
HEALTH CARE’S HUGE CYBERSECURITY PROBLEMApril 8, 2019
Cyberattacks aren’t just going after your data A screenshot of the WannaCry ransomeware. Image: SecureList / AO Kaspersky Lab The patient lying on the emergency room table in front of Paul Pugsley was having a stroke. Time was running out. Pugsley, an emergency medicine resident at Maricopa Medical Center, knew he needed to send the patient […]
-
Why is it so hard for us to pay attention to cybersecurity?April 5, 2019
More firms say they prioritise cybersecurity, but a significant number are still putting themselves at risk by not doing enough. With a daily deluge of cyberattacks, hacking incidents, data breaches and malware campaigns, it appears that – finally – many organisations now understand that cyber security is an important issue that needs to be taken seriously from […]
-
Women Now Hold One-Quarter of Cybersecurity JobsApril 3, 2019
New data from ISC(2) shows younger women are making more money than in previous generations in the field – but overall gender pay disparity persists. Women now actually make up 24% of the cybersecurity workforce – a seismic shift from the perennially static 11% number over the past six or more years. But this new data […]
-
Locking More Than the Doors as Cars Become Computers on WheelsMarch 8, 2019
Thomas James Going back at least a decade, cars have been targeted by hackers, some who ended up working with the industry, others acting maliciously. But vehicles now carry far more electronic equipment, and autonomous driving, relying on sensors, cameras and radar, is on the horizon, with all kinds of ripe new targets. Concern that […]
-
RSA Conference 2019: Ultrasound Hacked in Two ClicksMarch 8, 2019
In a proof-of-concept hack, researchers penetrated an ultrasound and were able to download and manipulate patient files, then execute ransomware. SAN FRANCISCO – Researchers have highlighted the endemic insecurity of the hospital environment by executing a proof-of-concept attack on an ultrasound machine. In doing so, they were able to gain access to the machine’s […]
-
A v-CISO’s Take on the 5 Issues Facing CybersecurityFebruary 27, 2019
A v-CISO’s Take on the 5 Issues Facing Cybersecurity
-
Why patients worry about cybersecurity and patient-generated dataFebruary 27, 2019
Patient-generated health data (PGHD), from wearables and other remote devices, represents an exciting opportunity to more deeply engage patients and families in care and offer robust data streams of objective information to better guide treatment plans. Yet, federal health IT experts note, one big factor that stands in the way of advancement on this front are fears about […]
-
How to combat burnout in cybersecurityFebruary 27, 2019
In an industry that is constantly growing and full of high-pressure situations, how do you get your organization the help needed to identify and avoid potential issues? (SIphotography/Getty Images) Everyone feels the pressure to perform, work hard and prove their worth. No matter how much you love your job, you can overwork, feel heightened stress […]
-
Wired for Safety: For organization’s cybersecurity, start with system boundary and inventoryFebruary 27, 2019
In the last article, we looked at some ways to start the process of understanding the impact to your organization’s mission if there was a compromise or other event that caused a disruption of service. We also looked at how to start determining what information assets exist and where they reside. Let’s look at understanding our […]
-
Undisclosed number of TurboTax accounts breachedFebruary 26, 2019
Intuit, the company behind tax preparation software TurboTax, said users’ accounts may have been accessed by an unauthorized party. Threat actors used usernames and password combinations obtained from a non-Intuit source after an undisclosed number of TurboTax accounts were breached in a credential stuffing attack. Tax returns from the prior year, current tax returns in […]
-
Over 92 Million New Accounts Up for Sale from More Unreported BreachesFebruary 19, 2019
