Tech content trusted by users in North America and around the world
6,733 Reviews & Articles | 46,261 News Posts

TweakTown News

Refine News by Category:

Hacking & Security Posts - Page 15

South Korea constantly battling North Korea in growing cyber war

By: Michael Hatamoto | More News: Hacking & Security | Posted: Apr 23, 2015 10:14 pm

The South Korean government believes they have found evidence that shows North Korea is behind cyberattacks aimed at its financial sector and nuclear operators. The malicious code was designed to delete files from infected PCs, which prevented banking customers from transferring money online or withdraw money in-person.




"The malicious codes used in the attack were same in composition and working methods as 'Kimsuky' codes known to be used by North Korea," according to the South Korean prosecutor's office, and noted by CNN. In addition, some IP addresses were traced back to Shenyang, China, which is along the border between China and North Korea - with North Korea reportedly relying on China's more established Internet infrastructure to launch attacks.


North Korea's growing cyber ability tends to be focused on South Korea, with financial institutions, nuclear power operators, and private sector companies all targeted in the past.

The Media Trust shows off SaaS-based tool to identify malvertising

By: Michael Hatamoto | More News: Hacking & Security | Posted: Apr 22, 2015 10:09 pm

The Media Trust, a cybersecurity firm focused on monitoring and protecting the advertising ecosystem, has unveiled a new software as a service (SaaS) offering able to provide real-time data about malicious ads.




Resolution Services is designed for use by ad networks, publishers, ad exchanges, paid-content engines and demand platforms, and scans for malware detection - providing faster remediation time if something is detected.


"Every day the ad-network-and-exchange model proves its worth as evidenced by the millions of ads successfully served in just one 24-hour cycle, but the constant threat of malvertising requires continuous improvement and greater collaboration across the industry," said Chris Olson, co-founder and CEO of The Media Trust.

Continue reading 'The Media Trust shows off SaaS-based tool to identify malvertising' (full post)

Webroot: Cybercrime complexity increasing, making things even harder

By: Michael Hatamoto | More News: Hacking & Security | Posted: Apr 22, 2015 8:54 pm

There are 85,000 new malicious IPs launched daily, while technology companies and financial institutions endure the highest number of phishing attacks, according to the Webroot 2015 Threat Brief. The United States has the most malicious IP addresses with 31 percent, ahead of China (23 percent), and Russia (10 percent) - with half of all malicious IP addresses tracing back to Asia.




The United States hosts the most amount of phishing sites, accounting for three out of every four - even though experts believe foreign operators could be utilizing US-based sites for their operations.


"Webroot has seen a continued rise in the number of malicious URLs, IP addresses, malware, and mobile applications used to enable cybercriminals to steal data, disrupt services, or cause other harm," said Hal Lonas, CTO at Webroot.

Continue reading 'Webroot: Cybercrime complexity increasing, making things even harder' (full post)

Cybersecurity researchers say Israeli military networks breached

By: Michael Hatamoto | More News: Hacking & Security | Posted: Apr 22, 2015 8:09 pm

Unknown Arabic-speaking hackers have successfully breached Israeli military computer networks, in an ongoing cyberespionage campaign, according to enterprise cybersecurity firm Blue Coat Systems. The hackers pieced together an effective attack vector by using existing malware that was launched via social engineering attacks to compromise victims.




The use of social engineering and code that wasn't customized allowed the hackers to operate with low overhead, while still being able to complete their mission. The phishing emails were sent to publicly listed military addresses, promising a breaking military news update, or a video clip of the "Girls of the Israel Defense Forces."


Israel has a strong private sector focused on cybersecurity, but faces a growing number of enemies improving their cyberattack abilities. Groups such as Hezbollah, for example, are able to launch surprisingly sophisticated cyber missions aimed at stealing information and interrupting military operations.

Continue reading 'Cybersecurity researchers say Israeli military networks breached' (full post)

Report: Need better breach crisis? IT manager may not be best bet

By: Michael Hatamoto | More News: Hacking & Security | Posted: Apr 22, 2015 7:57 pm

Companies must have a strategy in place when a data breach occurs, and it looks like IT managers may not be best to handle a breach crisis, according to a new report by Booz Allen Hamilton. Instead, a business savvy leader at the company is better prepared to handle the problem, as they will be prepared to address crisis communications, legal issues, disaster recovery, and other strategic decisions that must be made.




A skilled executive that has a high-level view of the company's complete operation will be able to react more efficiently instead of an IT or security manager.


"They may have to shut the systems down, reconfigure things, and do other things that will affect the business," said Bill Stewart, executive vice president of Booz Allen Hamilton, in a statement published by CSO Online. "And they might not be in a situation where they understand the broader business objectives. Having someone who understands the broader business, helps them make better decisions."

