No One Can Afford an Attack - Find the best Cybersecurity Pros to Protect Your Business Data
Welcome Guest | Sign In
ECommerceTimes.com
Four Keys to Generating 7 Figure Sales on WooCommerce
Can Hackers Crack the Ivory Towers?
June 19, 2018
Academics have been hard at work studying information security. Most fields aren't as replete with hackers as information security, though, and their contributions are felt much more strongly in the private sector than in academia. The differing motives and professional cultures of the two groups act as barriers to direct collaboration, noted CypherCon presenter Anita Nikolich.
Breach Litigation: A Growing Risk for E-Commerce Businesses
June 15, 2018
The expanding world of Internet commerce likely will generate a corresponding expansion of data breaches, resulting in more e-commerce businesses becoming the targets of consumer class action lawsuits. Breach litigation has become more prevalent as a result of a perceptible legal trend favoring consumers. Courts have tended to allow lawsuits based on a lower threshold for establishing injury.
The Cloud's Hazy Security
May 31, 2018
A significant percentage of IT systems are cloud-based, according to a recent survey. The cloud is a key enabler for emerging technology, suggests the CompTIA poll, which was conducted last month. Cloud computing was one of four trends respondents expected to feature heavily in IT conversations over the next 12 to 18 months, the survey found. Others were AI, the IoT and cybersecurity.
FBI Declaws Russian Fancy Bear Botnet
May 25, 2018
The FBI has disrupted a network of half a million routers compromised by the group of Russian hackers believed to have penetrated the DNC and the Hillary Clinton campaign during the 2016 elections, according to reports. The hacker group, known as "Fancy Bear," has been using a malware program called "VPN Filter" to compromise home and small office routers.
Researchers Create Hack to Unlock Millions of Hotel Room Doors
April 26, 2018
A flaw in certain electronic hotel door locks could allow hackers to access guest rooms and other secure locations at millions of properties around the world, F-Secure researchers have discovered. Software updates were issued to fix the flaw in the smart locks after F-Secure notified and worked with the manufacturer over the past year. The researchers had found a way to make a master key.
'Holy Grail' Exploit Puts Nintendo Switch Consoles at Risk
April 25, 2018
Devices built on Nvidia's Tegra X-1 mobile processor are at risk of attack from a flaw security researchers have revealed. The exploit chain discovered by Katherine Temkin and others affects any device running the chip, including the Nintendo Switch gaming console. Called "Fusée Gelée," the vulnerability allows anyone to run code on the chip by overloading a critical buffer when a system boots.
No Cure for Cyber Insecurity?
April 6, 2018
An alarming number of major U.S. retailers, industrial firms, government agencies and other organizations have been hit in a recent wave of cyberbreaches that may signal increasing vulnerability for consumers and businesses alike. The attacks have exposed millions of consumer payment cards to fraud. Cyberthieves have used a variety of methods to infiltrate corporate computer systems.
Researcher Cracks 'Hacker-Proof' Crypto Wallet
March 22, 2018
A virtual currency hardware wallet with millions of users has been compromised. Saleem Rashid explained how he cracked the firmware on the wallet produced by Ledger using what's known as a "supply chain" attack. That means a targeted device is compromised before any users get their hands on it. The attack on Ledger's $100 Nano S wallet creates a backdoor on the device.
Leak of Stale iOS Source Code Could Trigger Fresh Problems
February 9, 2018
Apple lawyers have sent a copyright violation notice to Github, following the publication of leaked iOS 9 source code on the site. Though iOS 9 is dated, it's possible that the leaked code could be used to jailbreak older devices or worse. Publication of the code violated Apple's rights under the DMCA, the attorneys wrote, demanding that the iBoot source code be removed.
US Fingers North Korea for WannaCry Epidemic
December 20, 2017
The United States on Tuesday accused North Korea of responsibility for a global ransomware attack that locked down more than 300,000 computers in 150 countries earlier this year. The U.S. now has enough evidence to support its assertion that Pyongyang was behind the WannaCry attack in May, Homeland Security Advisor Tom Bossert told reporters at a White House press briefing.