All these numbers…. “More than 5 billion records from 6,500 data breaches were exposed in 2018” — a report from Risk Based Security says. “More than 59,000 data breaches have been reported across the European since the GDPR came into force in 2018” — a report from DLA Piper says. …came from data breaches that […]
-
Critical Flaw Uncovered In WordPress That Remained Unpatched for 6 YearsFebruary 19, 2019
Exclusive — If you have not updated your website to the latest WordPress version 5.0.3, it’s a brilliant idea to upgrade the content management software of your site now. From now, I mean immediately. Cybersecurity researchers at RIPS Technologies GmbH today shared their latest research with The Hacker News, revealing the existence of a critical remote code […]
-
Australian political parties hit by ‘state actor’ hack, PM saysFebruary 19, 2019
Australia’s main political parties and parliament were hit by a “malicious intrusion” on their computer networks, Prime Minister Scott Morrison said. The cyber-attack revealed two weeks ago was carried out by a “sophisticated state actor”, he said. But he added there was “no evidence of any electoral interference”. The nation will hold an election within […]
-
SECURITY NEWS THIS WEEK: A TEEN WON’T TELL APPLE HOW HE HACKED MACOSFebruary 19, 2019
GIULIA MARCHI/GETTY IMAGES As it turns out, Apple had multiple run-ins with teens this week! In the second instance, an 18-year-old German hacker demonstrated a vulnerability in macOS that lets an attacker steal passwords that are stored in the keychain. Perhaps more importantly, he has also pointedly decided not to share how he did it. […]
-
Defector/ex-U.S. spy charged with aiding Iranian cyberattack planFebruary 19, 2019
A U.S. counterintelligence agent specializing in Middle Eastern affairs, who defected to Iran in 2013, was indicted by a federal grand jury for conducting espionage on behalf of her adopted country. Monica Elfriede Witt, an American citizen who served in the U.S. Air Force Office of Special Investigations from 1997 until 2008, was charged with […]
-
Five emerging cybersecurity threats you should take very seriously in 2019February 19, 2019
Ransomware isn’t the only cyberthreat your business will face this year. Here are five emerging threats that leaders need to know about. The cyberthreat landscape continues to evolve, with new threats emerging almost daily. The ability to track and prepare to face these threats can help security and risk management leaders improve their organization’s resilience […]
-
Cybersecurity firm finds 8 apps on the Microsoft Store that secretly mined cryptocurrenciesFebruary 19, 2019
A cybersecurity firm has found that apps in the Microsoft Store have been found to be secretly mining for cryptocurrencies in the background without permission being granted from the user. Symantec discovered at least 8 offending apps that used users’ CPU resources to mine for cryptocurrencies. The apps were published by 3 different developer names: DigiDream, 1 […]
-
Explainer: What is quantum communication?February 19, 2019
Researchers and companies are creating ultra-secure communication networks that could form the basis of a quantum internet. This is how it works. Barely a week goes by without reports of some new mega-hack that’s exposed huge amounts of sensitive information, from people’s credit card details and health records to companies’ valuable intellectual property. The […]
-
Hackers Are Raising Their Game. Their Targets Need To Do The Same.February 8, 2019
One of the biggest challenges for those of us working in cyber security is not only how we keep pace with cyber criminals, but how we actively anticipate their next steps. Right now, this is more challenging than ever, as we see cyber criminals raising their game in response to better and more sophisticated security […]
-
Can AI Become Our New Cybersecurity Sheriff?February 5, 2019
Two hospitals in Ohio and West Virginia turned patients away due to a ransomware attack that led to a system failure. The hospitals could not process any emergency patient requests. Hence, they sent incoming patients to nearby hospitals. It is due to incidents like these that cyber threats are one of the top concerns for several industry […]
