Login

Register

Login

Register

Category

Computer Hacking

Find the latest, breaking news stories on computer hacking as it breaks.

The attack takes control of poorly secured network devices, redirecting Web addresses to a COVID-themed landing page that attempts to fool victims into downloading malware. A cybercriminal group has started scanning the Internet for vulnerable Linksys routers in the first stage of an attack that ultimately aims to fool users into downloading and installing malware,...
Read More
Third parties bring critical products and services to your organization. They also bring risk that must be understood and managed. (image by frog, via Adobe Stock) If it hadn’t been already, the risk posed by third parties has become top-of-mind for many of us in recent weeks. Both organizations and individuals have given more than...
Read More
There is no available patch for the vulnerabilities, which Microsoft says exist in all supported versions of Windows. Microsoft today posted an advisory to inform users of active attacks targeting unpatched flaws in Adobe Type Manager Library. The vulnerabilities affect all supported versions of Windows. Two remote code execution vulnerabilities exist in Microsoft Windows when...
Read More
Business email compromises cost the economy billions of dollars. Experts have advice on how to stop them from hitting you for millions at a pop. (image by maho, via Adobe Stock) According to the FBI, business email compromises (BECs) were the most economically damaging cyber crimes of 2019, responsible for more than $1.7 billion in...
Read More
Fraudsters exploit concerns by claiming to offer virus-related information or promising stimulus checks. Cybercriminals are capitalizing on the spread of COVID-19 with new phishing emails that pretend to offer information about the virus or request money or data from concerned victims.  The FBI Internet Crime Complaint Center (IC3) issued an alert late last week to...
Read More
Stuck inside and looking for a new read? Check out these titles written be security practitioners and reporters across the industry. 1 of 9 If you’ve been feeling a little restless these days, you’re not alone. People around the world are spending more time indoors in an attempt to stop the spread of the novel...
Read More
It’s time for organizations to realize that an empowered CISO can effectively manage enterprise risk and even grow the business along the way. Traditionally, CISOs have borne the brunt of blame for cyber events that affect an organization. Because CISOs are the leaders in charge of data security, any breach has been seen as a...
Read More
Here’s a little something to snuggle up with if you’re on lockdown. (image by juliasudnitskaya, via Adobe Stock) Snuggle up with your hot beverage of choice and take a break from the perils of facing reality, and hack away at our first cybersecurity crossword puzzle. It might be just what you need to ease burnout...
Read More
The code demonstrates a relatively simple method to exploit a vulnerability in more than a billion devices. Researchers at HexWay have demonstrated a proof-of-concept (PoC) exploit of kr00k, a significant Wi-Fi vulnerability first described by Eset researchers in February. The vulnerability forces a device to use an encryption key of all zeroes under certain circumstances....
Read More
Liefrando delivers food from more than 15,000 restaurants in Germany, where people under COVID-19 restrictions depend on the service. Cybercriminals have launched a distributed denial-of-service (DDoS) attack against German food delivery service Takeaway.com (Liefrando.de), demanding two bitcoins (about $11,000) to stop the flood of traffic. The attack has now stopped, according to a report from...
Read More
Many risk models use a commonly quoted number — $150 per record — to estimate the cost of an incident. A new study from the Cyentia Institute says misusing that number means that estimates are almost never accurate. It’s one thing to know your organization’s level of cyber-risk. It’s a step farther along the maturity...
Read More
Here are four things that separate the leaders from the laggards when fighting cyber threats. These days, companies that want to compete must go digital. But the digital world has become complex and, in some cases, downright scary. Protecting against the Web’s ever-present threats — via cybersecurity — is a tough problem for businesses of...
Read More
Infamous cybercrime organization spotted in attacks that employ legitimate software — and Google Drive. A newly discovered attack campaign by the notoriously prolific TA505 cybercrime organization now is targeting businesses in Germany via their human resources executives. Researchers at Prevailion, a security monitoring firm, today detailed the cybercrime group’s latest campaign, a business email compromise–style...
Read More
The module, still in development, focuses on compromising Windows systems by brute-forcing accounts via the Remote Desktop Protocol. Trickbot, a popular malware distribution framework often referred to simply as a Trojan, gained a new trick, with developers adding a module that focuses on compromising Windows systems via brute-forcing the guessing of usernames and passwords, security...
Read More
Blender maker is the latest victim of Magecart. Blender manufacturer NutriBullet on Wednesday said it had identified and removed malicious code on its website that allowed attackers to steal data from customers entering payment card information on it when purchasing products. The move came about one month after security vendor RiskIQ first detected the malware...
Read More
Attackers commonly use remote administration and network management tools for lateral movement, a new pool of threat data shows. The threat landscape of 2019 was dominated with worm-like activity, researchers report in a new analysis of confirmed threats from the past year. Attackers are growing more focused on lateral movement, with an emphasis on using...
Read More
Ensuring that our valuable biometric information is protected is worth more than a $550 million settlement. On January 29, Facebook agreed to a $550 million settlement of a class-action suit based on violations of Illinois’ Biometric Information Privacy Act (BIPA). The settlement will compensate Facebook users in Illinois for Facebook’s use of facial recognition technology,...
Read More
During WWII, the British leveraged both technology and human intelligence to help win the war. Security leaders must learn the lessons of history and consider how the human element can make their machine-based systems more effective. The theme for this year’s RSA Conference was the “Human Element,” which explored the role of humans in the...
Read More
Criminal activity related to the pandemic cannot be tolerated, William Barr states in memo. US Attorney General William Barr has urged attorneys in the Department of Justice to focus attention on cybercriminals seeking to take advantage of coronavirus fears to spread malware and commit fraud. In a memo first reported by the AP, Barr reminds...
Read More
Legislation should protect the good hackers who are helping to keep us safe, not just go after the bad. The arrest and exoneration of two Coalfire employees caught breaking into an Iowa county courthouse in September 2019 highlight the challenges our legal system faces in addressing the fast pace of cybersecurity in an increasingly connected...
Read More
1 2 3 4 10
Shqip Shqip አማርኛ አማርኛ العربية العربية English English Français Français Deutsch Deutsch Português Português Русский Русский Español Español

National Cyber Security Consulting App

 https://apps.apple.com/us/app/id1521390354

https://play.google.com/store/apps/details?id=nationalcybersecuritycom.wpapp


Ads

NATIONAL CYBER SECURITY RADIO

Ads

ALEXA “OPEN NATIONAL CYBER SECURITY RADIO”

National Cyber Security Radio (Podcast) is now available for Alexa.  If you don't have an Alexa device, you can download the Alexa App for free for Google and Apple devices.   

nationalcybersecurity.com

FREE
VIEW