News


  • A Faraday cage or air gap can’t protect your device data from these two cyberattacks

    February 8, 2018

    Two common methods of physical cybersecurity, air gapping and Faraday cages, have been found breachable in two papers released by researchers from Ben-Gurion University. Faraday cages are grounded cages made of electrically conductive material that can completely block electromagnetic fields and signals. Air-gapped computers are those completely isolated from outside networks and signals. Air-gap setups commonly include Faraday ...

  • Cyber Espionage Group Targets Asian Countries With Bitcoin Mining Malware

    February 7, 2018

    Security researchers have discovered a custom-built piece of malware that’s wreaking havoc in Asia for past several months and is capable of performing nasty tasks, like password stealing, bitcoin mining, and providing hackers complete remote access to compromised systems. Dubbed Operation PZChao, the attack campaign discovered by the security researchers at Bitdefender have been targeting organizations in the government, ...

  • Tillerson proposes Cyberspace and Digital Economy Bureau to address security, policy creation

    February 7, 2018

    US Secretary of State Rex Tillerson wants to develop a Bureau of Cyberspace and the Digital Economy, according to a letter from him to Edward Royce, the chair of the committee of foreign affairs. The bureau, as described in the letter, would help the US lead international efforts in all aspects of cyberspace. As the world, its economy, ...

  • X.509 metadata can carry information through the firewall

    February 6, 2018

    A security researcher, who last year demonstrated that X.509 certificate exchanges could carry malicious traffic, has now published his proof-of-concept code. Fidelis Cybersecurity’s Jason Reaves has disclosed a covert channel that uses fields in X.509 extensions to sneak data out of corporate networks. The X.509 standard defines the characteristics of public key certificates, and anchors much of ...

  • ISNR Abu Dhabi 2018 to Examine Role of Artificial Intelligence in Homeland Security in Line with UAE Leadership’s Vision

    February 5, 2018

    Artificial intelligence to form essential component of Infosecurity Middle East, ME3S, collocated forums AI has potential to transform national security technology, says US study Reed Exhibitions, the leading global event organiser, confirmed that in line with the UAE leadership’s vision, artificial intelligence (AI) will form an important underlying component of the eighth edition of the International Exhibition ...

  • DDoS mystery: Who’s behind this massive wave of attacks targeting Dutch banks?

    February 1, 2018

    There is as yet no indication of who is behind the massive distributed denial of service (DDoS) attacks on Netherlands banks and government websites that ran from last weekend to Tuesday. Initial reports suggesting a Russian connection appear baseless. The attacks began just a couple of days after media reports stated that Dutch intelligence tipped off their ...

  • Creating a culture of cyber security safety is critical for CEOs

    February 1, 2018

    When working with CEOs, I like to use a safety program within an organisation, running parallel with the cyber security program. In a number of industries, having a safety program is required but it’s a good idea for all companies to have one. A former colleague once managed such a program for a small trucking firm. ...

  • Meltdown-Spectre: Malware is already being tested by attackers

    February 1, 2018

    German antivirus testing firm AV-Test has identified 139 samples of malware that seem to be early attempts at exploiting the Meltdown and Spectre CPU bugs. “So far, the AV-Test Institute discovered 139 samples that appear to be related to recently reported CPU vulnerabilities. CVE-2017-5715, CVE-2017-5753, CVE-2017-5754,” the company wrote on Twitter. The company has posted SHA-256 hashes of several ...

  • Cryptocurrency Mining Malware Infected Over Half-Million PCs Using NSA Exploit

    January 31, 2018

    2017 was the year of high profile data breaches and ransomware attacks, but from the beginning of this year, we are noticing a faster-paced shift in the cyber threat landscape, as cryptocurrency-related malware is becoming a popular and profitable choice of cyber criminals. Several cybersecurity firms are reporting of new cryptocurrency mining viruses that are being ...

  • Alphabet unveils cybersecurity company, Chronicle

    January 31, 2018

    Chronicle aims to leverage machine learning to advance threat detection, the cybersecurity company touted. It will help companies use their information to improve security by allowing them to run analysis faster and giving them the ability to store large amounts of data to help them recognize patterns. “We want to 10x the speed and impact of security teams’ ...

