Cybersecurity

Researchers from Ben-Gurion University of the Negev in Israel have demonstrated that security cameras with no connection to the internet can be manipulated to both send and receive messages using only infrared light, in a so-called “aIR-Jumper” air...
Associate Editor
|
12:09pm
10.5.2017
A new study from the U.S. Army Research Laboratory presents evidence that the number of cyber intrusions can be predicted, particularly when analysts are already observing activities on a company or government organization's computer network.
by U.S. Army Research Laboratory
1:04pm
9.21.2017
Advertisement
Safety measures such as the use of USB “condoms” that block data lines but leave power lines open can protect users from some conventional attacks, such as spying from untrusted public charging stations. But what if USB devices could steal...
Associate Editor
|
9:17am
9.15.2017
An increase in computerized, “smart” power grids, while offering multiple benefits to the efficiency of energy transmission, have opened these vital structures up to a new threat—cyberterrorists.
Associate Editor
|
12:26pm
9.5.2017
Researchers Jonathan Lusthaus and Federico Varese, of the Human Cybercriminal Project at the University of Oxford, traveled to Romania in 2014 and 2015 to study the oft-ignored real-world aspect of cybercrime in an area known to be a hub for one...
Associate Editor
|
12:00pm
8.18.2017
Advertisement
Researchers have demonstrated how it is possible to transform a smart device into a surveillance tool that can collect information about the body position and movements of the user. Their approach involves remotely hijacking smart devices to play...
by University of Washington
10:24am
8.17.2017
Back-to-back Las Vegas cybersecurity/hacker conferences Black Hat and Def Con have packed the last few weeks with buzzworthy cyber news. With dozens of talks, presentations, demonstrations, workshops and hacking contests, the two events have become...
Associate Editor
|
12:49pm
8.11.2017
While online thieves have long targeted banks for digital holdups, today's just-in-time manufacturing sector is climbing toward the top of hackers' hit lists. Production lines that integrate computer-imaging, barcode scanners and measuring...
by Emery P. Dalesio, Associated Press
8:54am
8.9.2017
Advertisement
Marcus Hutchins, a young British researcher credited with derailing a global cyberattack in May, was arrested for allegedly creating and distributing malicious software designed to collect bank-account passwords, U.S. authorities said Thursday.
by Ken Ritter and Matt O'Brien, Associated Press
9:09am
8.4.2017
EEG headsets aren’t just for medical use anymore—in recent years, brain wave sensing technology and wearables have been marketed to consumers for personal and recreational use. But like all other devices tangled up in the internet of things that...
Associate Editor
|
11:54am
8.3.2017
Advertisement
Advertisement
Machine learning expert Hyrum Anderson, technical director for data science at Endgame, explains in new research presented today at Black Hat USA 2017 that artificially intelligent defense systems could be vulnerable to an “evil twin” type threat—...
Associate Editor
|
12:09pm
7.27.2017
Ovidiy Stealer is an info-stealing tool that takes credentials from browsers and applications and hands them over to its user on an organized interface where they can keep track of the machines they’ve infected. This simplistic but potentially...
Associate Editor
|
12:05pm
7.20.2017
Advertisement
Ukraine has dodged a second cyberattack, officials said Wednesday, suggesting that the digital campaign which paralyzed computers across the country and around the world is ongoing. Ukraine is still trying to find its feet after scores or even...
by Raphael Satter, Associated Press
10:31am
7.6.2017
A cyberattack that caused indiscriminate economic damage around the world was apparently designed to create maximum havoc in Russia's neighbor and adversary Ukraine, security researchers said. While the rogue software used in the attack was...
by Raphael Satter, Frank Bajak and Jan M. Olsen, Associated Press
9:59am
6.30.2017
Early this week, the U.S. Supreme Court ruled in favor of convicted sex offender Lester Packingham, who argued that the state of North Carolina’s ban of registered sex offenders from all social networking sites violated his First Amendment rights.
Associate Editor
|
2:14pm
6.23.2017
Advertisement
Facebook inadvertently exposed the personal details of content moderators to suspected terrorist users, according to a report by The Guardian. The security lapse affected more than 1,000 workers across 22 departments at Facebook who used the company...
by Olivia Solon, The Guardian US
11:14am
6.19.2017
The Shadow Brokers announced late last month that they would be offering a paid monthly “dump,” which is expected to include some of the stolen hacking tools and zero-day exploits that make the hacking group infamous. Who will these tools and...
by
Associate Editor
|
1:32pm
6.8.2017
New security concerns and security risks have stemmed from the newest wave of internet-connected toys, including the Hello Barbie, which records two-way conversations with children and stores them on a cloud-based server. One recent study examined...
