Cyber Attacks

Cyber Attacks | News, how-tos, features, reviews, and videos

abstract data statistics
security threats and vulnerabilities

bruce schneier book click here to kill everybody security in the hyper connected world

Bruce Schneier's Click Here to Kill Everybody reveals the looming cybersecurity crisis

Everything is broken, and government and corporations like it that way. But when people start dying because of insecure cyberphysical systems, the overreaction from panicked policymakers could be worse than after 9/11.We need to solve...

ransomware breach hackers dark web

Ransomware hits UK's Bristol Airport, affects flight information screens

Ransomware is being blamed for non-working flight information screens at Bristol Airport in the UK over the weekend.

ransomware

New GandCrab ransomware variant hammers Florida school district

A GandCrab ransomware attack, combined with a Comcast outage, caused a Florida Keys school district’s computer system to be down for a week.

aerial view of pentagon government security dv1282020

5 factors affected by disbanding the Defense Information Systems Agency

Government needs to make tough budgeting decisions, and closing agencies is up for debate. But cutting the Defense Information Systems Agency (DISA) could have a potential impact on national security.

british airways Boeing 747

British Airways hack was by same group that compromised Ticketmaster

The British Airways hack involved a highly targeted approach using 22 lines of skimmer code by the group that compromised Ticketmaster.

number 4 four with binary grunge background

4 frameworks you need to protect your digital enterprise against the latest cybersecurity threats

Cybersecurity attacks are getting vicious, expensive and bringing entire businesses to their knees. CIOs and CISOs don’t have time to reinvent the wheel and should adapt US Government and Department of Defense lighthouse frameworks...

shadowy attacker hooded

Attacker attribution is hard, but sometimes easier than you think

Attribution of an attacker, and uncovering his or her true identity, remains a vexing problem for incident response teams. But in certain cases, it can be solved. Advanced telemetry and geofencing technologies offer the potential to...

power lines

Our electric grid is vulnerable to cyberattacks. Here’s what we need to do

As more state-sponsored cyberterrorists and rogue actors take aim at bringing down the U.S. power grid, the government and private utility companies need to coordinate efforts to mitigate the chances of what could be a major...

Passenger view of an airplane wing above the clouds. / travel / journey / transportation

Where Chicken Little meets information security

Outside of a movie theater, your plane won’t be hacked out of the sky.

Election 2016 teaser - A hacker pulls back the curtain on United States election data

“Political hack” takes on new meaning in the age of cyberwarfare

Political hacking is a real and present danger, but more advanced detection and response capabilities will help defend our democratic institutions better than what is current practice.

CSO: Have you met these hackers? [slide 02]

Rough trade: Why financial markets will need to stay on top of their game

While election hacking is making headlines and Dan Coats is warning about 9/11 style cyberattacks on the US, it is our financial markets that may require the most immediate laser focus. The future preservation of our financial...

05 malware

The router of all evil

Discusses research on threats to home routers, which recently became the target of a Russian malware campaign using the “VPNfilter” malware.

switchboard operators

Rose-colored glasses and sepia-tinted memories

We view history through a rose-colored tint. People often leave out the historical context of events and why they occur. Understanding the evolution of systems and their context allows us to better comprehend past decisions and keep...

porting converting merge switch train track

Growing cyber-kinetic threats to railway systems

Cybersecuring railway systems from potential attackers must become paramount in the digitization that those systems currently undergo. Their cybersecurity is too closely interlinked with the railway safety to leave the door open to...

soccer world cup

Cyber games at the World Cup 2018

Analysis of cyberthreats at the World Cup looking back at cyberattacks from the last tournament and predictions for this year.

thinkstockphotos canada flag

2 Canadian banks hacked, 90,000 customers' data stolen

Bank of Montreal and the Canadian Imperial Bank of Commerce’s Simplii Financial confirmed hackers stole the personal and financial data of thousands of customers.

hunting and monitoring security threats

Cyberwar: Silicon Valley’s new bright, shiny thing

Tech companies are hoping you forget history and ignore their culpability.

cyberwarfare defense illustration

Nation state attacks – the cyber cold war gets down to business

Cyber weaponry is moving to new frontiers: yours. Businesses are the next target on the nation state menu. Are you protected or vulnerable?

Load More