Tech content trusted by users in North America and around the world
6,576 Reviews & Articles | 44,587 News Posts
TRENDING NOW: Microsoft reportedly interested in acquiring AMD

TweakTown News

Refine News by Category:

Hacking & Security Posts - Page 10

US looking to re-establish technological edge, focus on cybersecurity

As part of the US Defense Department's "Better Buying Power 3.0" initiative, the government wants to see closer relationships forged with the private sector. The main goal of the program is to make sure the US doesn't lose a technological edge over foreign adversaries, as the DoD dumps money into new R&D efforts.

 

looking-re-establish-technological-edge-focus-cybersecurity_01

 

A major effort will focus on keeping next-generation weapons technology and defense systems secure from cyberattacks - something that is of major concern, especially from China, Russia, and other countries with sophisticated cyber militaries.

 

"It includes the industrial base that supports us and their databases and their information," said Frank Kendall, undersecretary of defense for acquisition, technology and logistics, in a statement. "It includes what we hold in government. It includes the logistics support information, the sustainment information, the design information, the tactical information. Everything associated with the product is a potential point of attack. And we are under attack in the cyber world, and we've got to do a better job protecting our things."

Europol, FBI successfully shuts down Beebone malware

The Europol Cybercrime Centre and the FBI teamed up to bring down the Beebone botnet, a custom operation that installed malware on unknowing victims. At least 12,000 machines were infected - with an estimate up to 100,000 zombie PCs - hijacked by cybercriminals. The malware was used to collect stolen passwords and download third-party applications onto victim PCs, officials noted.

 

europol-fbi-successfully-shuts-down-beebone-malware_01

 

"The fact that it [the malware] is complicated suggests that it could be used for more targeted attacks," said Paul Docherty, director of Portcullis Security, recently told the BBC. "If those responsible were able to harness similar difficult-to-detect code they could potentially move the point of attack from home users to corporate users or other entities which typically hold large amounts of sensitive, valuable data."

 

The polymorphous malware utilized its unique ability to change its "shape" so it was better able to evade cybersecurity defenses - and continue hijacking new users.

Continue reading 'Europol, FBI successfully shuts down Beebone malware' (full post)

Cyber Caliphate hacks French TV network TV5Monde

TV5Monde in France suffered a major cyberattack that led to hijacked websites and social media accounts, along with causing a three-hour broadcast blackout. The Cyber Caliphate, a pro-ISIS hacker group, didn't take public responsibility for the attack - but pro-ISIS images and "hacked by an Islamist group" markings were left on compromised accounts.

 

cyber-caliphate-hacks-french-tv-network-tv5monde_01

 

"We are no longer able to broadcast any of our channels. Our websites and social media sites are no longer under our control and are all displaying claims of responsibility by Islamic State," said Yves Bigot, TV5Monde director general, told the AFP.

 

France's culture minister will host an emergency meeting with major French media groups so they are able to study their cybersecurity protocols. A terrorism investigation has been opened by the Paris prosecutor's office following the cyberattack, which is the most sophisticated shown by the Islamic State.

Businesses struggle to fight against ransomware cyberattacks

Ransomware infections tend to be a frightening scenario for businesses often caught off-guard when an employee mistakenly compromises a workplace machine.

 

businesses-struggle-fight-against-ransomware-cyberattacks_01

 

Cybersecurity experts are increasingly worried about ransomware, one of the fastest rising hacker-related crimes, which demands a ransom payment in exchange for files held hostage. The traditional method of infection is a malicious file attached to an email, but criminals are finding ways to point victims to hijacked websites.

 

Unless home users or companies have data backed up, and are careful of emails opened and websites visited, ransomware can prove especially catastrophic. Even though US government and private sector cybersecurity experts warn against paying ransoms, many companies choose to pay the ransom and move on.

Continue reading 'Businesses struggle to fight against ransomware cyberattacks' (full post)

Russian government blamed for hacking White House in cyberattack

The Russian government is being blamed for hacking into a computer system used by the White House, and the hackers were able to view classified information. It's possible the cyber intrusion, with alleged ties to the US State Department breach, was in retaliation for sanctions against Russia.

 

russian-government-blamed-hacking-white-house-cyberattack_01

 

However, White House officials didn't specifically single out Russia for launching the cyberattack - but there is an active investigation by the Secret Service, FBI and US intelligence agencies. "In this case, as we made clear at the time, we took immediate measures to evaluate and mitigate the activity," said Mark Stroh, National Security Council spokesman. "As has been our position, we are not going to comment on [this] article's attribution to specific actors."

 

Not surprisingly, the Kremlin has issued a statement saying Russia is a constant scapegoat for organized cyberattacks: "In regard to CNN's sources, I don't know who their sources are," said Dmitry Peskov, spokesman for Russian President Vladimir Putin, in a statement published by RT. "We know that blaming everything on Russia has already turned into some sort of sport."