  • Utilities ill-equipped to face increasingly disparate cybersecurity threat

    January 31, 2018

    All utilities organizations surveyed in the latest EY Power and Utilities Global Information Security Survey 2017-18 (GISS): Why wait for a cyber catastrophe to prepare for a cyber attack?, say that their cybersecurity function does not meet their needs. The survey also finds that 58% of sector respondents anticipate difficulties in monitoring the perimeter of their ...

  • Israel accounts for 16 percent of global cybersecurity investment, second only to U.S.

    January 31, 2018

    Israel’s cybersecurity industry raised $814.5 million in venture capital and private equity investment in 2017, a 28 percent rise over 2016 that brings the country to second only to the United States, according to research by Start-Up Nation Central. Israeli cybersecurity companies, centered in Tel Aviv, account for 16 percent of industry investment overall as of 2017. In 2014, ...

  • UK keeps up its legal losing streak over mass surveillance

    January 30, 2018

    Yet another defeat in the courts for the UK government’s use of mass surveillance as an indiscriminate and, as it frequently turns out, unlawful investigatory tool. Today the UK’s Court of Appeal handed down its ruling in a long running challenge to the 2014 Data Retention and Investigatory Powers Act (DRIPA) — judging that the regime’s bulk collection ...

  • Cisco Patches Critical VPN Vulnerability

    January 30, 2018

    Cisco Systems released a patch Monday to fix a critical security vulnerability in its Secure Sockets Layer VPN solution called Adaptive Security Appliance. The vulnerability, according to a Cisco Security Advisory, could allow an unauthenticated and remote attacker to execute remote code on affected devices. The vulnerability impacts nearly a dozen Cisco products ranging from 3000 Series ...

  • Digital Extortion: A Forward-looking View

    January 30, 2018

    In 2017, we saw digital extortion increasingly become cybercriminals’ first and foremost money-making modus operandi. It’s mostly due to ransomware — cybercriminals’ currently most popular weapon of choice, helping them in extorting cash from users all over the world and in hitting big businesses and organizations. By infecting business-critical systems through their shotgun-style ransomware attacks and ...

  • DoD Studying Implications of Wearable Devices Giving Too Much Info

    January 30, 2018

    Defense Department officials are studying security issues raised by physical conditioning trackers that also can be used to track service members’ whereabouts, a Pentagon spokesman told reporters today. The concern comes from a “heat map” posted by Strava — the makers of a fitness tracking application that shows the routes service members run or cycle in ...

  • Ploutus.D Malware Variant Used in U.S.-based ATM Jackpotting Attacks

    January 29, 2018

    The United States Secret Service issued a warning on Friday to financial institutions citing “credible information” about “planned” attacks against U.S. cash machines using malware that can quickly drain ATM machines dry of cash. The warning came a day after ATM maker Diebold Nixdorf also warned its customers of “potential”  ATM Jackpotting attacks moving from Mexico to the U.S. But journalist Brian ...

  • Security & Counter Terror Expo 2018: bringing together the international community to enhance global security

    January 29, 2018

    The threat of terrorism continues to have far reaching effects on every day life with a total of 25 terrorist attacks taking place across Europe in 2017. As risk from lone-wolf attacks and sophisticated ransomware increases, security professionals are faced with a growing challenge to evolve and stay one step ahead by investing in new ...

  • Undetectable CrossRAT malware targets Windows, MacOS, and Linux systems

    January 28, 2018

    Are you using Linux or Mac OS? If you think your system is not prone to viruses, then you should read this. Wide-range of cybercriminals are now using a new piece of ‘undetectable’ spying malware that targets Windows, macOS, Solaris and Linux systems. Just last week we published a detailed article on the report from EFF/Lookout that revealed a ...

  • Ransomware: Is time running out for the biggest menace on the web?

    January 26, 2018

    Ransomware attacks like WannaCry and Petya caused major chaos last year, while the likes of Locky and Cerber were less high-profile, but still managed to generate large amounts of income for their criminal creators. 2017 was the year of ransomware, but it could be that the file-encrypting malware has already reached its peak, as an analysis of cybercriminal campaigns appears to show that malicious ...