29 Jul 2016

Russian hackers Cozy Bear and Fancy Bear behind DNC breach

Guccifer 2.0, the hacker behind the recent Democratic party email leak, is not a single operator but Russian cybercriminals designated Fancy Bear and Cozy Bear by investigators who have invaded the White House and the Bundestag between them, according to leading cybersecurity firms. Source: DNC email leak: Russian hackers Cozy

Read More
28 Jul 2016

Hacking the Power Grid

“It is potential cyber risks to the electric grid that worry LaFleur the most. The high-voltage interstate grid is, according to LaFleur, by far the most attacked infrastructure in the U.S., and new cyber threats are emerging and evolving with incredible speed. As LaFleur put it, would-be intruders attempt to

Read More
28 Jul 2016

Using a VPN in the UAE is now prohibited

“The President of the United Arab Emirates (UAE) has issued a series of new federal laws relating to IT crimes, including a regulation that forbids anyone in the UAE from making use of virtual private networks (VPN) to secure their web traffic from prying eyes. The new law states that

Read More
27 Jul 2016

Major LastPass security bug puts millions of accounts at risk

“Millions of users of cloud-based password store LastPass could be at risk from hackers after a huge security hole was revealed. The so-called ‘zero-day hole’ – a software vulnerability that the maker is initially unaware of – could enable cybercriminals to remotely break into accounts. What makes the LastPass flaw

Read More
27 Jul 2016

Donald Trump encourages Russia to release Hillary Clinton missing email

“Donald Trump on Wednesday called on Russia to hack Hillary Clinton’s email. ‘Russia, if you’re listening I hope you’re able to find the 30,000 emails that are missing. I think you will probably be rewarded mightily by our press,’ Trump said during a news conference in Florida. Shortly after his

Read More
DHS-ICE
26 Jul 2016

Presidential Policy Directive — United States Cyber Incident Coordination

“PRESIDENTIAL POLICY DIRECTIVE/PPD-41 SUBJECT: United States Cyber Incident Coordination The advent of networked technology has spurred innovation, cultivated knowledge, encouraged free expression, and increased the Nation’s economic prosperity. However, the same infrastructure that enables these benefits is vulnerable to malicious activity, malfunction, human error, and acts of nature, placing the

Read More
26 Jul 2016

Hackers preying on US companies send the cash to China and Hong Kong

“Hackers have stolen billions of dollars from American companies by impersonating CEOs in an email scam — and the loot gets wired to banks in China and Hong Kong 83% of the time. James C. Trainor Jr., assistant director of the FBI’s cyber division, highlighted the reach of the email

Read More
26 Jul 2016

Hackers published replicas and blueprints to TSA master luggage keys

“At an annual hackers conference on Saturday night in New York City, the hackers known as DarkSim905, Nite 0wl, and Johnny Xmas, unveiled replicas and blueprints of the eighth and final master key in a set used by Transport Security Administration agents to open and search fliers’ locked suitcases.” Source:

Read More
25 Jul 2016

Machines v. hackers: Cybersecurity’s artificial intelligence future

“Much of the investment that’s going into the cybersecurity space to fuel the development of automation is directed at responding to cybersecurity incidents. Currently, humans are the ones who figure out how to respond to cyberattacks on networks, working to quickly block suspicious communications and analyze malicious behavior and software. But computers could perform the same

Read More
25 Jul 2016

iOS flaw lets hackers access iPhones using an iMessage

A flaw in the way Apple software handles images allows hackers to take over an iPhone, iPad, Apple Watch, Mac or Apple TV with a simple iMessage or email. The vulnerability in Apple’s picture-handling Image I/O API means that a malicious Tagged Image File Format (TIFF) file can force a so-called

Read More