-
Meet the hacker mom big companies hire for cybersecurityFebruary 5, 2019
From an office in scenic Missoula, Montana, Sherri Davidoff and an all-female management team run a national consulting firm called LMG Security. MISSOULA, Montana — Americans are under attack, and the weapon is now your computer. Every 40 seconds, there is a cyber attack. The criminals are getting smarter, and their attacks are getting more […]
-
A bank wants to recover the $81 million North Korea allegedly stole. It won’t be easy.February 5, 2019
The Federal Reserve Bank of New York on Dec. 16, 2017. (Eduardo Munoz/Reuters) The New York Federal Reserve is assisting Bangladesh’s central bank in a lawsuit filed Thursday to claw back $81 million in funds stolen during a 2016 North Korean hacking campaign. But they’re not going after Pyongyang directly. Instead, Bangladesh Bank is suing a […]
-
AI won’t solve all of our cybersecurity problemsFebruary 5, 2019
AI is already supporting businesses with tasks ranging from determining marketing strategies, to driverless cars, to providing personalized film and music recommendations. And its use is expected to grow even further in the coming years. In fact, IDC found that spending on cognitive and AI systems will reach $77.6 billion in 2022, more than three times […]
-
Duke Energy fined $10 million for cybersecurity failures on gridFebruary 5, 2019
CHARLOTTE, N.C. – The North American Electric Reliability Corp. has imposed a $10 million fine — its largest ever for cybersecurity violations — on an unnamed power company identified in news reports as Duke Energy Corp. The corporation lists close to 130 violations against the unnamed company and its regional entities in the public version of […]
-
U.S. adversaries are raising their cyber game, intel officials warnJanuary 31, 2019
Director of National Intelligence Daniel Coats on Capitol Hill in Washington on Jan. 29. (Joshua Roberts/Reuters) All four of the United States’ main global adversaries are investing heavily in offensive cyber capabilities and are more likely to use digital attacks to gain a strategic advantage, Director of National Intelligence Dan Coats told lawmakers Tuesday. […]
-
Cheap Internet of Things gadgets betray you even after you toss them in the trashJanuary 31, 2019
You may think that the worst you’ll risk by buying a bargain-bin smart bulb or security camera will be a bit of extra trouble setting it up or a lack of settings. But it’s not just while they’re plugged in that these slapdash gadgets are a security risk — even from the garbage can, they […]
-
Millions of financial records leaked from server not protected by passwordJanuary 28, 2019
Another day, another massive leak blamed on failing to password-protect a server. This time it’s sensitive financial data in an Elasticsearch database. Thinkstock An ElasticSearch database misconfiguration exposed 51GB of sensitive financial data such as bank loans and mortgage documents. The server, which was not protected by a password, was discovered Jan. 10 by […]
-
Baltimore Orders Security Review After Potential Staff HackJanuary 23, 2019
After a technology employee, who no longer works for the city, was found with hacking tools on his computer, Baltimore Mayor Catherine Pugh called for a review of the municipal government’s cybersecurity practices. SHUTTERSTOCK (TNS) — Mayor Catherine Pugh ordered a security review after a technology staffer at Baltimore’s water agency gave himself special […]
-
Hacker History III: Professional Hardware HackerJanuary 22, 2019
Following on from my C64 hacking days, but in parallel to my BBS Hacking, this final part looks at my early hardware hacking and creation of a new class of meteorological research radar…Ever since that first C64 and through the x86 years, I’d been hacking away – mostly software; initially bypassing copy-protection, then game cracks and cheats, followed […]
-
Health-care sector is far too vulnerable to cybersecurity threatsJanuary 22, 2019
