Explore Technology Certificate Programs That Fit Your Needs /// Click here to learn more.
Welcome Guest | Sign In
DDoS Attacks Create Smokescreens for Larceny
October 7, 2015
DDoS attacks have evolved from protest tool to criminal weapon. More than one in three DDoS attacks are used to plant malware or a virus on company systems, and 40 percent of them result in data theft, according to NeuStar's semiannual DDoS attack and protection report. "Until two years ago, DDoS attacks were really seen as just a disruption and annoyance tool," said NeuStar's Joe Loveless.
Federal Cybersecurity Performance Gets Mixed Reviews
October 6, 2015
The spectacular database breach that affected nearly 21 million people highlighted the continuing vulnerability of U.S. government information technology systems, despite the expenditure of billions each year on cybersecurity. The breach resulted in the departure of the head of the agency and triggered widespread questioning about the adequacy of federal IT security by members of Congress.
Another Day, Another Billion Android Users at Risk
October 5, 2015
Google on Monday released an over-the-air update for Nexus devices, which includes patches for the latest Stagefright vulnerabilities and other flaws. Android's Stagefright media processing feature, which recently imperiled 1 billion devices around the world, was once again putting them at risk, Zimperium revealed last week. Zimperium found two new vulnerabilities.
Black Hats Offer Million-Dollar iOS 9 Bug Bounty
September 30, 2015
Zerodium has posted a million-dollar bounty for juicy iOS 9 bugs or jailbreaks. Zerodium runs a market where exploits and vulnerabilities are bought and sold, according to Damballa. "While there is no insight into a specific buyer, we can assume if an exploit for iOS 9 is found, Zerodium will sell it for way more than $1 million," wrote Loucif Kharouni, senior threat researcher at Damballa.
Two Risky Strategies Could Threaten Apple's Long-Term Survival
September 28, 2015
One of the ironies of my career is that when I first went to work for a tech company, I specifically wanted to work for a firm that was breaking the mold -- not representative of it. So, in my initial interview, I was concerned that IBM was going to buy the firm because it was the mold at that time. I was promised that there was a contract that said it couldn't. Then, six months later, it did.
OPM's Latest Bad News: 5.6 Million Fingerprints Lifted
September 25, 2015
The Office of Personnel Management on Wednesday revealed that the hackers who penetrated its records system stole 5.6 million fingerprints of federal employees -- five times the 1.1 million originally reported. The cyberattack, which came to light this spring, compromised the Social Security numbers and other sensitive information of 21.5 million people.
What Goes Around Comes Around: Russia Gets Hacked
September 23, 2015
Russia has been a prime suspect in recent cyberattacks against U.S. government targets. However, Russia has been poked with the other end of the hacker stick. For more than two months, hacker attacks originating in China have bedeviled Russia's military and telecom sectors, Proofpoint researchers have revealed. Russian-speaking analysts working at global financial firms also have been attacked.
Feds Award $500M Credit-Monitoring Contract Following OPM Breach
September 23, 2015
The U.S. government spends millions of dollars on IT systems designed to prevent cybersecurity attacks, but they still occur. Government agencies are hopeful that the learning curve will improve dramatically, and breaches will be reduced. In the meantime, what happens to people affected by a breach after an attack succeeds? This year, the OPM was hit with one of the biggest hack attacks ever.
Exploding Chip Could Thwart Cyberthieves
September 22, 2015
Researchers at Xerox PARC have developed a self-destructing mechanism for microchips embedded on a hardened glass surface. The glass can self-destruct upon command and could be used to secure personal data such as health and banking records. It also can be used to destroy encryption keys stored on memory chips in standard consumer, enterprise and government electronic devices.
Malware Jumps Apple's Garden Wall
September 22, 2015
Developers who unknowingly used a malicious tool to code their programs uploaded hundreds of malware-infected apps to the iTunes App Store, China-based iOS developers reportedly discovered last week. Security researchers around the world have analyzed it. Called "XcodeGhost," the malware is hidden in an unauthorized version of a program Apple distributes to create iOS apps.
