23 Aug 2016

FBI Probing Cyber Breach of NY Times Journalists

“The FBI is investigating cyber intrusions targeting reporters of The New York Times and is looking into whether Russian intelligence agencies are responsible for the acts, a U.S. official said Tuesday. The cyberattacks are believed to have targeted individual reporters, but investigators don’t believe the newspaper’s whole network was affected,

Read More
23 Aug 2016

Turns Out You Can’t Trust Russian Hackers Anymore

“ten, in war, mistakes are made. Sometimes, in Russia’s information war against the West, mistakes are made and then published for all the world to see. That seems to be what happened when two supposedly independent hacking groups, believed by security experts to have ties to the Kremlin, posted the

Read More
23 Aug 2016

Why the Internet of Things Needs Different Encryption

“The proliferation of internet-enabled devices warrants a new model for cybersecurity, according to a federal agency.” Source: Why the Internet of Things Needs Different Encryption – Nextgov.com

Read More
22 Aug 2016

How Bitcoin helped fuel an explosion in ransomware attacks

“Secure payment system Bitcoin has many legitimate uses, but like other technologies, it’s also been beneficial to cybercriminals seeking new ways to extort money.” Source: How Bitcoin helped fuel an explosion in ransomware attacks | ZDNet

Read More
21 Aug 2016

Computer Science Professor Gives Failing Grade to Newly Leaked NSA Hacking Tool

“Stephen Checkoway, an Assistant Professor at the Department of Computer Science at the University of Illinois at Chicago, has analyzed some of the exploit code included in the recent Equation Group leak, and his verdict is ‘not impressed.’” Source: Computer Science Professor Gives Failing Grade to Newly Leaked NSA Hacking

Read More
20 Aug 2016

China’s Master Plan for IT Dominance

“The Strategy reinforces official sloganeering that China must control foreign-owned ‘core technologies’ in integrated circuits, large-scale software, and core hardware components. China’s backwardness in these technology building blocks is listed among China’s most ‘prominent challenges.’ Beijing previously sought to adopt ‘core technologies’ through joint ventures and partnerships with leading foreign

Read More
20 Aug 2016

How the NSA snooped on encrypted Internet traffic for a decade

“In a revelation that shows how the National Security Agency was able to systematically spy on many Cisco Systems customers for the better part of a decade, researchers have uncovered an attack that remotely extracts decryption keys from the company’s now-decommissioned line of PIX firewalls. The discovery is significant because

Read More
19 Aug 2016

The NSA Leak Is Real, Snowden Documents Confirm

“ON MONDAY, A HACKING group calling itself the ‘ShadowBrokers’ announced an auction for what it claimed were ‘cyber weapons’ made by the NSA. Based on never-before-published documents provided by the whistleblower Edward Snowden, The Intercept can confirm that the arsenal contains authentic NSA software, part of a powerful constellation of tools used to covertly infect

Read More
18 Aug 2016

FireEye warns ‘massive’ ransomware campaign hits US, Japan hospitals

“The dangerous and as-yet-undefeated Locky ransomware is being hurled at hospitals across the United States and Japan in a ‘massive’ number of attacks, according to FireEye researcher Ronghwa Chong. Locky is a popular ransomware variant that will encrypt files in a way that forces users to pay ransoms or cut

Read More
18 Aug 2016

Private firms to chase cyber-criminals for cash bounties, say police

“Law firms could be incentivised to pursue civil prosecutions against suspected fraudsters including cyber-criminals under proposals currently being considered by the City of London Police. Under the initiative, which is currently in a pilot stage, law enforcement authorities would work with the private sector to identify, seize and recover assets

Read More