© Getty Images The digitization of health care promises to be transformative for patients and medical practitioners alike. New technologies and techniques — including big data, machine learning and artificial intelligence — are already helping to make health-care delivery more efficient, effective and less expensive. In spite of this vast potential, though, there exists a […]
-
Girl Scouts of America offers badge in cyber-securityJanuary 22, 2019
Girl Scouts of America is now offering girls as young as five a badge in cyber-security. It’s part of a drive to get more girls involved in science, technology engineering and mathematics from a young age. An event in Silicon Valley gave scouts an opportunity to earn the first patch in the activity, with the […]
-
Missouri S&T To Study Internal Cyber-Security ThreatsJanuary 22, 2019
Missouri S&T faculty work with students on cyber security in a 2017 class. SAM O’KEEFE | MISSOURI S&T A team at Missouri University of Science and Technology has received a $1 million grant to research better kinds of cyber security. They aren’t looking to stop outside hackers — they want to stop threats from […]
-
Massive breach leaks 773 million email addresses, 21 million passwordsJanuary 22, 2019
The best time to stop reusing old passwords was 10 years ago. The second best time is now. Millions of emails and passwords were dumped in an 87GB file. James Martin/CNET In one of the largest public data breaches, a collection containing more than 87 gigabytes of personal information was leaked online. The data […]
-
Google fined $57 million under new European data privacy lawJanuary 22, 2019
The fine is the biggest imposed under the General Data Protection Regulation. Google has been fined $57 million by a French regulator for not presenting transparent information about its data-gathering practices. Claudia Cruz/CNET Google has been fined 50 million euros (about $57 million) by a French regulator for not properly disclosing to users how their […]
-
U.S. CEOs Are More Worried About Cybersecurity Than a Possible RecessionJanuary 22, 2019
With markets uncertain, many onlookers might think a recession is on the way, whether that’s most CFOs in the world or voters in the United States. But domestic CEOs don’t find heavy economic headwinds their biggest external business worry, according to a new survey by the Conference Board. Instead, it’s cybersecurity followed by new competitors. Risk of a recession is […]
-
Reminder: Microsoft to end support for Windows 7 in 1-year from todayJanuary 15, 2019
A new reminder for those who are still holding on to the Windows 7 operating system—you have one year left until Microsoft ends support for its 9-year-old operating system. So it’s time for you to upgrade your OS and say goodbye to Windows 7, as its five years of extended support will end on January […]
-
A MAJOR HACKING SPREE GETS PERSONAL FOR GERMAN POLITICIANSJanuary 15, 2019
SBPHOTOS/GETTY IMAGES Hundreds of German politicians who have had their private digital lives exposed online are victims of a hacking campaign with unclear motives. IN AN EXTENSIVE series of tweets throughout December, hackers leaked sensitive data from hundreds of Germanpoliticians, including members of the European parliament, German parliament, and regional state parliaments. The move reflects an insidious […]
-
Ryuk ransomware linked to Emotet and TrickBot trojans; suspicions shift to cybercriminal groupJanuary 15, 2019
Multiple researchers are linking the Ryuk ransomware that disrupted the operations of multiple U.S. newspapers in late 2018 to the Emotet and TrickBot trojans. In so doing, some analysts have now also shifted blame for the attack from North Korean actors to cybercriminals, possibly from Russia, while others maintain that attribution efforts are premature. Crowdstrike, FireEye, Kryptos […]
-
Ransomware attack sends City of Del Rio back to the days of pen and paperJanuary 15, 2019
Servers at City Hall were rendered useless due to the outbreak. Officials based at the City of Del Rio, in Texas, were forced to abandon electronic services and switch to pen and paper after a ransomware attack effectively closed down City Hall servers. City representatives disclosed the cyberattack last week. The city was struck by […]
