No One Can Afford an Attack - Find the best Cybersecurity Pros to Protect Your Business Data
Welcome Guest | Sign In
TechNewsWorld.com
Rakuten Super Logistics
The Cloud's Hazy Security
May 31, 2018
A significant percentage of IT systems are cloud-based, according to a recent survey. The cloud is a key enabler for emerging technology, suggests the CompTIA poll, which was conducted last month. Cloud computing was one of four trends respondents expected to feature heavily in IT conversations over the next 12 to 18 months, the survey found. Others were AI, the IoT and cybersecurity.
FBI Declaws Russian Fancy Bear Botnet
May 25, 2018
The FBI has disrupted a network of half a million routers compromised by the group of Russian hackers believed to have penetrated the DNC and the Hillary Clinton campaign during the 2016 elections, according to reports. The hacker group, known as "Fancy Bear," has been using a malware program called "VPN Filter" to compromise home and small office routers.
No Cure for Cyber Insecurity?
April 6, 2018
An alarming number of major U.S. retailers, industrial firms, government agencies and other organizations have been hit in a recent wave of cyberbreaches that may signal increasing vulnerability for consumers and businesses alike. The attacks have exposed millions of consumer payment cards to fraud. Cyberthieves have used a variety of methods to infiltrate corporate computer systems.
Atlanta Works to Break Ransomware Hold
March 30, 2018
Nearly a week after it became the target of one of the largest ransomware attacks to date, the City of Atlanta has made progress toward recovery, but it is still far from business as usual. Hackers encrypted many of the city government's vital data and computer systems. Mayor Keisha Lance Bottoms characterized the ransomware attack as "a hostage situation."
US Charges 9 Iranians in Massive Academic Research Theft
March 27, 2018
The DoJ has charged nine Iranian nationals for engaging in a massive phishing campaign on behalf of the Iranian Revolutionary Guard. The allegations include the theft of $3.4 billion in research and intellectual property from 320 colleges and universities in the U.S. and abroad, as well as from 47 foreign and domestic companies, plus several federal agencies, state governments, and the UN.
Fileless Malware: Why You Should Care
March 2, 2018
It's a truism that just like organizations adapt, so too do criminals. Anyone who has ever seen a Wells Fargo commercial knows that there was a time when stagecoaches were a normative method for transporting cash and valuables. But what modern criminals in their right mind would attempt robbing a Brink's truck on horseback? That strategy might have worked well in the days of the Pony Express.
Don't Pay the Hackers
January 30, 2018
If you follow security news, you may have noticed a disturbing trend. Last year, we learned that Uber paid attackers $100,000 to keep under wraps their stealth of the personal information of 50 million Uber riders. More recently, we learned that Hancock Health paid approximately $55,000 in bitcoin to bring hospital systems back online. The payment of ransoms could be more common than it appears.
Namogoo CEO Chemi Katz: Malware Can Ruin the Customer Journey
January 12, 2018
When all goes well, the customer journey "ends with buying a product," said Chemi Katz, CEO of Namogoo. "Hijacking interferes with the customer's journey. It can be a pop-up that the company didn't put there, or something that will lead a customer out of the website. It's any interference that doesn't come from the e-commerce business itself, but from a third party."
Zealot Loads Cryptocurrency Miner on Linux, Windows Machines
December 22, 2017
A new Apache Struts campaign that researchers named "Zealot" has come to light in recent weeks. Zealot loads Windows or Linux-based machines by installing a miner for Monero, which has become one of the hottest cryptocurrencies used in recent malware attacks. Zealot uses NSA-linked EternalBlue and EternalSynergy exploits, according to the F5 Labs researchers who discovered the campaign.
US Fingers North Korea for WannaCry Epidemic
December 20, 2017
The United States on Tuesday accused North Korea of responsibility for a global ransomware attack that locked down more than 300,000 computers in 150 countries earlier this year. The U.S. now has enough evidence to support its assertion that Pyongyang was behind the WannaCry attack in May, Homeland Security Advisor Tom Bossert told reporters at a White House press briefing.
