Cybersecurity

Researchers have demonstrated how it is possible to transform a smart device into a surveillance tool that can collect information about the body position and movements of the user. Their approach involves remotely hijacking smart devices to play...
by University of Washington
10:24am
8.17.2017
Back-to-back Las Vegas cybersecurity/hacker conferences Black Hat and Def Con have packed the last few weeks with buzzworthy cyber news. With dozens of talks, presentations, demonstrations, workshops and hacking contests, the two events have become...
Associate Editor
|
12:49pm
8.11.2017
Advertisement
While online thieves have long targeted banks for digital holdups, today's just-in-time manufacturing sector is climbing toward the top of hackers' hit lists. Production lines that integrate computer-imaging, barcode scanners and measuring...
by Emery P. Dalesio, Associated Press
8:54am
8.9.2017
Marcus Hutchins, a young British researcher credited with derailing a global cyberattack in May, was arrested for allegedly creating and distributing malicious software designed to collect bank-account passwords, U.S. authorities said Thursday.
by Ken Ritter and Matt O'Brien, Associated Press
9:09am
8.4.2017
EEG headsets aren’t just for medical use anymore—in recent years, brain wave sensing technology and wearables have been marketed to consumers for personal and recreational use. But like all other devices tangled up in the internet of things that...
Associate Editor
|
11:54am
8.3.2017
Advertisement
Machine learning expert Hyrum Anderson, technical director for data science at Endgame, explains in new research presented today at Black Hat USA 2017 that artificially intelligent defense systems could be vulnerable to an “evil twin” type threat—...
Associate Editor
|
12:09pm
7.27.2017
Ovidiy Stealer is an info-stealing tool that takes credentials from browsers and applications and hands them over to its user on an organized interface where they can keep track of the machines they’ve infected. This simplistic but potentially...
Associate Editor
|
12:05pm
7.20.2017
Ukraine has dodged a second cyberattack, officials said Wednesday, suggesting that the digital campaign which paralyzed computers across the country and around the world is ongoing. Ukraine is still trying to find its feet after scores or even...
by Raphael Satter, Associated Press
10:31am
7.6.2017
Advertisement
A cyberattack that caused indiscriminate economic damage around the world was apparently designed to create maximum havoc in Russia's neighbor and adversary Ukraine, security researchers said. While the rogue software used in the attack was...
by Raphael Satter, Frank Bajak and Jan M. Olsen, Associated Press
9:59am
6.30.2017
Early this week, the U.S. Supreme Court ruled in favor of convicted sex offender Lester Packingham, who argued that the state of North Carolina’s ban of registered sex offenders from all social networking sites violated his First Amendment rights.
Associate Editor
|
2:14pm
6.23.2017
Advertisement
Advertisement
Facebook inadvertently exposed the personal details of content moderators to suspected terrorist users, according to a report by The Guardian. The security lapse affected more than 1,000 workers across 22 departments at Facebook who used the company...
by Olivia Solon, The Guardian US
11:14am
6.19.2017
The Shadow Brokers announced late last month that they would be offering a paid monthly “dump,” which is expected to include some of the stolen hacking tools and zero-day exploits that make the hacking group infamous. Who will these tools and...
by
Associate Editor
|
1:32pm
6.8.2017
Advertisement
New security concerns and security risks have stemmed from the newest wave of internet-connected toys, including the Hello Barbie, which records two-way conversations with children and stores them on a cloud-based server. One recent study examined...
Associate Editor
|
12:56pm
5.26.2017
Hundreds of thousands of computers in approximately 150 countries were held hostage last weekend after the so-called WannaCry ransomware exploited a Microsoft vulnerability that had been patched two months prior. Not all users installed the patch,...
Associate Editor
|
12:26pm
5.19.2017
A self-replicating phishing scam executed earlier this month used Google's third-party app system against it by creating a phony application that spoofed the name "Google Docs" and tricked users into giving the app access to their contacts.
Associate Editor
|
12:59pm
5.12.2017
Advertisement
U.S. President Donald Trump signed an executive order on Thursday to bolster the government's cybersecurity and protect critical infrastructure from cyberattacks, marking his first significant action to address what he has called a top priority.
by Dustin Volz, Reuters
12:28pm
5.12.2017
A large cyberattack crippled computer systems at hospitals across England on Friday, with appointments canceled, phone lines down and patients turned away. Britain's National Health Service said hospitals across England were hit by an apparent "...
by Associated Press
11:53am
5.12.2017
A vigilante hacker has created a botnet called BrickerBot, which infects devices and destroys, or “bricks,” them, rendering them completely useless. The hacker claims his two main goals are to raise awareness of security flaws and destroy unsecured...
Associate Editor
|
1:38pm
5.4.2017
Advertisement
In 2015, a group of inmates at an Ohio prison executed an unbelievable plot—they managed to build two computers, connect to the prison network system, access the internet and plot the beginnings of a cybercrime spree.