-
60 Cybersecurity Predictions For 2019January 10, 2019
Computer hacking conceptGETTY I’ve always been a loner, avoiding crowds as much as possible, but last Friday I found myself in the company of 500 million people. The breach of the personal accounts of Marriott and Starwood customers forced us to join the 34% of U.S. consumers who experienced a compromise of their personal information […]
-
HACKER HISTORY II: THE BBS YEARSJanuary 9, 2019
Post-C64 Hacking (in Part 1 of Hacker History)… now on to Part 2: The BBS Years Late 1986 (a few months before I started my first non-newspaper delivery and non-family-business job – working at a local supermarket) I launched my first bulletin board system (BBS). I can’t remember the software that I was running at the […]
-
HACKER HISTORY I: GETTING STARTED AS A HACKERJanuary 9, 2019
Curiosity is a wonderful thing; and the key ingredient to making a hacker. All the best hackers I know are not only deeply curious creatures but have a driving desire to share the knowledge they uncover. That curiosity and sharing underpins much of the hacker culture today – and is pretty core to people like […]
-
SECURITY NEWS THIS WEEK: HACKERS HIT NASA BEFORE THE HOLIDAYSJanuary 3, 2019
LOREN ELLIOTT/GETTY IMAGES THE WEEK STARTED with bombshell Senate reports on the Russian campaign to influence the 2016 presidential election. We dived deep to explain how Russians used meme warfare to divide America, why Instagram was the Internet Research Agency’s go-to social media platform for spreading misinformation, and how Russians specifically targeted black Americans in an effort to exploit racial […]
-
HHS releases voluntary cybersecurity guidanceJanuary 3, 2019
The four part report was compiled for hospital executives as well as infosec pros, HHS said. The U.S. Department of Health and Human Services on Friday released the four-volume voluntary guidance for healthcare organizations titled “Health Industry Cybersecurity Practices (HICP): Managing Threats and Protecting Patients.” WHY IT MATTERS Mandated under the Cybersecurity Act of […]
-
Cybersecurity no. 1 challenge for CXOs, but only 39% have a defense strategyJanuary 3, 2019
More than 85% of companies have experienced a cyber breach in the past three years, according to an A.T. Kearny report. C-level executives rank cybersecurity as the no. 1 challenge they face for the third consecutive year, as more than 85% of companies report experiencing a breach in the past three years, according to a […]
-
FBI warns industry that hackers could probe vulnerable connections in building systemsJanuary 3, 2019
A port for communicating with control systems in buildings leaves unpatched devices on those networks exposed to hackers, the FBI warned the private sector this week, calling attention to a longstanding issue in an often-overlooked segment of critical infrastructure. Major universities, state governments, and communications companies are among the organizations at risk of having their […]
-
Here’s what to expect in cybersecurity in 2019January 3, 2019
Around this time every year, my inbox fills with the same repetitive junk. “Would you consider putting [any random company] in your gift guide?”, “are you going to CES and if so can I pitch you [a gadget that literally won’t be around this time next year]?”, and, “do you want to cover [a […]
-
THE WORST HACKS OF 2018January 3, 2019
After years of targeted hacks, epic heists, and run of the mill data breaches you might think that institutions would be getting wise to the importance of strong cybersecurity. But it seems 2018 was not the year. Here’s WIRED’s look back at the biggest breaches, data exposures, ransomware attacks, state-sponsored campaigns, and general hacks of the year. Stay safe […]
-
Major US newspapers crippled by Ryuk ransomware attackJanuary 3, 2019
All Tribune Publishing newspapers, as well as US-printed newspapers formerly part of Tribune, were hit with a cyber attack involving Ryuk ransomware. Thinkstock Ryuk ransomware is believed to be the culprit behind printing and delivery issues for “all Tribune Publishing newspapers” — as well as newspapers that used to be part of Tribune Publishing. The malware […]
