In-brief: technology advances including the growth of the Internet of Things will make cybersecurity a top concern for individuals and governments, enabling a variety of futures – some sunnier than others, according to a report from UC Berkeley and the Hewlett Foundation.Read more ›
Post Tagged with: "hacking"
In-brief: A Michigan utility was knocked offline for much of last week following a ransomware infection that compromised the utility’s corporate network, but did not affect the delivery of water and electricity.Read more ›
In-brief: Verizon said in its 2016 Data Breach Investigations Report that it found no “real world” data on cyber incidents tied to Internet of Things technologies. Really?Read more ›
In-brief: A prominent expert in medical device security has warned the FDA that its draft guidance for post market medical devices is too focused on stomping out known threats, and not enough on addressing current and future risks to the security of healthcare environments.Read more ›
The information security industry has long operated with the premise of two, very different kinds of threats: indiscriminate, cyber criminal activity aimed at making money quick and sophisticated, targeted attacks intended to provide long term competitive advantage to another company (or economy), disrupt the operation of the target or provide a (future) strategic advantage in some kind of cyber conflict. But new research from FireEye suggests that the lines between sophisticated and unsophisticated cyber operations are blurred, making it hard for organizations to know if a given infection is merely bad luck, or evidence of a larger and more dangerous operation. Writing about a new financially motivated hacking crew called Fin6, FireEye said that the group, which targeted point-of-sale systems made off with “millions of payment card numbers.” Still, FireEye said that it couldn’t figure out how the group compromised its victims. “In Mandiant’s investigations of FIN6, the group already […]Read more ›