Associate Editor
|
12:56pm
5.26.2017
Advertisement
Hundreds of thousands of computers in approximately 150 countries were held hostage last weekend after the so-called WannaCry ransomware exploited a Microsoft vulnerability that had been patched two months prior. Not all users installed the patch,...
Associate Editor
|
12:26pm
5.19.2017
A self-replicating phishing scam executed earlier this month used Google's third-party app system against it by creating a phony application that spoofed the name "Google Docs" and tricked users into giving the app access to their contacts.
Associate Editor
|
12:59pm
5.12.2017
Advertisement
Advertisement
U.S. President Donald Trump signed an executive order on Thursday to bolster the government's cybersecurity and protect critical infrastructure from cyberattacks, marking his first significant action to address what he has called a top priority.
by Dustin Volz, Reuters
12:28pm
5.12.2017
A large cyberattack crippled computer systems at hospitals across England on Friday, with appointments canceled, phone lines down and patients turned away. Britain's National Health Service said hospitals across England were hit by an apparent "...
by Associated Press
11:53am
5.12.2017
Advertisement
A vigilante hacker has created a botnet called BrickerBot, which infects devices and destroys, or “bricks,” them, rendering them completely useless. The hacker claims his two main goals are to raise awareness of security flaws and destroy unsecured...
Associate Editor
|
1:38pm
5.4.2017
In 2015, a group of inmates at an Ohio prison executed an unbelievable plot—they managed to build two computers, connect to the prison network system, access the internet and plot the beginnings of a cybercrime spree.
Associate Editor
|
1:01pm
4.27.2017
A case study of the cybercrime network known as Avalanche, and of the groundbreaking law enforcement effort that ultimately took it down in December 2016, gives researchers a look at how the cybercriminal underground will operate in the future, and...
by Frank J. Cilluffo, Alec Nadeau and Rob Wainwright, The Conversation
10:21am
4.26.2017
Advertisement
A federal judge on Friday handed down the longest sentence ever imposed in the U.S. for a cybercrime case to the son of a member of the Russian Parliament convicted of hacking into more than 500 U.S. businesses and stealing millions of credit card...
by Martha Bellisle, Associated Press
11:03am
4.24.2017
As the physical world is becoming increasingly connected to the virtual world, the lines between cybersecurity and “real” security are becoming blurred. Recent cases of interference with emergency alarms and 911 systems highlight the threat to...
Associate Editor
|
11:57am
4.20.2017
Researchers have found that partial similarities between prints are common enough that the fingerprint-based security systems used in mobile phones and other devices can be more vulnerable than previously thought.
by Michigan State University
10:27am
4.17.2017
Advertisement
Smartphones are equipped with an ever-growing numbers of sensors, including light and motion detection. But some of the latest are so sensitive that outside hackers can determine a four-digit PIN pass code within a few tries, a new report says.
Senior Science Writer
|
12:21pm
4.12.2017
A man alleged to be a major Russian spam boss has been detained in Spain at the request of U.S. authorities, an arrest that set cybersecurity circles abuzz after a Russian broadcaster raised the possibility of a link to the U.S. presidential...
by Aritz Parra and Raphael Satter, Associated Press
9:13am
4.11.2017
Advertisement
Advertisement
An anonymous group claims to have access to as many as 750 million Apple accounts, and are threatening to remotely wipe Apple devices unless they receive a $700,000 ransom from the company. Apple has responded saying their systems were not breached.
Associate Editor
|
12:30pm
4.6.2017
Not so long ago, thieves who wanted to steal the entire contents of an ATM had to blow it up. Today, a more discreet sort of cash-machine burglar can walk away with an ATM’s stash and leave behind only a tell-tale 3-inch hole in its front panel.
by Andy Greenberg, Wired
11:23am
4.4.2017
Advertisement
Nokia researchers said threat actors are shifting from traditional to mobile malware after spotting an 83 percent uptick in the increase of smartphone infections in the second half of 2016. Nokia released its Threat Intelligence Report on Monday.
by Robert Abel, SC Media
10:57am
3.29.2017
The FBI is investigating possible Russian interference in the 2016 U.S. presidential election, FBI Director James Comey told Congress today. Comey also said there is no evidence that former President Barack Obama "tapped" President Donald Trump's...
Senior Science Writer
|
11:38am
3.20.2017
With virtually everyone having a computer and internet access, each day more individuals, businesses and government entities potentially leave themselves vulnerable to cybercrime. Unless a computer and its network utilize very sophisticated security...
by John J. Barbara
9:10am
3.20.2017
Advertisement
Advertisement