-
Remembering the startups we lost in 2018December 27, 2018
From Theranos to Telltale, here are some of the companies that didnt make it There are few things in this world more difficult than launching a successful startup. It takes talent, know-how, money and a hell of a lot of good timing and luck. And even with all of those magical components in place, the […]
-
Taylor Swift’s Facial Recognition Scans Crowds For StalkersDecember 26, 2018
DON ARNOLD/GETTY IMAGES Taylor Swift reportedly used facial recognition at a recent concert in an attempt to scan for stalkers. Rolling Stone reported in a brief item this week that megastar Taylor Swift deployed a sneaky facial recognition camera at her May 18 Rose Bowl show. Hidden behind a display that showed short videos of rehearsals, […]
-
The Cybersecurity 202: Internet ecosystem needs a complete overhaul to be cybersecure, House panel warnsDecember 19, 2018
The sun sets behind the U.S. Capitol dome in Washington on Nov. 6. (James Lawler Duggan/Reuters) Read the full report here at The Washington Post. Here are four big takeaways: Start planning for retirement early Companies should begin planning from the moment they introduce a new product for when the product’s underlying technology […]
-
Your Apps Know Where You Were Last Night, and They’re Not Keeping It SecretDecember 19, 2018
Dozens of companies use smartphone locations to help advertisers and even hedge funds. They say it’s anonymous, but the data shows how personal it is. The millions of dots on the map trace highways, side streets and bike trails — each one following the path of an anonymous cellphone user. One path tracks someone […]
-
Memes on Twitter Used to Communicate With MalwareDecember 19, 2018
Steganography via tweet images gave attackers a way to pass on malicious instructions to Trojan, researchers say. A new and otherwise ordinary malware tool is garnering some attention from security researchers for its ability to retrieve malicious commands via code hidden in a couple of Twitter memes. The malware (TROJAN.MSIL.BERBOMTHUM.AA) targets Windows systems and, […]
-
NSA Cyber Chief Says Companies Are Losing Ground Against AdversariesDecember 17, 2018
U.S. companies are failing to protect their technology, former Trump adviser Rob Joyce says PHOTO: DAVID PAUL MORRIS/BLOOMBERG NEWS NSA cybersecurity expert Rob Joyce. Mr. Joyce returned to the agency this year after serving as an advisor to the Trump administration. NEW YORK—Are we winning the war to protect data? Not according to Rob […]
-
Companies Unleash CISOs from Ties to Tech ChiefsDecember 10, 2018
Chief information security officers are gaining more autonomy and oversight as companies shift cybersecurity away from the technology chief’s control. Many legacy cybersecurity teams are established in technology departments, where CISOs reported to the chief information officer. Today, by giving CISOs a broader view and better negotiating power across the organization, companies are acknowledging the […]
-
Twelve US states join for the first time to file multistate data breach lawsuitDecember 10, 2018
Lawsuit details a long list of security fails on MIE’s part. Attorneys general from twelve US states have joined together to file the first-ever joint cross-state HIPAA lawsuit against a healthcare provider that got hacked in the summer of 2015. The lawsuit, filed in an Indiana court on Monday, alleges that Medical Informatics Engineering and […]
-
Cyber security: Hackers step out of the shadows with bigger, bolder attacksDecember 6, 2018
Successful hacking campaigns used to be all about keeping under the radar. But, for some, making a big splash is now now more important than lurking in the shadows. Stealth and secrecy used to be the hallmarks of cyber espionage and cyberwarfare, with spies and hackers sneaking in and out of target networks without leaving a trace or […]
-
Khashoggi Friend Accuses Cyber Security Firm Of Helping Saudis Spy On Their MessagesDecember 5, 2018
