In-brief: New research from Akamai suggests that attackers are using new methods to carry out and cover up for malicious attacks, among them: harnessing harmless mobile carrier networks to carry out attacks such as SQL injection. Like this:Like Loading…Read more ›
Post Tagged with: "Mobile Threats"
In-brief: A researcher studying the workings of a wireless-enabled drug infusion pump by the firm Hospira said the device utterly lacked security controls, making it “the least secure IP enabled device” he had ever worked with. His research prompted a warning from the Department of Homeland Security. Like this:Like Loading…Read more ›
In-brief: IBM researchers say they have seen a spike in malicious activity linked to the Dyre family of malware. Sophisticated attacks on business banking accounts have led to the theft of millions of dollars, IBM says. Like this:Like Loading…Read more ›
In-brief: An Executive Order signed by President Obama on Wednesday will clear the way for cyber criminals to face the same sanctions as terrorist groups, illegal arms dealers and drug traffickers. One expert called the Order “momentous.” Like this:Like Loading…Read more ›