25 Aug 2016

Apple releases ‘Emergency’ Patch after Advanced Spyware Targets Human Rights Activist

“One of the world’s most invasive software weapon distributors, called the NSO Group, has been exploiting three zero-day security vulnerabilities in order to spy on dissidents and journalists. The NSO Group is an Israeli firm that sells spying and surveillance software that secretly tracks a target’s mobile phone.” Source: Apple

Read More
24 Aug 2016

Cisco Exploit Leaked in NSA Hack Modifies to Target Latest Version of Firewalls

“However, the exploit has now been expanded to 9.2.(4) after researchers from Hungary-based security consultancy SilentSignal were able to modify the code of ExtraBacon to make it work on a much newer version of Cisco’s ASA software. Both Cisco and Fortinet have confirmed their firewalls are affected by exploits listed

Read More
24 Aug 2016

NSA Targeted Chinese Firewall Maker Huawei, Leaked Documents Suggest

“When the mysterious Shadow Brokers dumped a cache of hacking tools used by an NSA-linked group last week, researchers quickly identified a number of the spy agencies’ targets, including American security companies like Cisco, Juniper, and Fortinet.” Source: NSA Targeted Chinese Firewall Maker Huawei, Leaked Documents Suggest | Motherboard

Read More
24 Aug 2016

Iran looking to enhance cyber capabilities

“While China and Russia have built up a robust profile in cyberspace, many are warning against Iran’s growing capabilities and behavior. Iran is one of the five evolving strategic challenges facing the U.S., along with Russia and China, North Korea and terrorism,  according to Defense Secretary Ash Carter. Iran’s malicious activity

Read More
23 Aug 2016

FBI Probing Cyber Breach of NY Times Journalists

“The FBI is investigating cyber intrusions targeting reporters of The New York Times and is looking into whether Russian intelligence agencies are responsible for the acts, a U.S. official said Tuesday. The cyberattacks are believed to have targeted individual reporters, but investigators don’t believe the newspaper’s whole network was affected,

Read More
23 Aug 2016

Turns Out You Can’t Trust Russian Hackers Anymore

“ten, in war, mistakes are made. Sometimes, in Russia’s information war against the West, mistakes are made and then published for all the world to see. That seems to be what happened when two supposedly independent hacking groups, believed by security experts to have ties to the Kremlin, posted the

Read More
23 Aug 2016

Why the Internet of Things Needs Different Encryption

“The proliferation of internet-enabled devices warrants a new model for cybersecurity, according to a federal agency.” Source: Why the Internet of Things Needs Different Encryption – Nextgov.com

Read More
22 Aug 2016

How Bitcoin helped fuel an explosion in ransomware attacks

“Secure payment system Bitcoin has many legitimate uses, but like other technologies, it’s also been beneficial to cybercriminals seeking new ways to extort money.” Source: How Bitcoin helped fuel an explosion in ransomware attacks | ZDNet

Read More
21 Aug 2016

Computer Science Professor Gives Failing Grade to Newly Leaked NSA Hacking Tool

“Stephen Checkoway, an Assistant Professor at the Department of Computer Science at the University of Illinois at Chicago, has analyzed some of the exploit code included in the recent Equation Group leak, and his verdict is ‘not impressed.’” Source: Computer Science Professor Gives Failing Grade to Newly Leaked NSA Hacking

Read More
20 Aug 2016

China’s Master Plan for IT Dominance

“The Strategy reinforces official sloganeering that China must control foreign-owned ‘core technologies’ in integrated circuits, large-scale software, and core hardware components. China’s backwardness in these technology building blocks is listed among China’s most ‘prominent challenges.’ Beijing previously sought to adopt ‘core technologies’ through joint ventures and partnerships with leading foreign

Read More