Will NotPetya Victim Get The Files Vack
He added that the ransomware element was probably intended to distract attention from the idea that a nation-state attacker of some sort was behind it, citing the Shamoon malware in 2012, while the...
View ArticleIs Open Source Winning
Red Hat's business model revolves around offering services and certification around its own Linux distribution plus middleware and other open source enterprise software.
View ArticleLloyd’s Of London Sounds The Alarm On Impacts Of Cyber Attacks
A major, global cyber attack could lead to an average of $53 billion of economic losses, a figure on par with a catastrophic natural disaster such as U.S. Superstorm Sandy in 2012, Lloyd’s of London...
View ArticleDid The Dow Jones Cloud Server Leak Personal Data
If it has been avoided a lot of people might be the sole owners of their own email addresses and some of their credit card details unmolested.
View ArticleNew High-Level Phishing Attack Focuses On Politicians
BitDefender writes: "We presume that this method of pairing social engineering with a multi-stage Trojan downloader is also an evolutionary step to keep [DarkHotel's] malware competitive as their...
View ArticleDef Con Hackers Focus On Voting Machines, Databases
Hackers attending the Def Con hacking convention in Las Vegas were encouraged breach voting machines and voter databases in a bid to uncover vulnerabilities that could be exploited to sway election...
View ArticleRansomware Now Has Customer Service
Hackers behind some of the most infamous ransomware out there are taking some hints from legit Wall Street companies. Malware strains like Locky and Cerber helped make ransomware a $25 million industry...
View ArticleRansomware Cripples 1 in 5 Small Businesses After It Hits
When it comes to ransomware, it only takes one hit to cause catastrophic damage. That’s the assessment of cybersecurity company Malwarebytes, which has found as many as one third of...
View ArticleSymantec Ups Forecast
Analysts on average were expecting revenue of $5.15 billion and profit of $1.79 per share.
View ArticleShipping Companies Go Low Tech To Avoid Cyber Attacks
The risk of cyber attacks targeting ships’ satellite navigation is sparking some countries to reach back through history and develop back-up systems with roots in World War Two radio technology. Ships...
View ArticleChina Claims ‘Unbreakable’ Code With Quantum Satellite Transmission
China has transmitted an “unbreakable” code from a satellite to the Earth, heralding the first time space-to-ground quantum key distribution technology has been realized, state media said on Thursday....
View ArticleMore Unaired HBO Shows Released By Hacker
Hackers have loaded onto the internet more unaired episodes of popular HBO shows but the latest leak did not include anything on the hit series “Game of Thrones,” the Associated Press reported. The...
View ArticleDid NotPetya Cost Maersk Cost Over 100 Million In Lost Revenue
Other companies affected include fast-moving consumer goods company Reckitt Benckiser, which has said that the outbreak would cost the company around $100m or more in lost revenues in the second...
View ArticleIs The Locky Ransomware Back To Wreak Havoc
Back then, security researchers at Proofpoint pointed out the connection between Dridex and Locky.
View ArticleHas The Playstation Network Suffered Another Breach
Reports claim that the hack of Sony's social media accounts was achieved using its Sprout Social management account, which also gave OurMine access to user registration information such as names and...
View ArticleDoes Kaspersky Have Ties To The Russian Government
However the move also comes as Russia is engaged in its own push to stamp American tech giants like Microsoft out of that country's systems. Rather than being security issues, it is also possible that...
View ArticleEmonet Trojan Back On The Scene
It's typically propagated via phishing emails either containing malicious attachments, or links to a URL hosting a JavaScript or document file that downloads and installs the Emotet payload.
View ArticleDid The CIA Spy On Intel’s Partners
Since 2009 this software has been siphoning data back to the CIA on the off-chance those partners are holding out on them.
View ArticleMillions Of Users Info Left Exposed By Time Warner Cable
More than four million records of users of Time Warner Cable’s MyTWC app were discovered unsecured on an Amazon server last month, according to digital security research center Kromtech Security...
View ArticleEssential Phone Owners Received Email Asking For Proof Of Identity
The term “improperly configured” is a nightmare that dogs IT organizations everywhere. It can refer to a firewall protecting an enterprise; it can create problems on a web server. For one newly minted...
View Article