Marcher Malware Poses Triple Threat to Android Users
November 7, 2017
A three-pronged banking malware campaign has been infecting Android phones since the beginning of this year, according to Proofpoint. Attackers have been stealing credentials, planting the Marcher banking Trojan on phones, and nicking credit card information. So far, they have targeted customers of BankAustria, Raiffeisen Meine Bank and Sparkasse, but the campaign could spread beyond Vienna.
WPA2 Flaw Could Blow WiFi Systems Wide Open
October 17, 2017
A security flaw in WPA2, the security protocol for most modern WiFi systems, could allow an attacker to steal sensitive data including emails, credit card numbers and passwords, Researchers at Belgian university KU Leuven reported Monday. Depending on the network configuration, the flaw also could allow an attacker to inject or manipulate information in the system.
Small Companies Often in the Dark About Cyberattacks
October 10, 2017
Nearly 60 percent of small businesses have been the victims of a cyberattack over the past year, but the vast majority didn't realize that they had been attacked, according to Nationwide's third annual survey of 1,069 businesses with fewer than 299 employees. Initially, only 13 percent of the participating companies said they had been victims of a cyberattack.
RoboCyberWall Aims to Block Linux Server Hacks
October 4, 2017
RoboCyberWall has launched its proprietary precision firewall solution bearing the same name. RoboCyberWall is designed to protect HTTP and HTTPS ports on Linux-based Apache2 and NGINX Web servers. The patent-pending firewall blocks all known exploits and zero-day attacks on Apache2 and NGINX Web servers, according to the developer. The Linux server firewall solution targets small and mid-sized business users.
Behind-the-Scenes Cryptocurrency Mining Discovered on Showtime Sites
September 27, 2017
Showtime Networks apparently has mined the websites of online viewers using the same Coinhive technology that The Pirate Bay recently used in a test run on its site. A subsidiary of CBS, Showtime is a premium television network that offers professional boxing, feature films, original scripted television shows like Ray Donovan and other programming.
Malware Embedded in CCleaner Tool Puts Millions at Risk
September 19, 2017
Malicious code has been discovered in two versions of Piniform's CCleaner housekeeping utility, the company disclosed on Monday. Piniform is owned by Avast, whose security products are used by more than 400 million people. The malware infecting CCleaner could give hackers control over the devices of more than 2 million users. CCleaner is designed to rid computers and mobile phones of junk.
WannaCry Hero Arrested on Kronos Malware Charges
August 5, 2017
In a stunning twist, U.S. authorities have arrested a British cyber-researcher credited with stopping the spread of the WannaCry ransomware virus on charges he helped develop and deploy the Kronos banking trojan that attacked financial institutions around the world in 2014. A federal grand jury in Wisconsin last month handed down a six-count indictment against Marcus Hutchins, a citizen of the UK.
Petya's Ransomware Cloaking Device
July 11, 2017
Recent ransomware threats have escalated into a global crisis, and cybersecurity experts and government authorities have redoubled their investigative efforts. Of grave concern is the possibility that the recent Petya attack had more sinister motives than typical ransomware operations, and that state actors were involved behind the scenes. The Petya attack actually used ransomware as a cover.
IoT Fuels Growth of Linux Malware
July 5, 2017
Malware targeting Linux systems is growing, largely due to a proliferation of devices created to connect to the Internet of Things. That is one of the findings in a report WatchGuard Technologies released last week. The report, which analyzes data gathered from more than 26,000 appliances worldwide, found three Linux malware programs in the top 10 for the first quarter of the year.
Petya Ransomware Sinks Global Businesses Into Chaos
June 28, 2017
A new ransomware exploit dubbed "Petya" struck major companies and infrastructure sites this week, following last month's WannaCry ransomware attack, which struck more than 300,000 computers worldwide. Petya is believed to be linked to the same set of hacking tools as WannaCry. Petya already has impacted a Ukrainian international airport and shut down radiation monitoring systems at Chernobyl.