Saudi writer and critic Jamal Khashoggi was killed inside the Saudi consulate in Istanbul, Turkey. Anadolu Agency/Getty Images A Saudi dissident based in Montreal, Canada, filed a lawsuit this week against the NSO Group, an Israeli cyber security firm. The suit alleges the Saudi government used software from the company to spy on conversations […]
-
Why hospitals are the next frontier of cybersecurityDecember 5, 2018
Hospital cybersecurity is a pressing problem with unique challenges and incalculable stakes. The healthcare industry’s accelerating adoption of sophisticated networks, connected devices and digital records has revolutionized clinical operations and patient care but has also left modern hospitals acutely vulnerable to cyber attack. Recent high-profile hacks have brought these mounting threats sharply into focus. However, despite […]
-
21 Terrifying Cyber Crime StatisticsDecember 4, 2018
It may not be a nice topic to talk about, but it is essential that the world is aware of the terrifying cyber crime statistics in 2018. Unfortunately, with technology on the rise, there’s more room for cyber crime in 2018. According to the Cyber Security Breaches Survey 2018, 43% of businesses were a victim of a […]
-
Can Blockchain Fix Cybersecurity?December 4, 2018
The technology holds a lot of promise for security, but there’s still a long way to go before it sees serious enterprise adoption. Blockchain is one of the biggest tech buzzwords of the last few years, and the technology is marketed as a cure for everything that ails you, including cybersecurity. In practice, at least […]
-
Marriott Says Up To 500 Million Customers’ Data Stolen In BreachNovember 30, 2018
Justin Sullivan/Getty Images Marriott said that for 327 million guests of its Starwood network, which includes Westin hotels like this one near San Francisco, the compromised data includes dates of birth and passport numbers. Updated at 11:55 a.m. ET 11/30/18 In one of the largest cybersecurity breaches in history, Marriott International said Friday that […]
-
60 Cybersecurity Predictions For 2018November 28, 2018
Shutterstock Like death and taxes, there are only two safe predictions about cybersecurity in 2018: There will be more spectacular data breaches and the EU General Data Protection Regulation (GDPR) will go into effect on May 25. But as the continuing digital transformation of our lives entails the ongoing digital transformation of crime, vandalism and warfare, 2018 […]
-
Uber Fined Nearly $1.2 Million by Dutch, UK Over Data BreachNovember 28, 2018
The ride-hailing service Uber has been fined the equivalent of nearly $1.2 million by British and Dutch authorities for failing to protect customers’ data during a cyberattack in 2016. Britain’s Information Commissioner’s Office said Tuesday it fined the company 385,000 pounds ($491,000) and Dutch officials imposed a 600,000-euro ($679,000) fine for violating Dutch data protection laws. […]
-
DEBUNKING THE CYBERSECURITY THOUGHT THAT HUMANS ARE THE WEAKEST LINKOctober 15, 2018
EXPERTS AT THE HIMSS HEALTHCARE SECURITY FORUM SAID THE NEXT PHASE OF INFOSEC SHOULD BE TO SECURE THE HUMAN AND PUT SAFETY NETS IN PLACE TO PROTECT THEM. Theresa Payton, CEO of Fortalice Solutions, speaking at the HIMSS Healthcare Security Forum in Boston on Monday. BOSTON – THE TIME HAS COME TO MOVE BEYOND THE […]
-
IMPROVING CYBERSECURITY CULTURE REQUIRES CLARITY, COMMITMENTOctober 15, 2018
ONLY A THIRD OF EMPLOYEES HAVE A SOUND UNDERSTANDING OF THEIR ROLE IN THEIR ORGANIZATIONS’ SECURITY CULTURE. Thinkstock According to newly released ISACA and CMMI Institute research on cybersecurity culture, only 34 percent of employees have a sound understanding of their role in their organizations’ security culture. While some may find this statistic startling, I see […]
-
JEFF BEZOS WANTS US ALL TO LEAVE EARTH-FOR GOODOctober 15, 2018
AT BLUE ORIGIN, AMAZON’S SPACE-OBSESSED FOUNDER IS BUILDING ROCKETS, AND HE HOPES TO SOMEDAY BLAST HUMANITY INTO AN EXTRATERRESTRIAL FUTURE. IT’S JULY 17 AND THE TEMPERATURE IN THE WEST TEXAS DESERT IS MARCHING, PREDICTABLY, TOWARD 100 DEGREES. BUT THE AIR IS COOL INSIDE THE ONE-STORY PREFAB BUILDING WHERE JEFF BEZOS, WEARING A NORTH FACE HIKING SHIRT […]
-
