Latest WikiLeaks dump exposes CIA methods to mask malware

WikiLeaks may have dealt another blow to the CIA’s hacking operations by releasing files that allegedly show how the agency was masking its malware attacks. On Friday, the site dumped the source code to the Marble Framework, a set of anti-forensic tools that WikiLeaks claims the CIA used last year. The files do appear to Read more about Latest WikiLeaks dump exposes CIA methods to mask malware[…]

Share

Google's Android hacking contest fails to attract exploits

Six months ago, Google offered to pay US$200,000 to any researcher who could remotely hack into an Android device by knowing only the victim’s phone number and email address. No one stepped up to the challenge. While that might sound like good news and a testament to the mobile operating system’s strong security, that’s likely Read more about Google's Android hacking contest fails to attract exploits[…]

Share

Privacy activist wants to unveil lawmakers' browser histories

After Congress on Tuesday approved a resolution that would toss out significant online privacy protections, one Internet user decided to do something about it. Adam McElhaney, who calls himself a privacy activist and net neutrality advocate, created a website and a GoFundMe page to raise money to buy the internet histories of the legislators who Read more about Privacy activist wants to unveil lawmakers' browser histories[…]

Share

Cisco issues urgent reboot warning for bug in ASA and Firepower appliances

Cisco has issued an urgent request to Cisco customers running specific releases of software on their Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) appliances to reboot their devices to prevent a device from hanging and stop passing traffic. Cisco said its ASA and FTD devices are affected by a “functional software defect that Read more about Cisco issues urgent reboot warning for bug in ASA and Firepower appliances[…]

Share

Senator: Russia used 'thousands' of internet trolls during US election

The Russian government used “thousands” of internet trolls and bots to spread fake news, in addition to hacking into political campaigns leading up to the 2016 U.S. election, according to one lawmaker. Disinformation spread on social media was designed to raise doubts about the U.S. election and the campaign of Democratic presidential candidate Hillary Clinton, Read more about Senator: Russia used 'thousands' of internet trolls during US election[…]

Share

10 practical privacy tips for the post-privacy internet

ISPs and providers can now sell your data and browser histories. The U.S. Congress sold you out. If you had any browsing dignity, you don’t now. Too bad you couldn’t pay the legislators as much as the data wolves. You should have been doing these things all along, but now it’s time to decide just Read more about 10 practical privacy tips for the post-privacy internet[…]

Share

IBM technology creates smart wingman for self-driving cars

IBM said that it has patented a machine learning technology that defines how to shift control of an autonomous vehicle between a human driver and a vehicle control processor in the event of a potential emergency. +More on Network World: IBM on the state of network security: Abysmal Basically the patented IBM system employs onboard Read more about IBM technology creates smart wingman for self-driving cars[…]

Share

Millions of websites affected by unpatched flaw in Microsoft IIS 6 web server

A proof-of-concept exploit has been published for an unpatched vulnerability in Microsoft Internet Information Services 6.0, a version of the web server that’s no longer supported but still widely used. The exploit allows attackers to execute malicious code on Windows servers running IIS 6.0 with the privileges of the user running the application. Extended support Read more about Millions of websites affected by unpatched flaw in Microsoft IIS 6 web server[…]

Share

IP theft: Declining, or just more stealthy?

Eighteen months ago, President Obama and Chinese President Xi Jinping announced, with considerable fanfare, an agreement aimed at curbing economic espionage. According to the Sept. 25, 2015 White House press release, “neither country’s government will conduct or knowingly support cyber-enabled theft of intellectual property, including trade secrets or other confidential business information, with the intent Read more about IP theft: Declining, or just more stealthy?[…]

Share

Open-source developers targeted in sophisticated malware attack

For the past few months, developers who publish their code on GitHub have been targeted in an attack campaign that uses a little-known but potent cyberespionage malware. The attacks started in January and consisted of malicious emails specifically crafted to attract the attention of developers, such as requests for help with development projects and offers Read more about Open-source developers targeted in sophisticated malware attack[…]

Share

VMware patches critical virtual machine escape flaws

VMware has released critical security patches for vulnerabilities demonstrated during the recent Pwn2Own hacking contest that could be exploited to escape from the isolation of virtual machines. The patches fix four vulnerabilities that affect VMware ESXi, VMware Workstation Pro and Player and VMware Fusion. Two of the vulnerabilities, tracked as CVE-2017-4902 and CVE-2017-4903 in the Read more about VMware patches critical virtual machine escape flaws[…]

Share

Trump extends Obama executive order on cyberattacks

U.S. President Donald Trump is extending by one year special powers introduced by former President Barack Obama that allow the government to issue sanctions against people and organizations engaged in significant cyberattacks and cybercrime against the U.S. Executive Order 13694 was introduced on April 1, 2015, and was due to expire on Saturday, but the president Read more about Trump extends Obama executive order on cyberattacks[…]

Share

Extreme swallows Brocade's data center networking business for $55M

Extreme Networks continued to amass a nice nest of data center technology saying today it would buy Brocade’s data center networking business will be sold to Extreme for $55 million in cash from its current owner Broadcom. Broadcom bought Brocade last year for about $5.5 billion but has since sold off Brocade’s Ruckus Wireless Wi-Fi Read more about Extreme swallows Brocade's data center networking business for $55M[…]

Share

How to fend off cyberattacks and data breaches

According to research conducted by Symantec, the number of cyberattacks against small businesses (companies with fewer than 250 employees) has been steadily growing over the last six years, with hackers specifically targeting employees (phishing). And while distributed denial of service, or DDoS, attacks are still a leading form of cyber warfare, ransomware and malware attacks, Read more about How to fend off cyberattacks and data breaches[…]

Share

Trojan source code leak poised to spur new online banking attacks

The source code for a new Trojan program that targets banking services has been published online, offering an easy way for unskilled cybercriminals to launch potent malware attacks against users. The Trojan is called Nuclear Bot and first appeared for sale on underground cybercrime forums in early December for $2,500. It can steal and inject Read more about Trojan source code leak poised to spur new online banking attacks[…]

Share
Share