The Return of Industrial Espionage and the Building New Wave of Scandals
December 4, 2017
As powerful men drop like flies due to their inability to resist abusing their authority, it's clear that the problem is widespread. Similarly, it's likely that we'll find the problem of alleged industrial espionage is not limited to Uber. You see, when people misuse authority -- and the sexual harassment problem is a massive misuse of authority -- folks typically don't just misuse it in one area.
WPA2 Flaw Could Blow WiFi Systems Wide Open
October 17, 2017
A security flaw in WPA2, the security protocol for most modern WiFi systems, could allow an attacker to steal sensitive data including emails, credit card numbers and passwords, Researchers at Belgian university KU Leuven reported Monday. Depending on the network configuration, the flaw also could allow an attacker to inject or manipulate information in the system.
Small Companies Often in the Dark About Cyberattacks
October 10, 2017
Nearly 60 percent of small businesses have been the victims of a cyberattack over the past year, but the vast majority didn't realize that they had been attacked, according to Nationwide's third annual survey of 1,069 businesses with fewer than 299 employees. Initially, only 13 percent of the participating companies said they had been victims of a cyberattack.
Report: Russian Hackers Penetrated Elite NSA Hacking Division
October 7, 2017
Russian hackers reportedly exploited a vulnerability in Kaspersky Lab's software to steal sensitive cyberdefense data from a National Security Agency contractor. The incident, which occurred in 2015, involved a contractor who loaded classified information onto his personal computer in order to work at home. The information included hacking tools and other sensitive NSA data.
RoboCyberWall Aims to Block Linux Server Hacks
October 4, 2017
RoboCyberWall has launched its proprietary precision firewall solution bearing the same name. RoboCyberWall is designed to protect HTTP and HTTPS ports on Linux-based Apache2 and NGINX Web servers. The patent-pending firewall blocks all known exploits and zero-day attacks on Apache2 and NGINX Web servers, according to the developer. The Linux server firewall solution targets small and mid-sized business users.
Malware Embedded in CCleaner Tool Puts Millions at Risk
September 19, 2017
Malicious code has been discovered in two versions of Piniform's CCleaner housekeeping utility, the company disclosed on Monday. Piniform is owned by Avast, whose security products are used by more than 400 million people. The malware infecting CCleaner could give hackers control over the devices of more than 2 million users. CCleaner is designed to rid computers and mobile phones of junk.
Credit Agency Equifax Cracked, 143 Million Consumers Exposed
September 8, 2017
Consumer credit reporting agency Equifax suffered a major criminal data breach that exposed personal information of as many as 143 million consumers in the U.S. between mid-May and July of this year. The attack exposed a range of sensitive personal data, including names, addresses, Social Security Numbers, dates of birth, and in some cases driver's license numbers, Equifax said.
Global Cyberattack on Energy Sector Stokes Deep Fears
September 7, 2017
The hacker group known as "Dragonfly" is behind sophisticated wave of recent cyberattacks on the energy sectors of Europe and North America, Symantec reported. The attacks could provide the group with the means to severely disrupt energy operations on both continents. Dragonfly launched a simililar campaign from 2011 to 2014, but it entered a quiet period in 2014 after its activities were exposed.
Cyberthieves Train Their Sights on US Mobile Phone Customers
August 29, 2017
A relatively new form of cybercrime recently has been plaguing American consumers. Thieves have been hijacking mobile phone account numbers and then transferring services to a different device. Further, hackers have begun using mobile numbers to raid digital wallets and similar accounts. This type of theft has been successful even against the most sophisticated of consumers.
Consumers Gain More Power to Seek Data Breach Damages
August 21, 2017
There are no good outcomes of an electronic data system breach. At best, companies dealing with e-commerce technologies face the formidable task and the resulting cost of repairs. In addition having to fix information technology systems, companies suffering breaches may be increasingly vulnerable to legal action taken by customers whose personal data was affected.
Is the Path to Secure Elections Paved With Open Source Code?