The government has control of your naughty selfies, Snowden says

In a discussion on Last Week Tonight, Edward Snowden told comedian John Oliver about how we can think about the governments surveillance of citizens in a more relatable manner.

 

 

It is often discussed that the general population isn't up in arms about breaches of sensitive data as they can't closely relate with exactly whats going on. In an attempt to educate some, Oliver took a new approach as spotted on News.com.au.

 

Talking to Americans on the street, Oliver showed us that there was quite a number of people who weren't exactly sure who Snowden was - often confusing him for Wikileaks founder Julian Assange. He then asked how people would feel if their naughty 'nudes' were available for the taking.

 

One angry person stated "if I had knowledge that the US government had a picture of my d*ck, I would be very pissed off," with Snowden adding "well, the good news is there's no program named 'The D*ck Pic Program'. The bad news is [the government's] still collecting everybody's information - including your d*ck pics."

Continue reading 'The government has control of your naughty selfies, Snowden says' (full post)

Linux Australia confirms it suffered a data breach of customer data

A Linux Australia server hosting a conference attendee database was compromised after cybercriminals were able to gain root level access. Information taken related to the Linux Aus Conference for 2013, 2014 and 2015, along with PyCon Australia 2013 and 2014 - stolen data included names, email addresses, physical mailing addresses, phone numbers, and passwords.

 

linux-australia-confirms-suffered-data-breach-customer_01

 

Hackers were able to trigger a remote buffer overflow after installing a remote access tool, and then rebooted the server so software was loaded into memory. From there, a command & control center was installed and began operation - and system administrators note that it doesn't look like personal information was taken, but an investigation continues.

 

"In accordance with our values of transparency and openness, we wish to inform you of a security breach of Linux Australia's servers," said Joshua Hesketh, organization president of Linux Australia. "This incident has resulted in the possible, but not confirmed, release of personal information."

MI6 admits the difficulties of trying to keep up with cybercriminals

There is a technology arms race currently underway between the US and UK governments trying to compete against cybercriminals and terrorists using the Internet effectively. Cybercriminals are increasingly organized, some of them state-funded, and able to launch sophisticated attacks easily.

 

mi6-admits-difficulties-trying-keep-up-cybercriminals_01

 

During a recent speech, MI6 officials said agents are trying to battle against opponents "unconstrained by consideration of ethics and law," able to more easily put the UK at risk. Although espionage can be easier to track due to technological footprints, it also opens the door to cyber mercenaries able to share and launch coordinated attacks.

 

"Using data appropriate and proportionately offers us a priceless opportunity to be even more deliberate and targeted in what we do, and so be better at protecting our agents and this country," said Alex Younger, chief of the Secret Intelligence Service (MI6).

Continue reading 'MI6 admits the difficulties of trying to keep up with cybercriminals' (full post)

IBM outs cybercriminal group running 'Dyre Wolf' scam

A well-organized Eastern European cybercriminal group is using social engineering that includes phishing and phone calls paired with malware to steal money from US businesses. IBM, which discovered the surprisingly sophisticated operation, call it "The Dyre Wolf" - and while the group has netted just $1 million so far - the organization of the group is rather alarming.

 

ibm-outs-cybercriminal-group-running-dyre-wolf-scam_01

 

Once victims click on a fraudulent link or attachment, the malware is installed and waits for users to access a bank website. Instead of going to the bank's website, a fake screen says the bank website is down, so victims have to call a phone number. Once dialed, victims turn over bank information and a large money wire transfer is initiated by the criminals.

 

"What's very different in this case, is we saw a pivot of the attackers to use a set of social engineering techniques that I think are unprecedented," said Caleb Barlow, VP of IBM Security, in a statement to Reuters. "The focus on wire transfers of large sums of money really got our attention."

Continue reading 'IBM outs cybercriminal group running 'Dyre Wolf' scam' (full post)

NSA finding it harder to recruit specialists following Snowden leaks

The National Security Agency (NSA) should be able to find itself 1,600 new recruits in 2015, with a heavy focus in computer science and math, but the task is getting harder. A combination of rising Silicon Valley tech employment/salaries mixed with Edward Snowden's intelligence leaks have damaged trust in the NSA from the public - and possible job recruits.

 

nsa-finding-harder-recruit-specialists-following-snowden-leaks_01

 

The NSA has around 35,000 employees across the country, and trying to compete against tech companies to recruit employees from leading universities is proving difficult. A lack of trust is a major issue that is making some people think-twice before trying to land a job with a security clearance.

 

"Before the Snowden leaks we looked at the NSA as being a spy agency, and they did what they were supposed to do," said Matthew Green, assistant research professor at the Johns Hopkins Information Security Institute, in a statement to NPR. "But we've learned that they've been collecting this incredible amount of information. And they're not shy about doing whatever they have to do to get access to that information."

Continue reading 'NSA finding it harder to recruit specialists following Snowden leaks' (full post)

Latest News Posts

View More News Posts

Forum Activity

View More Forum Posts

Press Releases

View More Press Releases
Subscribe to our Newsletter
Or Scroll Down