The WannaCry ransomware attack from this May made the whole world think about cyber security issues once again. Another unique point for WannaCry versus previous cyber attacks is IoT also got involved with the crisis as well. We learned from the news reports that this worm virus was different from usual. It had not only tried to […]
Last Friday here in Europe, we saw over 50,000 companies and over 100 countries hit by the WannaCry ransomware attack. In Germany, digital display boards at Deutsche Bahn train stations were inoperable. In Spain, internal computers were down at telecommunications provider Telefonica. In the UK, the National Health Service (NHS) was hit, with staff unable to access patient records, some phones down […]
Like something out of the Walking Dead, a plague is ripping through the Internet and turning IoT devices into zombies. The horde amassed by the Hajime malware has grown to over 300,000 Internet of Things devices. While your smart fridge won’t come to life and try to eat your brains, the term “zombie” in this […]
A new malicious software program targeting Linux-based Internet of Things (IoT) devices, called BrickerBot, has been spotted by cybersecurity vendor Radware. BrickerBot is similar to Mirai, the destructive malware program that enlists corrupt IoT devices into botnets for denial-of-service (DDoS) attacks. Like Mirai, BrickerBot attacks unsecure devices that have not changed the default username and […]
The introduction of smart home devices into the average home is on an upward trajectory with Gartner forecasting the number of connected devices to reach more than 21 billion by 2020. With this growth comes an increased risk of cyber attacks. As we get closer to a time where home electronics are embedded with IoT technology whether […]
Motion data that your wearable collects from accelerometers, gyroscopes, and magnetometers could be used to break into your bank account or any other keypad lock, according to a paper co-authored by the Stevens Institute of Technology and the Thomas J. Watson School of Engineering and Applied Science at Binghamton University. Researchers were able to develop an […]
Sorting your good bots from your bad
What’s improved and what’s still vulnerable.
It might be swimming in your sensitive data.
Defense against intrusion is no longer enough.
Or just clumsily blocking video with malware tactics.
Hack and hack alike.
It calls “The Interview” the “movie of terrorism.”
The cyber criminals are still at large.
It’s “destructive” and unprecedented
It looks like the software behind spy attacks in the EU.
Hackers or government spies—take your pick.
Believe it or not, it’s for a good cause.
Google adds new capabilities to its Verify Apps security program after the Virus Shield scam.