August 8, 2017
Increased use of open source software could fortify U.S. election system security, according to former CIA head R. James Woolsey and Bash creator Brian J. Fox. The two made their case for open source elections software after security researchers demonstrated how easy it was to crack some election machines at the recent DefCon hacking conference in Las Vegas.
HBO Cyberattack Driven By Mysterious Motives
August 3, 2017
HBO on Wednesday admitted that it had been targeted by a cyberattack, confirming an anonymous email the alleged hackers distributed to media outlets last weekend. Among the content that may have been compromised were upcoming episodes of the series Ballers, Barry and Room 104, along with script outlines of the channel's hit show Games of Thrones.
Russian Head of $4B Bitcoin Exchange Charged in Massive Money Laundering Scheme
July 28, 2017
A grand jury in the Northern District of California indicted a Russian man for running a massive money laundering operation through the BTC-e bitcoin exchange, a group of federal officials announced Wednesday. The exchange allegedly received up to $4 billion in proceeds from various criminal activities, including the 2014 hack of the Mt. Gox bitcoin exchange.
Petya's Ransomware Cloaking Device
July 11, 2017
Recent ransomware threats have escalated into a global crisis, and cybersecurity experts and government authorities have redoubled their investigative efforts. Of grave concern is the possibility that the recent Petya attack had more sinister motives than typical ransomware operations, and that state actors were involved behind the scenes. The Petya attack actually used ransomware as a cover.
IoT Fuels Growth of Linux Malware
July 5, 2017
Malware targeting Linux systems is growing, largely due to a proliferation of devices created to connect to the Internet of Things. That is one of the findings in a report WatchGuard Technologies released last week. The report, which analyzes data gathered from more than 26,000 appliances worldwide, found three Linux malware programs in the top 10 for the first quarter of the year.
The Stupidly Dangerous Politics of Blame
July 3, 2017
I hope that, like me, you are off this long holiday weekend and have a chance to think about the drama that now surrounds the U.S. administration. What I find fascinating isn't that the government is a bit of a mess but that the accidental transparency of this administration is focusing us more on the visibility of the problems rather than on the problems themselves.
Petya Ransomware Sinks Global Businesses Into Chaos
June 28, 2017
A new ransomware exploit dubbed "Petya" struck major companies and infrastructure sites this week, following last month's WannaCry ransomware attack, which struck more than 300,000 computers worldwide. Petya is believed to be linked to the same set of hacking tools as WannaCry. Petya already has impacted a Ukrainian international airport and shut down radiation monitoring systems at Chernobyl.
Cyberattackers Kick Down a Few Parliament Email Doors
June 27, 2017
The United Kingdom's Parliament on Monday reported a cyberattack on its email system over the weekend, when hackers attempted to access user accounts without authorization. Due to the "robust measures" in place to protect the legislative body's accounts and networks, fewer than 1 percent of the 9,000 accounts on the network were compromised, officials said. Accounts that were compromised reportedly had weak passwords.
DHS to Congress: The Russians Are Coming Back
June 22, 2017
The House Intelligence Committee on Wednesday conducted a hearing focusing on the impact of Russian hacking on the 2016 elections. Members heard testimony from former DHS Secretary Jeh Johnson, who was in charge of the department when the actual hacking took place during the final months of the Obama administration. Russian President Vladimir Putin ordered the cyberattack, Johnson said.
Broader Scope of Russian Election Cyberattacks Revealed
June 15, 2017
Federal and state officials have confirmed that cyberattacks against state voting systems during the 2016 election were more widespread than previously disclosed to the public, but they said the heightened activity did not impact final vote tallies. The confirmations follow a report that attempts to influence the 2016 presidential election were much greater than previously disclosed.
See More Articles in Hacking Section >>
Facebook Twitter LinkedIn Google+ RSS
Rakuten Super Logistics
Which company is most likely to hit the $1 trillion valuation milestone first?
Alphabet/Google
Amazon
Apple
Microsoft
A different company
Four Keys to Generating 7 Figure Sales on WooCommerce
Rakuten Super Logistics