Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Hidden Cobra:  North Korean Malicious Cyber Activity

Original release date: February 14, 2020

The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Defense (DoD) have identified the following malware variants used by the North Korean government. The U.S. Government refers to malicious cyber activity by the North Korean government as ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Anniversary of the dedication of the ENIAC computer in 1946.

ENIAC (/ˈiːniæk,  ˈɛ-/; Electronic Numerical Integrator and Computer) was among the earliest electronic general-purpose computers made. It was Turing-complete, digital and able to solve “a large class of numerical problems” through reprogramming.

ENIAC was completed in 1945 and first put to work for practical purposes on December 10, 1945.  ENIAC was formally ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


‘Was the Iowa Caucus Hacked?’

People Are Searching for Answers
After a night of confusion and uncertainty in which no results were reported for the Iowa Democratic caucus, people are searching for answers. As a cybersecurity journalist, I probably consider the hacking possibilities more than most, but it was hard not to wonder. Adding to the ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Sanity Finally Reigns in Iowa

From Brian Krebs:  Dallas County, Iowa has dropped trespassing charges against two penetration testers who were arrested and jailed last year on September 11, and held in jail until yesterday for doing the job they were hired to do The news broke as Brian was in the middle of a video interview ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


UL Pushes Security Standards For The Internet Of Broken Things

from the internet-of-very-broken-things dept

If you hadn’t noticed yet, the internet of things is a security and privacy shit show. Millions of poorly-secured internet-connected devices are now being sold annually, introducing massive new attack vectors and vulnerabilities into home and business networks nationwide. Thanks to IOT companies ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Mac users targeted by Lazarus ‘fileless’ Trojan

The Lazarus hacking group are trying to sneak a ‘fileless’ Trojan on to Apple computers, disguised as a fake cryptocurrency trading program.


[Heads-Up] In Just 3 Months, Google Alerted 12,000 People About Phishing Attacks by Nation-States

Google’s Threat Analysis Group (TAG) delivered thousands of alerts of ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


AA20-006A: Potential for Iranian Cyber Response to U.S. Military Strike in Baghdad

Original release date: January 6, 2020

Summary

The Cybersecurity and Infrastructure Security Agency (CISA) is sharing the following information with the cybersecurity community as a primer for assisting in the protection of our Nation’s critical infrastructure in light of the current tensions between the Islamic Republic ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Police Warn of New ‘Line-Trapping Technology’ Being Used to Scam People Over the Phone

From CyberHeist News

A new piece of sophisticated technology is being used by fraudsters to scam unsuspecting people over the phone. Police said a woman in the York Region received a call earlier this month and was told by the scammers she had been a victim of ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


FTC warns Christmas buyers that smart toys are a security risk

Thinking of giving a young person an internet-connected ‘smart’ toy this Christmas? You may want to think again.


Targeting Military Veterans: 5 Ways Cybercriminals Are Scamming Them

They trained, they served, they protected us. Now, they’re being targeted by cybercriminals who prey ...

Continue Reading →
0
Page 22 of 35 «...102021222324...»