How Mirai spawned the current IoT malware landscape
When, in late 2016, US-based DNS provider Dyn suffered a massive DDoS attack that it resulted in the temporary unavailability of many popular online services, the name of the Mirai malware became instantly known outside the cybersecurity industry. Since then, we’ve come to know the…
Operation Prowli Profits On Weak IoT Devices, Servers
A malicious campaign has compromised more than 40,000 machines globally, carrying out traffic-hijacking and cryptomining. Researchers at Guardicore Labs, who called the campaign Operation Prowli, said it targets a variety of platforms – including Drupal CMS websites, WordPress sites, backup servers running HP Data Protector,…
Russia asks Apple to remove Telegram Messenger from the App Store
Russia’s communications regulator Roskomnadzor has threatened Apple to face the consequences if the company does not remove secure messaging app Telegram from its App Store. Back in April, the Russian government banned Telegram in the country for the company’s refusal to hand over private encryption…
AT&T and Aira announce global agreement to unlock IoT for good
AT&T and Aira extend their agreement as Aira made AT&T its global data provider as it begins to take the service to Australia, Canada and the U.K. This comes at a meaningful time. Today marks the 7th Global Accessibility Awareness Day (GAAD). The purpose of GAAD is to get everyone…
Watch out. North Korea keeps getting better at hacking
WASHINGTON — In the latest indication that North Korea’s cyber operations are more sophisticated than commonly realized, computer security researchers have identified a group of government hackers and spies in the hermit kingdom who are capable of stealing documents from computers that aren’t connected to…
Sqreen wants to become the IFTTT of web app security
French startup Sqreen recently launched a Security Hub with dozens of plugins to put you in control of the security of your web app. In many ways, it feels like enabling tasks on popular automation service IFTTT. Sqreen participated in TechCrunch’s Startup Battlefield and Y…
Buckhacker : search engine to find servers that can be hacked
BuckHacker: A search tool that allows you to search leaky Amazon Web Services servers The lives of hackers has just been made a lot easier, thanks to a tool created by anonymous hackers that allows security researchers and cybercriminals to search for sensitive information stored…
IoT ramps up cyber security risk, says in-depth report
A new report finds that most organisations lack the right mix of strategy and execution to tackle rising threats to cybersecurity. And the Internet of Things (IoT) is a growing part of the problem. Chris Middleton presents some solutions. What keeps business people awake at…
Singapore Ministry of Defence Concludes Successful Ethical Hacking Program
Singapore Ministry of Defence Concludes Successful Ethical Hacking Program The Singapore Ministry of Defence (MINDEF) today announced the results of the first MINDEF Bug Bounty Challenge, which was facilitated by HackerOne, the leading hacker-powered security platform. The three-week program invited 300 ethical hackers to penetrate…
The Facts & Figures of failing cyber security over the last year
Add to favorites For so long the need to improve cyber security awareness and skills has been drilled into workers heads, so why is it still not happening and instead incident figures are rising? Cyber-attacks took over the news headlines in 2017, but despite the…
Stay connected