UK #Cybercrime #Authority Lists #Cryptojacking As #Serious #Threat

A British government agency has acknowledged the rise of “cryptojacking,” and has released a report which listed the issue amongst other major threats to UK’s internet ecosystem. The report, published by U.K.’s National Cyber Security Centre (NCSC) on April 10, highlighted cryptojacking as a “significant concern.” Other compromised identified trends…


read more

Security #warning: Your #suppliers are #now your #weakest #link

Cybersecurity agency warns of 796 attacks against business, says that hackers will attempt to reach their targets through their suppliers. Hackers targeting business supply chains and the proliferation of destructive worms are two of the biggest cyber-threats that organisations should prepare to face in the coming year, security experts have…


read more

New #macOS #Backdoor #Linked to #Cyber-espionage #Group

A recently discovered macOS backdoor is believed to be a new version of malware previously associated with the OceanLotus cyber-espionage group, Trend Micro says. Also known as APT 32, APT-C-00, SeaLotus, and Cobalt Kitty, OceanLotus is believed to be operating out of Vietnam and has been targeting high-profile corporate and…


read more

A #whole new #ball game: #Sports world #adapts to #growing #cybersecurity #threats

Imagine the fallout if the NHL was hacked and its star players — think Sidney Crosby, Auston Matthews and Connor McDavid — had their home addresses, phone numbers and other personal information made accessible online. It’s an all-too-familiar scenario for Canadian lacrosse player Kevin Crowley, who was among the victims…


read more

North Korea’s #cyber #army the real #threat not #nuclear #missiles

The global informational space joins particular people the military as well as civil infrastructure. Nowadays there is no regulation in this sphere. This situation creates perfect conditions for hackers. Despite the constant upgrading of systems, “cyber criminals” are still difficult to find and almost impossible to bring to trial. Their…


read more

Majority of #Americans feel their #personal #information #online is at #risk

Just one in ten Americans use a password manager to protect login information Last year, credit bureau Equifax suffered a major security breach, and recently, the consumer-reporting agency disclosed an additional 2.4 million Americans were exposed in the hack. It’s no wonder then that nearly three-quarters of Americans (73%) told YouGov in…


read more

Georgia #Anti-Hacking #Legislation A #Serious #Threat To #Cyber Security #Industry

Security researchers are extremely worried by the Senate Bill 315, also known as the Computer Intrusion Bill, which threatens to criminalize security researchers. The bill would expand the state’s current computer law to create what it calls the “new” crime of unauthorized computer access. It would include penalties for accessing…


read more

New #attacks #spark concerns about #Iranian cyber #threat

Experts are sounding the alarm about new cyber activity from Iran, as hackers become more emboldened and skilled at carrying out surveillance operations and other attacks outside the country’s borders. In recent years, Iran-linked hacker groups have showed signs of growing sophistication, expanding their cyber tool kits and stepping up…


read more

Bug #Bounty Programs Can #Help Local #Governments #Stamp Out #Security #Threats

Security experts face a major challenge in dealing with skilled hackers who continuously try to gain access to state and local IT systems. These hackers, who spend years building their cybersecurity skills, often discover previously unidentified vulnerabilities in a website and exploit them to steal sensitive information or damage the…


read more

Here is #how to #check if your #identity has been #stolen

Last September the personal information of as many as 143 million people was compromised in a data breach affecting the credit reporting firm Equifax, leaving those individuals at risk of identity theft. Of those users, 209,000 had their credit card numbers stolen, and very few of their owners have checked their…


read more

Tesla #hack #demonstrates #need to #prioritize data #security

The words “data security” made news once again last month when researchers revealed that Tesla’s AWS cloud systems were compromised for the purpose of cryptojacking. Cryptojacking, which is defined as the secret use of a computing device to mine cryptocurrency, has risen in popularity over the past few months. This…


read more

Beware of #Thanatos, the latest #cyber-extortion #scam

Another ransomware program is infecting computers, and it’s demanding Bitcoin Cash to let users unlock their files. A report at Bleeping Computer highlights the new ransomware, dubbed Thanatos, that was unearthed by security experts at MalwareHunter Team. What makes this particular infection noteworthy is that it creates an encrypted file,…


read more

Even after #Cyber-attack #security professionals #reluctant to change #security #strategy

IT security professionals stubbornness and failure to learn from past experiences can increase the risk of subsequent cyber-attacks. According to CyberArk, a cyber security company, nearly half of the experts, 46%, have failed to change their security strategy even after experiencing a cyber-attack, this kind of attitude of a security…


read more

New #tools for #accountants can help #protect #companies from #cyber #threats

The digital threats facing organizations today have multiplied as they move their data hosting from localized servers to the cloud. Further, myriad devices, such as smartphones, tablets and laptops are accessing that data, many of which are not a company’s property, but are owned by employees. That’s made protecting all…


read more