Patched Android Lockscreen Still a Threat
September 21, 2015
Google recently issued a patch for Nexus mobile devices to fix an Android Lollipop vulnerability that lets hackers bypass the lockscreen and gain control of mobile devices. However, it could take weeks to months for manufacturers and service providers to roll out the patch for other Android devices. University of Texas security researcher John Gordon discovered the vulnerability.
Will the IoT Be Held for Ransom?
September 17, 2015
A perfect cybercrime storm is brewing, and two of the main ingredients are ransomware and the Internet of Things. Cybercrime has become an industry with all the operational trappings of any legitimate sector, McAfee Labs noted earlier this month. It has its own supply chain, market segments, service providers, and finance and trading systems. It has its own business models.
IoT Can Open Doors to Cybercriminals, FBI Warns
September 16, 2015
The FBI has warned businesses and consumers to be careful when deploying devices that connect to the Internet of Things. As more companies and consumers use IoT devices to improve efficiency and convenience, their connection to the Internet creates opportunities for cybercriminals, the FBI said. The "Internet of Things" is a broad term that encompasses myriad devices that connect via cyberspace.
Court Bolsters FTC's Authority to Regulate Cybersecurity
September 16, 2015
Companies that experience data security breaches have a lot to worry about -- but their problems encompass much more than responding to irate consumers. The business community also has to worry about the U.S. government, which can penalize e-commerce companies for failing to provide adequate protection for consumers' personal data. A recent federal court ruling could give the FTC more muscle.
Hackers Home in on Health, Education, Government Sectors
September 16, 2015
A New York healthcare provider, California's higher education system and the Department of Energy have become the latest targets of data bandits. The latest massive data breach at a healthcare provider reportedly took place at Excellus BlueCross BlueShield, which last week revealed that the personal data of more than 10 million people was at risk due to an attack that dates back to December 2013.
Netflix Move Prompts Premature Antivirus Software Obit
September 11, 2015
Netflix reportedly is in the process of dumping its antivirus software and placing all its faith in an alternative solution to protect its more than 60 million subscribers from online nastiness, a move that prompted one pundit to pronounce the death of antivirus software yet again. Such dire pronouncements have been made for years, and they're likely to be made for many years to come.
Samsung's IoT Products Make Themselves at Home
September 9, 2015
Samsung last week plunged into the Internet of Things for the home market, unveiling a new hub to control connected gadgets, home and sleep monitors, and a smart washing machine. The company made the announcements at IFA 2015. The SmartThings Hub for home devices is built around a powerful processor that enables video monitoring, and it includes a battery backup that lasts up to 10 hours.
Laser Pointer Hack Easily Dupes Driverless Cars
September 8, 2015
A simple off-the-shelf laser pointer could be combined with a very basic computer to disrupt the multithousand-dollar Lidar systems installed in most self-driving cars, a security researcher warned last week. A setup that costs about $60 could trick the system, which autonomous vehicles use to sense objects in the road, into responding as though there were obstacles ahead when there were none.
Linux Foundation Security Checklist: Have It Your Way
September 6, 2015
The Linux Foundation's recently published security checklist may draw more attention to best practices for protecting Linux workstations, even if IT pros do not embrace all of its recommendations. Konstantin Ryabitsev, the foundation's director of collaborative IT services, developed the list for the use of LF remote sysadmins, to harden their laptops against attacks.
An Insider Betrayed Ashley Madison - Go Figure
September 4, 2015
When the giant data breach at infidelity website Ashley Madison made headlines last month, the CEO of the site's owner was quick to claim the caper was an inside job. He had the attacker's profile and work credentials, Avid Life Media's CEO Noel Biderman told ace cybersecurity blogger Brian Krebs. Though not an employee, the individual had accessed the company's technical services.
KeyRaider Malware Busts iPhone Jailbreakers
September 3, 2015
Data-robbing malicious software dubbed "KeyRaider" has stolen more than 225,000 valid Apple accounts and thousands of certificates, private keys and purchasing receipts, Palo Alto Networks' Unit 42 reported last week. The firm identified the malware in cooperation with WeipTech, which found the accounts on a server while it was analyzing suspicious user-reported iOS tweaks.
