Cybercriminals count on human interaction in 99% of attacks, research shows

Cybercriminals count on human interaction in 99% of attacks, research shows

by Filip TRUTA, from HotForSecurity , on 10.09.2019

Cybercrooks exploit human flaws in about 99% of their attacks, using social engineering across email, cloud applications and social media to gain a foothold in a targeted infrastructure, new research shows. Almost all cyber-attacks begin with luring employees into clicking on malicious content. Cybercriminals target mainly people, rather than systems, to install malware, steal data [and#8230;] read more

Politicians Don’t Understand Cybersecurity, Say 82% of IT Security Professionals

Politicians Don’t Understand Cybersecurity, Say 82% of IT Security Professionals

by Filip Truta, from Business Insights , on 10.09.2019

Legislators need to impose stricter cybersecurity laws as cyber-attacks continue to increase. However, the vast majority of cybersecurity professionals attending this year’s Black Hat conference in Las Vegas agreed that elected officials aren’t capable of crafting effective security regulation. read more

Americans don’t want their tax dollars paying off ransomware crooks

Americans don’t want their tax dollars paying off ransomware crooks

by Filip TRUTA, from HotForSecurity , on 09.09.2019

Ransomware operators have targeted more American intitutions than ever this year, including state and local government systems, school districts, healthcare facilities and other entities. And with the payouts circulated in the news, it’s hardly a surprise that their appetite keeps growing. While government officials scramble to strengthen their cybersecurity, taxpayers are angry. A recent wave [and#8230;] read more

Wikipedia and World of Warcraft Classic targeted by DDoS attacks

Wikipedia and World of Warcraft Classic targeted by DDoS attacks

by Graham CLULEY, from HotForSecurity , on 09.09.2019

Imagine a world without Wikipedia. Do you even remember what it was like when you had to use your memory to recall the order of James Bond films, guess how old Tina Turner is, or try to say with any certainty with what country France has its longest land border? Now many of us donand#8217;t [and#8230;] read more

Ransomware gang demands $5.3 million from New Bedford; city restores from backup instead

Ransomware gang demands $5.3 million from New Bedford; city restores from backup instead

by Filip TRUTA, from HotForSecurity , on 05.09.2019

A ransomware gang looking to get rich overnight went to the city of New Bedford with a demand of $5.3 million after infecting the municipality’s systems. The criminals refused a counter-offer that would make many hackers drool. And instead ended up with nothing. One July night, according to New Bedford Mayor Jon Mitchell, the attackers [and#8230;] read more

CEO voice deepfake blamed for scam that stole $243,000

CEO voice deepfake blamed for scam that stole $243,000

by Graham CLULEY, from HotForSecurity , on 04.09.2019

So-called artificial intelligence apps like Zao had been stirring up controversy with their potential abusive use to beat facial recognition systems. The Chinese deepfake video app proved itself to be widely popular as users had fun transplanting their digital faces onto footage from movies and popular TV shows such as and#8220;Game of Thrones.and#8221; But deepfake [and#8230;] read more

Hackers breach IT vendor shared by 400 medical practices infecting every office with ransomware

Hackers breach IT vendor shared by 400 medical practices infecting every office with ransomware

by Filip TRUTA, from HotForSecurity , on 03.09.2019

Around 400 dental offices across the United States have fallen victim to ransomware after the operators breached an IT vendor shared by all the practices. A notice sent out by the Wisconsin Dental Association reveals that hackers breached the backend software shared by hundreds of dental practices around the country and crippled their computers, incapacitating [and#8230;] read more

Car Trackers Could Let Hackers Track and Immobilize Vehicles

Car Trackers Could Let Hackers Track and Immobilize Vehicles

by Ionut ILASCU, from IoT Security Insights , on 02.09.2019

Statistics show that car trackers contribute significantly to lowering the car theft rate. The rate drops as much as 40% in countries where such devices are mandatory. But when developers ignore basic security practices, bad actors can use them to track vehicles, suppress alarms or steal personal information. Security researchers from Pen Test Partners tested ... The post Car Trackers Could Let Hackers Track and Immobilize Vehicles appeared first on Bitdefender. read more

Google’s bug bounty bid to make big Android apps more secure

Google’s bug bounty bid to make big Android apps more secure

by Graham CLULEY, from HotForSecurity , on 30.08.2019

Google wants Android users to feel that its platform is secure, and knows that peopleand#8217;s confidence can be shaken when the media is full of headlines of the latest security scare. And itand#8217;s with that in mind that Google announced this week that it was expanding its bug bounty program, that rewards security researchers who [and#8230;] read more

Ex-Amazon worker suspected of hacking Capital One, faces charges of breaching 30 other companies to mine cryptocurrency

Ex-Amazon worker suspected of hacking Capital One, faces charges of breaching 30 other companies to mine cryptocurrency

by Graham CLULEY, from HotForSecurity , on 29.08.2019

At the end of July, the FBI arrested a 33-year-old woman in Seattle in connection with a massive data breach at financial services firm Capital One. 33-year-old software engineer Paige Thompson, who also went by the online handle of and#8220;erraticand#8221;, was suspected of breaking into Amazon Web Services (AWS) servers used by Capital One, and [and#8230;] read more

<< Prev Next >>