WIKILEAKS DOCS SHOW HOW THE CIA ALLEGEDLY INFECTED OFFLINE COMPUTERS

_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

It seems that more and more information continues to come to light regarding hacking — not just by your average hacker, but by the CIA and other government agencies, too. Now, WikiLeaks documents have revealed how the CIA infected offline computers using air-gap hacking. Air-gapping refers to a security measure…


_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

read more

Wikileaks dumps info on ‘Brutal Kangeroo’, the CIA’s malware toolkit for hacking ‘air-gapped’ networks

_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

CIA’s Brutal Kangeroo malware suite likened to Stuxnet Wikileaks has revealed yet more information about the CIA’s trove of malware tools, this time revealing how it takes on ‘air gapped’ networks – computers and networks not attached to the internet for security reasons. “Brutal Kangaroo is a tool suite for…


_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

read more

MALWARE CAUSES LONGEST CYBERSECURITY INCIDENTS FOR EU TELECOMS, AGENCY REPORTS

_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

Malware attacks for the first time created the longest lasting cybersecurity incidents “in duration and hours lost” in the telecom sector in 2016, according to the European Union cybersecurity agency’s Annual Incidents Report. The 2017 report by the European Union Agency for Network and Information Security (ENISA) was released June…


_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

read more

‘Failure of the imagination’: Malwarebytes on WannaCry and future of cybersecurity

_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

THE world reeled when the WannaCry ransomware attacks brought some of the biggest global brand names to their knees. A relatively unsophisticated virus, strapped to a high-level hacking software developed by the United States National Security Agency (NSA) locked up user data of hundreds of computers across the world. Notably…


_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

read more

Fileless malware targeting US restaurants went undetected by most AV

_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

Researchers have detected a brazen attack on restaurants across the United States that uses a relatively new technique to keep its malware undetected by virtually all antivirus products on the market. Malicious code used in so-called fileless attacks resides almost entirely in computer memory, a feat that prevents it from…


_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

read more

Hackers are selling Mac ransomware that could cause ‘real damage’

_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

Security researchers have found two types of malicious software which apparently target Macs for the first time. Ransomware – malicious software that encrypts your data and then demands payment for decryption – is more commonly a problem for Windows users, but it’s also recently been a growing problem for Macs….


_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

read more

Cybersecurity Firms Warn of New Malware Threat to Electric Grids

_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

Two cyber security companies said they have uncovered a sophisticated piece of malicious software capable of causing power outages by ordering industrial computers to shut down electricity transmission. Analysis of the malware, known as Crash Override or Industroyer, indicates it was likely used in a December 2016 cyber attack that…


_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

read more

Hackers marketing the ‘most sophisticated’ Mac malware ever

_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

Hackers with their targets set on devices running Apple’s MacOS are selling access to new, sophisticated attacks that can infect machines and hold them for ransom. The attacks, which include a malware-as-a-service (MaaS) known as MacSpy and a ransomware-as-a-service called MacRansom —both of which attackers can purchase use of to…


_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

read more

Your Windows firewall may be useless as malware can bypass it

_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

Hackers may be able to use Intel’s Active Management Technology (AMT) to bypass Windows’ built-in firewall rendering it completely useless in detection of malware and ransomware. AMT allows remote access to networks or computers enabling administrators to easily install programs like an operating system on a remote computer. A hacking…


_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

read more

Malware Steal Data from Secure Networks Using Router LEDs

_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

Specially-designed malware that are installed on a switch or a router can gain control over LEDs of device; and then can use them for transferring of data in binary format to the nearby attacker, who may capture it with the help of simple equipment for video recording. The scenario of…


_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

read more

Britney Spears’ Instagram is toxic: Hackers use celeb’s account to hide malware code

_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

A Russian cyber espionage group has found a new way to hide its nefarious activities on the internet by posting links in code as comments on celebrity Instagram accounts. Cybersecurity firm ESET detected that the Russian hacking group Turla has been hiding links for its malware to pick up in…


_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

read more

CIA’s Windows XP to Windows 10 malware: WikiLeaks reveals Athena

_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

The latest file revealed in WikiLeaks’ Vault 7 catalog of CIA hacking toolkit is Athena, a surveillance tool apparently designed to capture communications from Windows XP to Windows 10 machines. Details of the Athena malware are available in a document allegedly created by the CIA in November 2015. The malware…


_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

read more

The Culprit Behind the WannaCry Ransomware Attack Has Been Identified As The Same Group Behind the Microsoft Tech Support Scam

_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

“Federal Law Enforcement and Microsoft and Were Notified of The Threat in 2016. They Did Not Respond” Atlanta, Georgia (PRWEB) May 18, 2017 National Cyber Security News has recorded conversations of the mastermind behind the ransomware known as “WannaCry”, “WanaCrypt0r”, “WeCry”, and “WanaCrypt”. National Cyber Security Ventures (the parent company…


_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

read more

Why a shadowy hacking crime group called Lazarus may have launched a mass ransomware attack

_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

The shadowy organization believed to be behind the world’s largest ransomware attack may represent a new cyberwar front to the escalating tensions between North Korea and the West. But it may just be about cold, hard cash. In the days after an unnamed organization unleashed a virulent form of malware…


_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

read more

Alert Mac Users; Handbrake Mirror download Server Hacked with Malware

_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

If you are using the famous file-transcoding app “Handbrake,” there is a bad news: The download server of the app was hacked according to the reports. If you installed the software between 14:30 UTC May 2 and 11:00 UTC May 6, there is a pretty good chance that you may…


_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

read more

Handbrake mirror download server hacked to serve up malware to Mac users

_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

The developers of popular video transcoder HandBrake have issued a security alert to Mac users after a mirror download server hosting the software was compromised by hackers. HandBrake issued the alert on the app’s forum on Saturday (6 May) after hackers replaced its original Mac version with malware. The team…


_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

read more

50% malware exploits in India occurred in the last 3 months of 2016: Report

_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

Indian firms were highly vulnerable to cyber attacks in the period following demonetisation with close to 50% of the attacks happening in the last three months of 2016, a report published by Fortinet points out. The research report said that the last two weeks in December, 2016 recorded a very…


_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

read more

The World’s Best And Worst Presented With A Well-Designed Infographic

_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

Countries with the best (blue) and worst (red) malware infection rates.[/caption] It’s no secret that online security is a global problem. Businesses and government agencies are hacked, corporations, hospitals and individuals are held up with ransomware, credit card numbers and passwords are routinely stolen. Cybercrime is ubiquitous and unrelenting. How…


_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

read more

Cyber security compromises hit 90% of Australian organisations

_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

Almost all Australian organisations were affected by cybersecurity attacks in 2015-2016, with 90% reporting an attempted or successful attempt in a survey by the Australian Cyber Security Centre (ACSC). The 113 organisations surveyed reported many malicious cyber threats, with spear phishing emails alone affecting Australian organisations up to hundreds of…


_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

read more

Malicious Android malware lets hackers access your phone’s connected network

_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

Security researchers have discovered a new strain of malware that turns Android devices into backdoors, giving malicious attackers the ability to access any internal network that the infected device is connected to. According to security firm Trend Micro, around 200 unique Android apps available on the Google Play Store were…


_________________________________________________________________________

GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

android-app-on-google-play_svg

read more