Baby Monitors Riddled With Security Holes
September 2, 2015
Rapid7 has released a report on an assortment of new vulnerabilities found in baby monitors: predictable information leaks; backdoor credentials; reflective, stored XSS; direct browsing; authentication bypass; and privilege escalation. "Many of the issues would allow video and audio from the device to be viewed by an attacker," said Mark Stanislav, senior security consultant at Rapid7.
Qualcomm Sics Fire-Breathing Snapdragon on Android Hackers
September 1, 2015
Qualcomm on Monday announced Snapdragon Smart Protect, a hardware-software product that could make the world a safer place for Android smartphone users. Snapdragon Smart Protect, which will become available with Qualcomm's upcoming Snapdragon 820 processor, will provide real-time, on-device machine learning designed to support accurate and effective detection of zero-day malware threats.
Shadow IT Feeds 'Man in the Cloud' Attacks
August 27, 2015
Shadow IT -- the use of unauthorized online services by company employees -- is a concern of cyberwarriors charged with defending business systems against network attacks. There's new evidence that those concerns are justified. A new attack vector on business systems leverages the synchronization features of services like Dropbox and Google Drive to perform malicious mischief.
Cyber-Posse Aims to Round Up Ashley Madison Hackers
August 25, 2015
The Toronto Police Service on Monday reported on the progress of Project Unicorn, the official investigation into the hack attack on Ashley Madison, an adultery-promoting website. The Toronto police are working closely with the U.S. Department of Homeland Security, the RCMP, the FBI, and the Ministry of the Attorney General's criminal law office in carrying out the investigation.
Ashley Madison Hackers: Catch Them if You Can
August 20, 2015
The Ashley Madison hacker gang will be tough to apprehend. The hackers this week dumped nearly 10 gigabytes of stolen personal data onto the Web -- details gleaned from accounts established on the site, which is dedicated to matching up people who want to engage in extramarital affairs. It's "nearly impossible" to track down attackers, noted Bit9 + Carbon Black's Ben Johnson.
Study: Chinese Hackers Are Savvy, Surgical
August 13, 2015
A clandestine group of sophisticated Chinese hackers have infected scores of sites on the Web and stolen documents from industrial and government organizations with surgical precision, according to a Dell SecureWorks study released last week. Dubbed "Threat Group 3390," the cybergang has used infected websites of some 100 organizations across the globe.
Chinese Hackers May Have Burrowed Into Airlines
August 11, 2015
The China-based hacking team that has been infiltrating U.S. government and business computer systems appears to be behind two newly discovered attacks -- this time on travel reservation processor Sabre and American Airlines. Sabre confirmed that its systems -- which contain sensitive records on as many as a billion travelers -- recently were breached. American Airlines is investigating.
Cyberwarrior Demand Outpaces Supply
August 6, 2015
Demand for cybersecurity professionals continues to far outpace supply, according to a Burning Glass Technologies report released last week. Cybersecurity hiring remains concentrated in government agencies and among defense contractors, the third annual cybersecurity job market report notes, but hiring has started to boom in industries handling consumer data.
Commerce Dept. Caves on Security Export Rules
July 30, 2015
Some proposed federal rules on the export of security tools created a tumult in cybersecurity circles -- a tumult that's pushed the rules into limbo. The comment period for the rules, which the U.S. Department of Commerce first aired in May, ended July 20 -- and although the regulations have noble intentions, they also could have dire consequences.
See More Articles in Cybersecurity Section >>
Facebook Twitter LinkedIn Google+ RSS
I plan to do my holiday shopping…
Online only -- I like the convenience and comfort.
Online only -- I'd shop in stores if their stock weren't so limited.
At brick-and-mortar stores only -- I like to see what I'm getting.
At brick-and-mortar stores only -- I enjoy the holiday shopping atmosphere.
At brick-and-mortar stores only -- I want to support local merchants.
Online and in stores -- I want the best of both worlds.
I'm not planning on doing any holiday shopping.