Continue reading 'Report: Need better breach crisis? IT manager may not be best bet' (full post)

The race is on to help develop cybersecurity for Internet of Things

By: Michael Hatamoto | More News: Hacking & Security | Posted: Apr 22, 2015 6:47 pm

There are more than 16 billion connected computing devices in use across the world today, with even more Things expected to utilize the Internet of Things (IoT) in the future.




Cybersecurity experts are concerned about a large number of threats, with 83 percent worried about rogue or unauthorized devices operating undetected in their networks, according to a recent survey by Pwnie Express. To make matters even worse, 69 percent of cybersecurity professionals cannot access full wireless visibility of devices, so it's difficult to identify what is actually connected.


As more companies and users embrace IoT, there is concern that the Internet of Evil Things (IoET) will find countless vulnerabilities to exploit in the future.

Continue reading 'The race is on to help develop cybersecurity for Internet of Things' (full post)

Cheetah Mobile: 99% of Android phone users faced a potential threat

By: Michael Hatamoto | More News: Hacking & Security | Posted: Apr 21, 2015 4:09 pm

A whopping 99 percent of Google Android phone owners faced a potential threat from cybersecurity loopholes, according to the Cheetah Mobile 2014 Mobile Security Report.




Mobile users faced a number of different phishing scams, malware attacks, and data leaks in 2014 - and social network phishing is evolving, posing even more threats that users should be aware of.


Android, the most popular mobile operating system, has been applauded for its open source ecosystem - which also gives cybercriminals the ability to easily create malicious tools. Cybersecurity experts recommend running an anti-malware scanner, at the very least, to help identify potential threats that could be avoided.

Report: Better cybersecurity, safety standards needed for patient data

By: Michael Hatamoto | More News: Hacking & Security | Posted: Apr 21, 2015 2:36 am

Cybercriminals find healthcare data to be an appealing target, as medical records contain a large amount of personal information. There is a drastic need for better cybersecurity protocols - and how hospitals and other medical agencies handle paper and electronic records.




Thirty four percent of reported medical data breaches over the past three years took place in California, Florida, Texas, New York and Illinois - with a mix of healthcare system partners, insurers, and other third parties helping contribute to the problem.


"News of hacking incidents and cybersecurity [breaches] have been in the news so much lately, [that] both for industries inside and outside healthcare, one might get the impression that hacking is the most common reason for data breaches," said Dr. Vincent Liu, from the division of research for Kaiser Permanente, in a statement to Medpage Today. "In fact, we found that theft of paper or electronic records accounted for the majority - protecting the security and privacy of patient data needs to be a priority in many different venues, and with all types of patient data, including paper records."

Cryptzone: Insider threats still pose biggest threat to companies

By: Michael Hatamoto | More News: Hacking & Security | Posted: Apr 20, 2015 8:53 pm

Insider threats remain a significant threat to corporations, causing the most actual damage and harm, according to a recent survey published by the Cryptzone cybersecurity firm.




"It's remarkable that many organizations are still utilizing network security technologies developed in the nineties - a time when the Internet was still in its infancy," said Kurt Mueffelmann, president and CEO of Cryptzone. "The cyberattacks we have seen over the last few years have demonstrated that it's far too easy for hackers to steal user credentials, and then use those credentials to traverse the enterprise network in search of the most valuable data."


Forty-eight percent of respondents said IT departments are main controllers related to cybersecurity policy, 36 percent said information security owns policy control, and 12 percent noted compliance or risk management teams are responsible for security policies.

Continue reading 'Cryptzone: Insider threats still pose biggest threat to companies' (full post)

Expert: Cyberattacks on nuclear power plants could be next 9/11

By: Michael Hatamoto | More News: Hacking & Security | Posted: Apr 20, 2015 5:43 pm

Cybercriminals are finding security vulnerabilities that allow them to target critical infrastructure like electric grids, and could also begin targeting nuclear power plants, according to a cybersecurity specialist in Israel.




"The disruption and possible infiltration of critical infrastructure is the most severe form of cyberattack," said Col. Dr. Gabi Siboni, director of the cyber security program at the Institute for National Security Studies program, in a statement to the Jerusalem Post. "Such attacks on airplanes or air traffic control towers, for instance, means that hackers could cause accidents, or even paralyze entire flight systems. As of now, this area of capabilities is the exclusive domain of developed states."


The United States, UK, Israel, South Korea, and other nations have expressed concern related to critical infrastructure cybersecurity. Recently, South Korea - which has blamed North Korea - suffered a breach at its national nuclear plant operator, though quickly confirmed its 23 atomic reactors weren't at risk.

Continue reading 'Expert: Cyberattacks on nuclear power plants could be next 9/11' (full post)

Subscribe to our Newsletter

Latest News Posts

View More News Posts

Forum Activity

View More Forum Posts

Press Releases

View More Press Releases