3 WannaCry Talking Points to Win Security Buy-In
June 21, 2017
By this point, most technology practitioners -- and nearly all security practitioners -- know about WannaCry. In fact, you might be sick of people analyzing it, rehashing it, sharing "lessons learned" about it, and otherwise laying out suggestions -- in some cases, contradictory -- about what you might do differently in the future. The level of unsolicited advice can border on the annoying.
Kaspersky to US: Check Our Source Code
May 27, 2017
Cybersecurity expert Eugene Kaspersky reportedly has volunteered to turn over his company's software source code to allay fears about possible ties with the Russian government. Kaspersky made the offer public at CeBIT Australia last week. Some U.S. officials have expressed concerns that Kaspersky Lab might have a close working relationship with the Russian government.
Report: Cybersecurity Dangerously Lax at Mar-a-Lago
May 19, 2017
Internet security at Mar-a-Lago -- the private club President Trump owns and has dubbed the "Southern White House" -- is weak, based on a recent investigation. Trump has used the resort to meet with staffers and foreign heads of state on official business. In February, he took a call about a North Korean ballistic missile launch in Mar-a-Lago's dining room, with members and waiters present.
Massive Ransomware Attack Reaps Meager Profits
May 17, 2017
The WannaCry ransom attack that quickly circled the globe last week is not yet fully contained. So far, it has impacted more than 300,000 computers in 150 countries. However, one of the remarkable things about it is that only a trifling $100,000 in ransom, give or take, apparently has been paid. That represents a surprisingly low response from an attack generally considered the biggest ever.
Microsoft Bashes NSA Following Massive Ransomware Attacks
May 15, 2017
Microsoft this weekend unleashed its wrath on the National Security Agency, alleging it was responsible for the ransomware attack that began last week and has spread to thousands of corporate, government and individual computer systems around the world. Microsoft Chief Legal Officer Brad Smith launched a blistering attack on the NSA and governments worldwide.
British Hospitals, FedEx Among Thousands Hit by Ransomware
May 13, 2017
Authorities are investigating a massive ransomware attack that reportedly hit more than 45,000 computers in 74 countries worldwide, including the UK's NHS England national health service, international delivery service FedEx, and Spanish telecom firm Telefonica. Security experts have linked the exploit to an earlier leak by the Shadow Brokers, who allegedly pilfered hacking tools from the NSA.
The IoT's Scramble to Combat Botnets
May 11, 2017
With shadowy botnet armies lurking around the globe and vigilante gray-hat actors inoculating susceptible devices, the appetite for Internet of Things security is stronger than ever. "If you throw IoT on a con talk, you've got a pretty good chance to get in," remarked information security professional Jason Kent, as he began his presentation at Chicago's Thotcon conference last week.
Millions May Have Picked Up FalseGuide Malware at Google Play Store
April 26, 2017
As many as 2 million Android users might have downloaded apps that were infected with the FalseGuide malware, security research firm Check Point warned on Monday. The oldest of the infected apps could have been uploaded to Google Play as long ago as last November, having successfully remained hidden for five months, while the newest may have been uploaded as recently as the beginning of April.
New Strain of Linux Malware Could Get Serious
April 25, 2017
A new strain of malware targeting Linux systems, dubbed "Linux/Shishiga," could morph into a dangerous security threat. Eset disclosed the threat, which represents a new Lua family unrelated to previously seen LuaBot malware. Linux/Shishiga uses four protocols -- SSH, Telnet, HTTP and BitTorrent -- and Lua scripts for modularity, wrote Detection Engineer Michal Malik and Eset researchers.
WikiLeaks Exposes CIA's Device Surveillance Tricks
March 23, 2017
WikiLeaks has released more Vault 7 documentation online, including details about several CIA projects to infect Apple's Mac computer firmware and operating system. The site unloaded its first batch of stolen Vault 7 data earlier this month. The CIA's Embedded Development Branch developed malware that could persist even if the targeted computer were reformatted and its OS were reinstalled.
See More Articles in Malware Section >>
Facebook Twitter LinkedIn Google+ RSS
Rakuten Super Logistics
Which company is most likely to hit the $1 trillion valuation milestone first?
Alphabet/Google
Amazon
Apple
Microsoft
A different company
Rakuten Super Logistics