Associate Editor
|
1:01pm
4.27.2017
A case study of the cybercrime network known as Avalanche, and of the groundbreaking law enforcement effort that ultimately took it down in December 2016, gives researchers a look at how the cybercriminal underground will operate in the future, and...
by Frank J. Cilluffo, Alec Nadeau and Rob Wainwright, The Conversation
10:21am
4.26.2017
Advertisement
Advertisement
A federal judge on Friday handed down the longest sentence ever imposed in the U.S. for a cybercrime case to the son of a member of the Russian Parliament convicted of hacking into more than 500 U.S. businesses and stealing millions of credit card...
by Martha Bellisle, Associated Press
11:03am
4.24.2017
As the physical world is becoming increasingly connected to the virtual world, the lines between cybersecurity and “real” security are becoming blurred. Recent cases of interference with emergency alarms and 911 systems highlight the threat to...
Associate Editor
|
11:57am
4.20.2017
Advertisement
Researchers have found that partial similarities between prints are common enough that the fingerprint-based security systems used in mobile phones and other devices can be more vulnerable than previously thought.
by Michigan State University
10:27am
4.17.2017
A man alleged to be a major Russian spam boss has been detained in Spain at the request of U.S. authorities, an arrest that set cybersecurity circles abuzz after a Russian broadcaster raised the possibility of a link to the U.S. presidential...
by Aritz Parra and Raphael Satter, Associated Press
9:13am
4.11.2017
An anonymous group claims to have access to as many as 750 million Apple accounts, and are threatening to remotely wipe Apple devices unless they receive a $700,000 ransom from the company. Apple has responded saying their systems were not breached.
Associate Editor
|
12:30pm
4.6.2017
Advertisement
Not so long ago, thieves who wanted to steal the entire contents of an ATM had to blow it up. Today, a more discreet sort of cash-machine burglar can walk away with an ATM’s stash and leave behind only a tell-tale 3-inch hole in its front panel.
by Andy Greenberg, Wired
11:23am
4.4.2017
Nokia researchers said threat actors are shifting from traditional to mobile malware after spotting an 83 percent uptick in the increase of smartphone infections in the second half of 2016. Nokia released its Threat Intelligence Report on Monday.
by Robert Abel, SC Media
10:57am
3.29.2017
The FBI is investigating possible Russian interference in the 2016 U.S. presidential election, FBI Director James Comey told Congress today. Comey also said there is no evidence that former President Barack Obama "tapped" President Donald Trump's...
Senior Science Writer
|
11:38am
3.20.2017
Advertisement
With virtually everyone having a computer and internet access, each day more individuals, businesses and government entities potentially leave themselves vulnerable to cybercrime. Unless a computer and its network utilize very sophisticated security...
by John J. Barbara
9:10am
3.20.2017
Two Russian intelligence agents and a pair of hired hackers have been charged in a devastating criminal breach at Yahoo that affected at least a half billion user accounts, the Justice Department said Wednesday in bringing the first case of its kind...
by Eric Tucker, Associated Press
9:04am
3.16.2017
Advertisement
Advertisement
Sound waves could be used to hack into critical sensors in a broad array of technologies including smartphones, automobiles and medical devices, according to new research. With a $5 speaker researchers fooled hardware sensors called accelerometers...
by University of Michigan
11:46am
3.15.2017
Despite the U.S. government’s steps to tackle cybersecurity threats, hackers continue to target federal agencies and they experienced tens of thousands of incidents last year, according to a White House report.
by Nafeesa Syeed, Bloomberg
9:56am
3.13.2017
Advertisement
How dangerous is a bug like Cloudbleed? What should users do to secure their data? The answers to these questions lie in understanding the nature of security bleeds, and in the words of cybersecurity experts who know the world of web data inside and...
Associate Editor
|
12:52pm
3.9.2017
Oil and gas companies, including some of the most celebrated industry names in the Houston area, are facing increasingly sophisticated hackers seeking to steal trade secrets and disrupt operations, according to a newspaper investigation.
by Associated Press
10:04am
3.6.2017
Cloudflare revealed a serious bug in its software today that caused sensitive data like passwords, cookies and authentication tokens to spill in plaintext from its customers’ websites. The announcement is a major blow for the content delivery...
by Kate Conger, TechCrunch
10:28am
2.24.2017
Advertisement
Cybersecurity researchers have developed a new form of ransomware that was able to take over control of a simulated water treatment plant. They designed the simulation to highlight vulnerabilities in the control systems used to operate some...
by Georgia Institute of Technology
10:50am
2.16.2017
The Cockrell Hill Police Department reported last month that a server containing documents, videos and photos dating back to 2009 was hit by "OSIRIS," a ransomware variant, on Dec. 12. The attackers wanted roughly $4,000 worth of bitcoin to unlock...
by AJ Vicens, Mother Jones
10:13am
2.16.2017
While AI is not anywhere close to being perfect, experts say that machine learning, adaptive intelligence and massive data models—that can spot hacking much faster than any human—are here to help.
by John Brandon, CSO
10:50am
2.3.2017
Advertisement
The FBI on Monday defended its decision to withhold documents on how it unlocked an iPhone used by one of the San Bernardino, California, shooters, saying the information could be exploited by "hostile entities" if released to the public.
by Eric Tucker, Associated Press
11:02am
2.1.2017
At least 40 new but unofficial "alternative" accounts for federal agencies have begun spreading across Twitter. Legal experts said the Justice Department could prosecute such tweeters under federal hacking laws, but the FBI so far was not involved.
by Ted Bridis, Associated Press
10:32am
1.27.2017
Advertisement
Advertisement