Cyber Attacks/Espionage

Cyber Attacks/Espionage news, information, and how-to advice

black white hat
8 safari tips and tricks do a spotlight search in safari 8

apple watch

10 security risks of wearables

Fitness trackers may not present a huge security risk, but any connected device can be hacked. Here’s what you need to know to minimize those security and privacy threats.

fbi dhs

Feds to battle cybersecurity with analytics

With more real-time information sharing, officials envision cyber defenses moving from 'vaccine' to 'immune system,' a big analytics project that could achieve something like automatic security.

healthcare data breach ts

FBI warns of attacks on anonymous FTP servers

The FBI warns that attackers are targeting vulnerable FTP servers used by small medical and dental offices as a way to obtain medical records and other personal information.

healthcare data breach ts

FBI warns of attacks on anonymous FTP servers

The FBI warns that attackers are targeting vulnerable FTP servers used by small medical and dental offices as a way to obtain medical records and other personal information.

information security threat primary4

9 biggest information security threats through 2019

Each year, the Information Security Forum, a nonprofit association that researches and analyzes security and risk management issues, releases its 'Threat Horizon' report to provide a forward-looking view of the biggest security...

broken key

API flaws said to have left Symantec SSL certificates vulnerable to compromise

Over the weekend, Chris Byrne, an information security consultant and instructor for Cloud Harmonics, published a post to Facebook outlining a serious problem with the processes and third-party API used to deliver and manage Symantec...

Brad Antoniewicz cisco

Cisco security researcher: Ransomware crowd big on customer service

Cisco security research breaks down the anatomy of a cyberattack throughout the exploit kit infection chain, all the way to ransomware attacks and investigation into such breaches, at SecureWorld Boston event

IRS

IRS makes tax refund scams harder but W-2 phishing attacks continue unabated

Anti-fraud measures by the Internal Revenue Service (IRS) and state agencies over the past two years have made tax refund scams harder for cyber criminals to pull off even as attacks targeting taxpayer information continue unabated.

00 7spies title

How worried should your organization be about cyber espionage?

Criminal gangs are turning over millions from breaching businesses - but the organisations with the biggest budgets are the intelligence agencies of nation states. How seriously should your organisation take cyber espionage?...

iphone7 Apple store

Hackers threaten to wipe millions of Apple devices, demand ransom

A group of hackers is threatening to wipe millions of iOS devices in two weeks if Apple doesn't pay them US$150,000.

IRS

IRS issues new tax scam warnings, FSA tool suspended due to security concerns

The Internal Revenue Service (IRS) has issued a new warning to businesses, taxpayers, and tax prep professionals about Phishing scams targeting the sensitive information they work with on a daily basis. Soon after, the IRS and the US...

170301 mwc 03173

Cisco to patch 300 devices against flaw found in CIA archives

After digging through the CIA archives released by WikiLeaks, Cisco says they've discovered a previously unknown flaw impacting 318 switch models. The bug, which the CIA has known about for an undetermined amount of time, can allow a...

IRS

More than 120,000 affected by W-2 Phishing scams this tax season

Tax season doesn't officially end in the United States until April 18. At last count, 110 organizations have reported successful Phishing attacks targeting W-2 records, placing more than 120,000 taxpayers at risk for identity fraud.

05 public wifi

Is your family's cybersecurity worth $20 a month?

If you're anything like me you're probably constantly on the prowl for WiFi networks to log into so that you can work, listen to music, browse, shop or read. Without being connected to the cloud via the internet your laptop or iPad...

cia cyber

How to destroy angels

An Internet of Things security researcher and exploit developer's professional analysis of the progress made by the CIA in the context of the Weeping Angels smart television research project.

phone picture conference

Protecting the enterprise against mobile threats

Mobile devices have transformed the digital enterprise allowing employees to access the information they need to be most productive from virtually anywhere. Has that convenience come at a cost to enterprise security, though?

hackers shadows group gang

Profiling 10 types of hackers

Understanding the different types of hackers that exist and what motivates them can help you to identify the attackers you are most susceptible to and properly defend yourself and your organization against cyberattacks.

170301 mwc 03173

Cisco and Apache issue warnings over Zero-Day flaw being targeted in the wild

Cisco's Talos says they've observed active attacks against a Zero-Day vulnerability in Apache's Struts, a popular Java application framework. Cisco started investigating the vulnerability shortly after it was disclosed, and found a...

Load More