Tag: APT

Episode 79: Hackable Nukes and Dissecting Naughty Toys

In this week’s Security Ledger Podcast episode, the UK -based policy think tank Chatham House warned last week that aging nuclear weapons systems in the U.S., the U.K. and other nations are vulnerable to cyber attacks that could be used to start a global conflagration. We talk with Eddie Habbibi of PAS Global about what can be done to secure hackable nukes. Also: with CES raging in Las Vegas last week, we go deep with security researcher Jay Harris on flaws in connected toys being sold to children.

Episode 77: From Russian Hacking to Mr. Robot Our Most Popular Podcasts of 2017

In this, our final episode of 2017, we look back at our most popular segments from the past year – many of which touched on issues that (surprise, surprise) crossed the boundary between information security and politics. Among the most popular segments were discussions of hacking the U.S. election systems, a primer on the cyber capabilities of North Korea with Crowd Strike, a conversation of the case against the Russian firm Kaspersky Lab and an interview with the guy who helps make the hacking scenes in the USA Network’s Mr. Robot look so real.

NotPetya’s Cost to FedEx: $400 Million and counting

As Federal Express continues to recover from the devastating NotPetya malware outbreak, the cost of the attack on the company continues to grow, topping $400 million in just the last six months. 

University of Michigan Lands $3.6m DARPA Grant for Unhackable Hardware

The University of Michigan announced that it has received a $3.6 million grant to develop hardware based security features that will make Internet connected systems “unhackable.” The grant will fund a project called MORPHEUS, which is developing a means of fending off hackers by turning computer circuits into the equivalent of “unsolvable puzzles,” according to a statement issued by University of Michigan. The grant was issued as part of a $50-million DARPA program to improve cybersecurity by marrying cybersecurity features with hardware rather than software. “Instead of relying on software Band-Aids to hardware-based security issues, we are aiming to remove those hardware vulnerabilities in ways that will disarm a large proportion of today’s software attacks,” says Linton Salmon, manager of DARPA’s System Security Integrated Through Hardware and Firmware (SSITH) program. Nine grants have been awarded under the SSITH program, including the $3.6 million of funding for the University of Michigan […]

US says North Korea behind WannaCry Attack

The Trump Administration on Tuesday said that the government of North Korea was responsible for the cyber attack dubbed “WannaCry” that infected hospitals in the United Kingdom and hundreds of thousands of other computers globally.