28 Sep 2016

Cyber firm challenges Yahoo claim hack was state-sponsored

“InfoArmor concluded the Yahoo hackers were criminal after reviewing a small sample of compromised accounts, Andrew Komarov, the firm’s chief intelligence officer, said in an interview. The hackers, dubbed Group E, have a track record of selling stolen personal data on the dark web, and have been previously linked to

Read More
28 Sep 2016

Advancing cybersecurity through automated indicator sharing

“With information sharing, there are three key characteristics: volume (lots of indicators), velocity (speed of sharing), and validation. Unfortunately, you can only ever get two out of three. In this case, the NCCIC has heard from you that you want a lot of information from the government, and you want

Read More
28 Sep 2016

More Attempts to Hack State Election Systems Detected, FBI Director Warns

“Over the past month, voter registration databases in states across the United States have continued to come under cyberassault by hackers, FBI Director James Comey warned lawmakers today. ‘There have been a variety of scanning activities, which is a preamble for potential intrusion activities, as well as some attempted intrusions

Read More
28 Sep 2016

Cyberattacks on personal health records growing ‘exponentially’

“In 2015, 113 million electronic health records were breached, a major leap over the 12.5 million the year before. In 2009, the number was less than 135,000. The number of reported hacks and breaches affecting records of at least 500 individuals rose from none in 2009 to 56 last year,

Read More
28 Sep 2016

Microsoft launches “fuzzing-as-a-service” to help developers find security bugs

“At Microsoft’s Ignite conference in Atlanta yesterday, the company announced the availability of a new cloud-based service for developers that will allow them to test application binaries for security flaws before they’re deployed. Called Project Springfield, the service uses ‘whitebox fuzzing’ (also known as ‘smart fuzzing’) to test for common

Read More
28 Sep 2016

Defending Against Hackers Took a Back Seat at Yahoo, Insiders Say

“Six years ago, Yahoo’s computer systems and customer email accounts were penetrated by Chinese military hackers. Google and a number of other technology companies were also hit.” Source: Defending Against Hackers Took a Back Seat at Yahoo, Insiders Say – NYTimes.com

Read More
28 Sep 2016

A Voice Cuts Through, and Adds to, the Intrigue of Russia’s Cyberattacks

“BIYSK, Russia — Living anonymously, down a winding road in the wilderness of western Siberia, not far from the Mongolian border, the only person so far implicated in the flurry of Russian hacking of the Democratic National Committee and other political sites was obviously enjoying the moment.” Source: A Voice

Read More
28 Sep 2016

Hackers steal Westpark Capital files, demand ransom for data

” A hacking group that claimed responsibility for leaking sensitive documents from a Century City investment bank threatened Tuesday to divulge more data if the firm failed to pay a ransom.” Source: Hackers steal Westpark Capital files, demand ransom for data – LA Times

Read More
28 Sep 2016

World’s largest 1 Tbps DDoS Attack launched from 152,000 hacked Smart Devices

“Do you know — Your Smart Devices may have inadvertently participated in a record-breaking largest cyber attack that Internet has just witnessed. If you own a smart device like Internet-connected televisions, cars, refrigerators or thermostats, you might already be part of a botnet of millions of infected devices that was

Read More
27 Sep 2016

What a real cyber war would look like

“In a hot cyber war, the first line of attack would not be like on Star Trek, with spectacular bursts of sparks flying out of computers. Instead it would be a stealth attack on the enemy’s military command and control infrastructure, to keep it from being able to strike, said Matt Devost, managing

Read More