16 Aug 2018

India’s Cosmos Bank loses $13.5 mln in cyber attack

Cyber thieves stole $13.5 million by using malware to withdraw cash in 14,849 transactions in 28 countries, all within 2 hours. The malware attack redirected payments to a proxy switching system responsible for processing payment requests. This proxy approved the fraudulent requests. Police are pursuing the matter, but with little

Read More
16 Aug 2018

FBI warns banks of potential ‘unlimited’ ATM heist

The FBI has issued warnings to U.S. banks of a suspected “cash out” that may steal millions by using cloned ATM cards. The effort has been globally organized and could be launched anytime. The attack is most likely connected to an unknown or undisclosed card issuer breach.  Source: FBI warns

Read More
16 Aug 2018

Google tracks users who turn off location history

Researchers have found that Google still collects user location data even when location tracking has been disabled. The company does through by storing a location snapshot when the Maps application is opened, as well as through weather updates and even Google searches not related to location. In order to prevent

Read More
16 Aug 2018

Hacked Appliances Could Shut Down the Power Grid, Researchers Say

Researchers from Princeton University simulated an attack on a power network serving a population the size of California. The simulation found that a 1% surge in demand created by hacked smart appliances like air conditioners and water heaters could cause disruption to the network. This kind of attack is structured

Read More
14 Aug 2018

Russian Military Spy Software is on Hundreds of Thousands of Home Routers

“The Russian military is inside hundreds of thousands of routers owned by Americans and others around the world, a top U.S. cybersecurity official said on Friday. The presence of Russian malware on the routers, first revealed in May, could enable the Kremlin to steal individuals’ data or enlist their devices in

Read More
14 Aug 2018

Experts question the benefit of proliferating cybersecurity offices

A long series of state agencies and departments have been founded to secure U.S. programs, assets, and operations, but some experts are arguing that this has generated more confusion than security as the government has not worked to coordinate private sector capabilities. Problems of information sharing and overlapping agendas have

Read More
14 Aug 2018

Hackers Target Marines for Pentagon’s Latest Bug Bounty

A live hacking event in Las Vegas is targeting the Marine Corps in the Pentagon’s latest bug bounty program. Around 100 hackers were selected to identify vulnerabilities in the Corps’ primary communications network. Over the nine-hour event, hackers found 75 vulnerabilities and won $80,000 in bounties. “Working with the ethical

Read More
13 Aug 2018

Fax Machines Are Still Everywhere, and Wildly Insecure

“It’s tempting think of fax machines as a relic, every bit as relevant as an eight-track tape. But fields like health care and government still rely on faxes every day. Even your all-in-one printer probably has a fax component. And new research shows that vulnerabilities in that very old tech

Read More
13 Aug 2018

How long is too long for a cyber operation? NSA has an idea

“Research conducted by the National Security Agency has found that after five hours of cyber operations, performance drops and frustration begins to increase among staffers. Those longer missions caused roughly 10 percent more fatigue and frustration compared to operations that lasted less than five hours, Celeste Paul, a senior researcher

Read More
13 Aug 2018

This Guy Hacked Hundreds Of Planes From The Ground

A cybersecurity researcher used antennas to access large troves of data from airplanes flying overhead. While segmentation prevented access to navigation and other important features, the hackers was able to access important information and even locate a number of supposedly hidden military bases. While many of the vulnerabilities have been

Read More