Tag: Mobile Threats

The Hacked Camera Botnet: Not New, Just Big

In-brief: More than 100,000 infected, Internet connected cameras played a part in giant denial of service attacks against a security news website last week. It’s not the first time such devices have been used to attack. 

No Panacea, Machine Learning Still Poised to Transform Security Work

In-brief: experts at an event in San Francisco predicted that humans will be in the loop on information security for the foreseeable future, even as advances in machine learning eliminate whole categories of lower level information security work.

Start-Up Claroty Has Eye On Industrial Control System Threats

In-brief: Claroty, an Israel-based start-up emerged from stealth mode on Tuesday, unveiling a new platform that it claims will help owners of industrial control systems detect threats and attacks by sophisticated adversaries. 

Justice Dept. studying national security threats of Internet of Things devices

Reuters is reporting that the U.S. Justice Department has formed a threat analysis team to study potential national security challenges posed by self-driving cars, medical devices and other Internet-connected tools. The new group’s goal is to secure the so-called “internet of things” from exploitation by “terrorist threats” and by others who might try to hack devices to cause loss of life or achieve political or economic gain, according to Assistant Attorney General John Carlin, head of the Justice Department’s national security division. The impetus for the team, which has been informally active for about six months, was an understanding that the internet is vulnerable to cyber attacks partly because it was not designed with security in mind, Carlin told Reuters, after announcing the group on Thursday at the Intelligence and National Security Alliance conference in Washington. Source: Justice Dept. group studying national security threats of internet-linked devices

Beware: Targeted Attacks on iPhone Users are a Thing | Lookout Blog

In-brief: Lookout said it identified an active threat that was using three critical iOS zero-day (that is: previously unknown) vulnerabilities. When exploited, the three vulnerabilities “form an attack chain that subverts even Apple’s strong security environment.”