30 MILLION FACEBOOK ACCOUNTS WERE HACKED: CHECK IF YOU’RE ONE OF THEMOctober 12, 2018
Late last month Facebook announced its worst-ever security breach that allowed an unknown group of hackers to steal secret access tokens for millions of accounts by taking advantage of a flaw in the ‘View As’ feature. At the time of the initial disclosure, Facebook estimated that the number of users affected by the breach could have been […]
-
HOW THE US FORCED CHINA TO QUIT STEALING-USING A CHINESE SPYOctober 11, 2018
FOR YEARS, CHINA HAS SYSTEMATICALLY LOOTED AMERICAN TRADE SECRETS. HERE’S THE MESSY INSIDE STORY OF HOW DC GOT BEIJING TO CLEAN UP ITS ACT FOR A WHILE. KEVIN AND JULIA GARRATT HAD SPENT NEARLY ALL OF THEIR ADULT LIVES IN CHINA. A DEVOUT CHRISTIAN COUPLE IN THEIR FIFTIES WITH AN ENTREPRENEURIAL STREAK, THEY OPERATED A CAFÉ […]
-
EVERYTHING WE KNOW ABOUT FACEBOOK’S MASSIVE SECURITY BREACHOctober 2, 2018
MARLENE AWAAD/BLOOMBERG/GETTY IMAGES FACEBOOK’S PRIVACY PROBLEMS severely escalated Friday when the social network disclosed that an unprecedented security issue, discovered September 25, impacted almost 50 million user accounts. Unlike the Cambridge Analyticascandal, in which a third-party company erroneously accessed data that a then-legitimate quiz app had siphoned up, this vulnerability allowed attackers to directly take over user accounts.The bugs […]
-
GOOGLE HACKER DISCLOSES NEW LINUX KERNEL VULNERABILITY AND POC EXPLOITOctober 2, 2018
A cybersecurity researcher with Google Project Zero has released the details, and a proof-of-concept (PoC) exploit for a high severity vulnerability that exists in Linux kernel since kernel version 3.16 through 4.18.8. Discovered by white hat hacker Jann Horn, the kernel vulnerability (CVE-2018-17182) is a cache invalidation bug in the Linux memory management subsystem that […]
-
GHOSTDNS: NEW DNS CHANGER BOTNET HIJACKED OVER 100,000 ROUTERSOctober 1, 2018
Chinese cybersecurity researchers have uncovered a widespread, ongoing malware campaign that has already hijacked over 100,000 home routers and modified their DNS settings to hack users with malicious web pages—especially if they visit banking sites—and steal their login credentials. Dubbed GhostDNS, the campaign has many similarities with the infamous DNSChanger malwarethat works by changing DNS server settings […]
-
THE CYBERSECURITY 202: FACEBOOK HACK COMPOUNDS THE COMPANY’S WOES IN WASHINGTONOctober 1, 2018
Facebook’s problems in Washington just got worse. The social media giant announced on Friday that hackers stole information that could have allowed them to take over 50 million user accounts. The unidentified attackers were able to gain access to a range of profile information, including usernames, hometowns and genders, as my colleague Brian Fung reported. The company has […]
-
GOOGLE WARNED SENATORS, AIDES OF HACKING ATTEMPTS ON PERSONAL EMAILSSeptember 20, 2018
Sen. Patty Murray, D-Wash., works on her cellphone on Capitol Hill. In a recent letter, Sen. Ron Wyden said some senators and Senate staff members were warned that their personal email accounts were targeted by foreign government hackers. Jacquelyn Martin/AP Google has warned some senators and Senate aides that their personal Google accounts have been […]
-
REPORT FINDS STATES HAVE IMPROVED CYBERSECURITY FOR VOTER REGISTRATION DATASeptember 20, 2018
© Getty States have successfully increased cybersecurity surrounding their voter registration databases but still struggle with adopting some security measures, according to a new report released Thursday. The Center for Election Innovation and Research (CEIR) found in a survey of 26 states between June and July of this year that the states had largely stepped up their […]
-
CYBER DEFENCE: WE’LL HACK BACK AT ATTACKERS, SAYS USSeptember 20, 2018
THE PENTAGON SAYS THAT THE US MILITARY MUST TAKE ON ATTACKS BEFORE THEY REACH ITS NETWORKS. The military must be prepared to disrupt hacking attacks before they reach US computer networks, according to a new strategic vision from the Pentagon. The Department of Defense (DoD) has updated its cyber strategy for the first time since […]
-
-
Upcoming Events