Cyber Attacks

Cyber Attacks | News, how-tos, features, reviews, and videos

network security hacker virus crime

A look back at cybercrime in 2018

Prepare now to mitigate the most cyber risk in 2019!

marriott breach

US senator proposes jailing execs, fining companies for data breaches

Following the Marriott breach, a U.S. senator proposes jailing senior company executives and levying multi-billion-dollar fines for data breaches.

fbi badge gun

Ad fraud botnet 3ve shut down after infecting 1.7 million PCs

An enormous ad fraud botnet, 3ve, was shut down after 1.7 million PCs were infected to falsify 12 billion ads per day.

spearfishing trap

Russian Cozy Bear APT 29 hackers may be impersonating State Department

Russian Cozy Bear hackers may be impersonating the U.S. State Department in a large, new spear-phishing campaign, plus other cybersecurity news.

5 small business security

Small Business Saturday means it’s time for an annual cyber refresh

5 steps that SMBs should take to review and refresh their security policies and procedures.

group of hackers in digital environment

Cylance researchers discover powerful new nation-state APT

A new APT, dubbed White Company, is flexing its muscle on the world stage, and it has security researchers worried.

malware attack

Worst malware and threat actors of 2018 so far

Researchers name the worst malware and threat actors of 2018 so far, several vulnerabilities were disclosed, and HSBC Bank reveals it suffered a data breach.

intro cyber attack maps

Defense, security and the real enemies

The end of the Cold War meant that the countries that threatened American democracy and our way of life didn’t go away. They adapted to use technology to attack us instead. Now that the extent of these attacks is being made known, we...

abstract data statistics

Top cybersecurity facts, figures and statistics for 2018

Looking for hard numbers to back up your sense of what's happening in the cybersecurity world? We dug into studies and surveys of the industry's landscape to get a sense of the lay of the land—both in terms of what's happening and how...

security threats and vulnerabilities

Why I don’t believe Bloomberg’s Chinese spy chip report

China can and has stolen the information it wants from US companies without using secretly embedded hardware, so why would it jeopardize its massive semiconductor industry?

bruce schneier book click here to kill everybody security in the hyper connected world

Bruce Schneier's Click Here to Kill Everybody reveals the looming cybersecurity crisis

Everything is broken, and government and corporations like it that way. But when people start dying because of insecure cyberphysical systems, the overreaction from panicked policymakers could be worse than after 9/11.We need to solve...

ransomware breach hackers dark web

Ransomware hits UK's Bristol Airport, affects flight information screens

Ransomware is being blamed for non-working flight information screens at Bristol Airport in the UK over the weekend.

ransomware

New GandCrab ransomware variant hammers Florida school district

A GandCrab ransomware attack, combined with a Comcast outage, caused a Florida Keys school district’s computer system to be down for a week.

aerial view of pentagon government security dv1282020

5 factors affected by disbanding the Defense Information Systems Agency

Government needs to make tough budgeting decisions, and closing agencies is up for debate. But cutting the Defense Information Systems Agency (DISA) could have a potential impact on national security.

british airways Boeing 747

British Airways hack was by same group that compromised Ticketmaster

The British Airways hack involved a highly targeted approach using 22 lines of skimmer code by the group that compromised Ticketmaster.

number 4 four with binary grunge background

4 frameworks you need to protect your digital enterprise against the latest cybersecurity threats

Cybersecurity attacks are getting vicious, expensive and bringing entire businesses to their knees. CIOs and CISOs don’t have time to reinvent the wheel and should adapt US Government and Department of Defense lighthouse frameworks...

shadowy attacker hooded

Attacker attribution is hard, but sometimes easier than you think

Attribution of an attacker, and uncovering his or her true identity, remains a vexing problem for incident response teams. But in certain cases, it can be solved. Advanced telemetry and geofencing technologies offer the potential to...

power lines

Our electric grid is vulnerable to cyberattacks. Here’s what we need to do

As more state-sponsored cyberterrorists and rogue actors take aim at bringing down the U.S. power grid, the government and private utility companies need to coordinate efforts to mitigate the chances of what could be a major...

Passenger view of an airplane wing above the clouds. / travel / journey / transportation

Where Chicken Little meets information security

Outside of a movie theater, your plane won’t be hacked out of the sky.

Election 2016 teaser - A hacker pulls back the curtain on United States election data

“Political hack” takes on new meaning in the age of cyberwarfare

Political hacking is a real and present danger, but more advanced detection and response capabilities will help defend our democratic institutions better than what is current practice.

Load More
You Might Also Like