Spy vs. Spy vs. Spy – What Countries Are Using Cyber-Espionage Tactics?

The press has been relentless lately in its coverage of Russian cyber-espionage and disinformation campaigns on Facebook and other social networks prior to the last US Presidential campaign.  But is Russia the first to engage in election rigging on this sort?  Hardly.  We thought that looking at the state of cyber-espionage as a tactic in international relations might be interesting, and we were right.  It turns out that cyber-espionage is not ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


 Made a Fortune in BitCoin?  Be careful who you tell.

From Naked Security – Crypto Coins Robbed at Gunpoint.

Good old fashioned stick-ups still a possibility.


Watch out – fake support scams are alive and well this Christmas

Fake support scams – where the crooks help you “remove” malware you don’t have – are still a real ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Is Donald Trump Putin’s Revenge?

A two-part Frontline documentary on PBS titled Putin’s Revenge examines the rise to power of an obscure ex-KGB agent named Vladimir Putin and the tactics he used to influence the last U.S. Presidential Election.  Evidence would indicate that Putin prefers Republics to Democrats.  Worth a look.  Live stream them here.


Continue Reading →
0

Hidden Web Cams in Airbnb Rentals and Hotel Rooms?

If you are traveling for the holidays, here is something else to watch for – the hidden web camera.  If you are staying at an Airbnb, or even a traditional hotel or motel over the holidays, be aware that there have been incidents where web cams have been found in the rooms.  Often they are disguised as other devices, such as the “motion ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


 Over 75% of Android apps are secretly tracking users

Yale Privacy Lab has discovered hidden trackers in hundreds of popular Android apps that send app manufacturers your location, activity, and other personal info.


Cayla doll too eavesdroppy to put under the Christmas tree, says France

That Bluetooth Cayla doll and i-Que surveillance robot can be taken ...

Continue Reading →
0

Merry Christmas -The Internet of Insecure Toys

Are the toys you are buying for your kids hackable?Can anyone listen in or have a conversation with your kids via an Internet connected toy?  Sorry, but the answer is “yes.”

We have been writing for a while about the grievous lack of security on Internet-connected “smart” appliances, web cameras, baby monitors, door locks, thermostats, personal assistants, Wi-Fi, Cable, and DSL routers, and other ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Today is Veterans Day – Thanks for Your Service

Veteran’s day is a remembrance of all U.S. military veterans – past and present. It is celebrated every November 11th, and has been a federal holiday since 1926.


Protecting Critical Infrastructure from Cyber Threats

10/31/2017 08:14 AM EDT  Original release date: October 31, 2017

Building resilience in critical infrastructure ...

Continue Reading →
0

Scary Kaspersky Stories – Ghost in the Machine

Happy Halloween!  Nothing like a scary story to end the holiday.  The scary story in cybersecurity is that Kaspersky anti-malware and security products are in league with the Putin government and the FSB in Russia.  The FBI is advising government agencies to drop Kaspersky and find a new endpoint security solution.

Kaspersky Lab is a Russian multinational cybersecurity and anti-virus provider headquartered in Moscow, Russia and operated through a holding company in the United Kingdom. Kaspersky was founded by Eugene ...

Continue Reading →
0

Email Account Hijacking – Part 3 Extending the Exploit

On Monday and Wednesday we looked at email account hijacking, how it happens, and what can happen after the account is controlled by an attacker.  Today we will see how an attacker could use the beachhead they established in your email account to extend their intrusion.

They have already proven that you are susceptible to phishing and other social engineering exploits.  So sending the victim other phishing emails that allow more access ...

Continue Reading →
0
Page 1 of 5 12345