Post Tagged with: "hacking"

Duck and Cyber: Berkeley Report Imagines Dark, Technology Driven Futures

May 4, 2016 07:510 comments
Technology advances including the growth of the Internet of Things could lead to a variety of different futures - some sunnier than others, according to a report from UC Berkeley and the Hewlett Foundation. (Image courtesy of the Library of Congress.)

In-brief: technology advances including the growth of the Internet of Things will make cybersecurity a top concern for individuals and governments, enabling a variety of futures – some sunnier than others, according to a report from UC Berkeley and the Hewlett Foundation.

Read more ›

Michigan Utility Felled in Ransomware Attack

May 3, 2016 18:520 comments
The Lansing, Michigan Board of Water and Light said that a ransomware infection forced the shutdown of much of its corporate network last week.

In-brief: A Michigan utility was knocked offline for much of last week following a ransomware infection that compromised the utility’s corporate network, but did not affect the delivery of water and electricity. 

Read more ›

Verizon: No ‘Real World’ Internet of Things Risk. Really?

April 27, 2016 09:480 comments
Click to download the DBIR.

In-brief: Verizon said in its 2016 Data Breach Investigations Report that it found no “real world” data on cyber incidents tied to Internet of Things technologies. Really?

Read more ›

Expert: FDA Cyber Guidance For Medical Devices Needs More Work

April 25, 2016 11:060 comments
The FDA's pending guidance for post market cyber security needs more work to be effective says University of Michigan Professor Kevin Fu.

In-brief: A prominent expert in medical device security has warned the FDA that its draft guidance for post market medical devices is too focused on stomping out known threats, and not enough on addressing current and future risks to the security of healthcare environments.

Read more ›

Blurred Lines: Sophisticated Hacks Building On Commodity Crime Tools

April 20, 2016 22:310 comments
Blurred Lines: Sophisticated Hacks Building On Commodity Crime Tools

The information security industry has long operated with the premise of two, very different kinds of threats: indiscriminate, cyber criminal activity aimed at making money quick and sophisticated, targeted attacks intended to provide long term competitive advantage to another company (or economy), disrupt the operation of the target or provide a (future) strategic advantage in some kind of cyber conflict. But new research from FireEye suggests that the lines between sophisticated and unsophisticated cyber operations are blurred, making it hard for organizations to know if a given infection is merely bad luck, or evidence of a larger and more dangerous operation. Writing about a new financially motivated hacking crew called Fin6, FireEye said that the group, which targeted point-of-sale systems made off with “millions of payment card numbers.” Still, FireEye said that it couldn’t figure out how the group compromised its victims. “In Mandiant’s investigations of FIN6, the group already […]

Read more ›