20 Aug 2016

How the NSA snooped on encrypted Internet traffic for a decade

“In a revelation that shows how the National Security Agency was able to systematically spy on many Cisco Systems customers for the better part of a decade, researchers have uncovered an attack that remotely extracts decryption keys from the company’s now-decommissioned line of PIX firewalls. The discovery is significant because

Read More
19 Aug 2016

The NSA Leak Is Real, Snowden Documents Confirm

“ON MONDAY, A HACKING group calling itself the ‘ShadowBrokers’ announced an auction for what it claimed were ‘cyber weapons’ made by the NSA. Based on never-before-published documents provided by the whistleblower Edward Snowden, The Intercept can confirm that the arsenal contains authentic NSA software, part of a powerful constellation of tools used to covertly infect

Read More
18 Aug 2016

FireEye warns ‘massive’ ransomware campaign hits US, Japan hospitals

“The dangerous and as-yet-undefeated Locky ransomware is being hurled at hospitals across the United States and Japan in a ‘massive’ number of attacks, according to FireEye researcher Ronghwa Chong. Locky is a popular ransomware variant that will encrypt files in a way that forces users to pay ransoms or cut

Read More
18 Aug 2016

Private firms to chase cyber-criminals for cash bounties, say police

“Law firms could be incentivised to pursue civil prosecutions against suspected fraudsters including cyber-criminals under proposals currently being considered by the City of London Police. Under the initiative, which is currently in a pilot stage, law enforcement authorities would work with the private sector to identify, seize and recover assets

Read More
18 Aug 2016

Former NSA Staffers: Rogue Insider Could Be Behind NSA Data Dump

“There are a lot of unanswered questions surrounding the shocking dump of a slew of hacking tools used by an NSA-linked group earlier this week. But perhaps the biggest one is: who’s behind the leak? Who is behind the mysterious moniker ‘The Shadow Brokers’?” Source: Former NSA Staffers: Rogue Insider

Read More
18 Aug 2016

DHS Offers States Cybersecurity Help with Elections

“Homeland Security Secretary Jeh Johnson has promised state election officials his department’s assistance addressing cybersecurity risks within each state’s election systems.” Source: DHS Offers States Cybersecurity Help with Elections – Nextgov.com

Read More
17 Aug 2016

London police to create a troll-hunting social media unit

“In a bid to tackle rising levels of abuse on social media, London’s Metropolitan Police is to set up a five-person team of specialist officers tasked with targeting online trolls. Scotland Yard will spend £1.7 million on the unit, called the Online Hate Crime Hub, which will provide ‘targeted and

Read More
17 Aug 2016

Cisco confirms Shadow Broker Attack included Zero Day against their products

“A vulnerability in the Simple Network Management Protocol (SNMP) code of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause a reload of the affected system or to remotely execute code. The vulnerability is due to a buffer overflow in the affected code area. An

Read More
17 Aug 2016

How Cyberattacks on Critical Infrastructure Could Cause Real-Life Disasters

“In October 11, 2012, then Secretary of Defense Leon Panetta warned of the impending dangers of a digital Pearl Harbor, a cyberattack that targeted critical infrastructure and caused real, physical damage. Since then, others have sounded the alarm bells of a cyberattack on infrastructure. Yet, other than the Stuxnet attack

Read More
15 Aug 2016

What World War III might look like

“‘If you’re not able to operate the way you want to in cyberspace,’ Singer said. ‘That means you can lose battles on land and sea.’ Interestingly, the shift to using cyber means of attack instead of conventional ones has already been happening for some time, as Singer explained. We’ve seen a ‘micro

Read More