Posts in category Cybersecurity


Cybersecurity

WikiLeaks Exposes CIA’s Device Surveillance Tricks

WikiLeaks has released more Vault 7 documentation online, including details about several CIA projects to infect Apple’s Mac computer firmware and operating system. The site unloaded its first batch of stolen Vault 7 data earlier this month. The CIA’s Embedded Development Branch developed malware that could persist even if the targeted computer were reformatted and its OS were reinstalled.

Read more 0 Comments
Cybersecurity

Crafty Phishing Technique Can Trick Even Tech-Savvy Gmail Users

Gmail users recently have been targeted by a sophisticated series of phishing attacks that use emails from a known contact. The emails contain an image of an attachment that appears to be legitimate, according to Wordfence. The sophisticated attack displays “accounts.gmail.com” in the browser’s location bar and leads users to what appears to be a legitimate Google sign-in page.

Read more 0 Comments
Cybersecurity

Tech Companies Weigh Responses to WikiLeaks Exposure

Following WikiLeaks’ publication earlier this week of classified documents stolen from the CIA, major technology companies, including Apple, Samsung, Microsoft and Cisco, have been scrambling to assess the risks posed to their customers by the revelations. The so-called “Vault 7” leak includes information about methods and tools the CIA crafted to hack into products produced by those companies.

Read more 0 Comments
Cybersecurity

WikiLeaks Dumps CIA Hacking Docs Online

WikiLeaks on Tuesday dumped thousands of classified documents onto the Internet, exposing hacking programs used by the CIA. The torrent of data is just the first in a series of dumps WikLeaks is calling “Vault 7.” This first installment includes 8,761 documents and files stolen from an isolated high-security network within the CIA’s Center for Cyber Intelligence in Langley, Virginia.

Read more 0 Comments
Cybersecurity

WikiLeaks Dumps CIA Hacking Docs Online

WikiLeaks on Tuesday dumped thousands of classified documents onto the Internet, exposing hacking programs used by the CIA. The torrent of data is just the first in a series of dumps WikLeaks is calling “Vault 7.” This first installment includes 8,761 documents and files stolen from an isolated high-security network within the CIA’s Center for Cyber Intelligence in Langley, Virginia.

Read more 0 Comments
Cybersecurity

Watson Joins Cybersecurity Warriors’ Ranks

IBM this week announced Watson for Cyber Security, a powerful new ally for organizations that want to protect their data from Net marauders. The new offering bolsters the ability of information security pros to analyze the flood of information from the roughly 200,000 events that pour into their Security Operations Centers, or SOCs, every day. As much as 80 percent of it is unstructured data.

Read more 0 Comments
Cybersecurity

Trump Clings to Personal Phone Despite Security Risks

President Donald J. Trump apparently has continued to use his personal Android smartphone despite security concerns. Trump was concerned about losing access to his personal phone even prior to taking his oath of office, according to a report citing unnamed aides who said he worried about how isolated he could become in the White House without his phone to keep in touch with friends.

Read more 0 Comments
Cybersecurity

Las Vegas Captures Ransomware Crown

Las Vegas is arguably the gambling capital of the world, but it’s also the king city for ransomware, based on recent research. Among the world’s nations, the United States ranked highest in ransomware incidents, according to a Malwarebytes report on the prevalence and distribution of extortion apps. The area of the country that logged the most incidents was the Las Vegas-Henderson, Nevada, region.

Read more 0 Comments
Cybersecurity

2017: More Apple Security Flaws, Cyberattacks, Hacktivisim

More security vulnerabilities will appear in the software of Adobe and Apple than in Microsoft’s, more attacks on the Internet’s infrastructure will occur, and cybersecurity events will stoke international tensions. Those are a few of the predictions for 2017 that security experts have made. Signs of hackers’ increased interest in Adobe and Apple started appearing in 2016, Trend Micro noted.

Read more 0 Comments
Cybersecurity

Yahoo Suffers Major Data Breach Deja Vu

Yahoo has revealed that Net bandits stole data associated with 1 billion of its user accounts — one of the largest data breaches in Internet history. The theft, which occurred in 2013, is distinct from the theft disclosed earlier this fall, in which 500 million accounts were compromised, Yahoo CISO Bob Lord explained. Stolen data may include names, email addresses, telephone numbers and more.

Read more 0 Comments