News January 2017 – Page 2 – Cyber Security Review
Menu

Cyber Security Review

News • Insights • Analysis

Twitter

Primary Menu

Skip to content
  • About the Review
    • Advanced Persistent Threat
    • Critical Infrastructure Protection
      • Aviation
      • Banking and Finance
      • Defence and Aerospace
      • Education and Academia
      • Energy
      • Government
      • Healthcare
      • Industrial Security
      • Telecommunications
      • Transportation
      • Utilities
    • Cybercrime
      • DDoS
    • Malware
    • Network Security
  • News
    • News – June 2022
    • News – May 2022
    • News – April 2022
    • News – March 2022
    • News – February 2022
    • News – January 2022
    • News Archive
  • Articles
  • Events – Media Partners
  • Editorial
    • Editorial contributors
  • Subscribe
    • Cyber Security Review eNewsletter Subscription Form
    • Cyber Security Review – past PDF or Print editions
  • Resources
    • Print editions archive
    • Useful Links
  • Contact Us
Search

Category: News January 2017

Last Year’s Data Breaches Exposed 4.2 Billion Records, Most from America

Posted onJanuary 26, 2017March 17, 2017

The United States was the main target of hacker attacks last year, resulting in a record number of data breaches. According to a report from Risk Based Security, during 2016 there were 4,149 data breaches which resulted in the exposure Read More …

CategoriesNews January 2017, Front pageTagsData Breach

Four-star Alpine hotel fell victim to blackmailers who hacked into their electronic keycard system

Posted onJanuary 26, 2017March 17, 2017

One of Europe’s most luxurious hotels has admitted paying 1,500 euros (£1,279) to cyber blackmailers who hacked into their electronic key system and locked scores of guests in their rooms. The hackers promised to restore the system at the Seehotel Read More …

CategoriesNews January 2017, Front pageTagsBlackmail, Hacking

Trump order strips privacy rights from non-U.S. citizens, could nix EU-US data flows

Posted onJanuary 26, 2017March 17, 2017

An Executive Order signed by U.S. President Donald Trump in his first few days in office could jeopardize a six-month-old data transfer framework that enables EU citizens’ personal data to flow to the U.S. for processing — with the promise Read More …

CategoriesNews January 2017, Front pageTagsPrivacy

Apple iPhone 7 is being hardened to handle military-grade secrets

Posted onJanuary 25, 2017March 17, 2017

The iPhone 7 is being turned into a phone capable of safeguarding military-level secrets for the UK armed forces. Telecoms giant BT is hardening the security of the device to allow UK military personnel to use it to discuss ‘secret’ Read More …

CategoriesNews January 2017TagsTelecommunications

New Trojan Turns Thousands Of Linux Devices Into Proxy Servers

Posted onJanuary 25, 2017March 17, 2017

A new Trojan has been discovered in the wild that turns Linux-based devices into proxy servers, which attackers use to protect their identity while launching cyber attacks from the hijacked systems. Dubbed Linux.Proxy.10, the Trojan was first spotted at the Read More …

CategoriesNews January 2017TagsMalware

AlphaBay Dark Web Marketplace Hacked; Exposes Over 200,000 Private Messages

Posted onJanuary 24, 2017March 17, 2017

AlphaBay, possibly the largest active dark web marketplace at the moment, has paid a hacker after he successfully exploited vulnerabilities in the internal mailing system of the website and hijacked over 200,000 private unencrypted messages from several users. The hacker, Read More …

CategoriesNews January 2017TagsHacking, Retail

Yahoo Under SEC Investigation for Taking too Long to Reveal Data Breaches

Posted onJanuary 23, 2017March 17, 2017

Yahoo is in big trouble with US authorities due to how it handled the massive data breaches it disclosed last year, more specifically its failure to inform investors of the issues at an earlier time. The United States Securities and Read More …

CategoriesNews January 2017TagsCyber Attack, Data Breach

IBM acquiring Agile 3 Solutions to give execs visiblity into security risks

Posted onJanuary 23, 2017March 17, 2017

IBM Security announced this morning that it has purchased Agile 3 Solutions, a San Francisco-based company that has developed a security analytics dashboard aimed at helping executives understand cyber-security risks inside an organization. The acquisition gives IBM another tool in Read More …

CategoriesNews January 2017TagsCyber Risk, Mergers & Acquisitions

GCHQ chief Robert Hannigan quits

Posted onJanuary 23, 2017March 17, 2017

The director of GCHQ, Robert Hannigan, has decided to step down early for what he described as personal reasons, the intelligence agency has announced. Hannigan took over at GCHQ in November 2014 to oversee a more open approach after the Read More …

CategoriesNews January 2017TagsGovernment

Greenbug cyberespionage group targeting Middle East, possible links to Shamoon

Posted onJanuary 23, 2017March 17, 2017

Symantec is currently investigating reports of yet another new attack in the Middle East involving the destructive disk-wiping malware used by the Shamoon group (W32.Disttrack, W32.Disttrack.B). Similar to previous attacks, the Disttrack malware used by Shamoon is just the destructive Read More …

CategoriesNews January 2017TagsCyber Espionage

Post navigation

← Older posts
Newer posts →

FEATURED CONTENT


9 CRUCIAL CYBERSECURITY TIPS FOR YOUR VIRTUAL EVENT


CYBERSECURITY TRENDS IN 2022
By Eyal Dorfman


INCIDENT RESPONSE SERVICES: WHO’S IT FOR?
By Iron Range Cyber


HOW HOSPITALS CAN PREVENT A CYBERSECURITY CRISIS IN HEALTHCARE
With ransomware attacks in the healthcare sector on the rise, Bernard Montel, EMEA Technical Director and Security Strategist at Tenable, shares his thoughts on how healthcare organisations can avoid becoming a victim of cyber criminals.

THE UK NATIONAL CYBER STRATEGY 2022: DOES IT GO FAR ENOUGH & WHAT’S TO COME?
By James Rees, Managing Director, Razorthorn Security

FUELLING THE TALENT PIPELINE IN LONDON REQUIRES SERIOUS INVESTMENT IN CYBER SKILLS
By Dr Vahid Heydari Fami Tafreshi, senior lecturer in Cybersecurity and Networks, Computing Courses Provision Manager at Staffordshire University London


WHAT ARE THE LATEST CYBERSECURITY STANDARDS?
By Ruben Bonan Founder of Marketing Marvel


A BRIEF OVERVIEW OF SYSTEMS RELIABILITY
By Haya Altaleb and Rajnai Zoltán, Óbuda University, Doctoral School on Safety and Security Sciences

SUPPORTING CORPORATE GOVERNANCE ON A BLOCKCHAIN BASIS
By Dr. Katalin Szenes CISA, CISM, CGEIT, CISSP and Bence Tureczki PhD student, AI – Blockchain – Security Knowledge Center of Óbuda University


DDOS PANDEMIC: HOW THE CORONA CRISIS SPURRED SOME OF THE BIGGEST DDOS ATTACKS
AND WHY YOU SHOULD CARE
By Ramil Khantimirov, CEO and co-founder of StormWall


HOW RANSOMWARE AUTHORS HIT HEALTHCARE SECTOR
By David Balaban, computer security researcher


THE HUMAN FIREWALL – THE HUMAN SIDE OF CYBER SECURITY
By Annamária Beláz and Zsolt Szabó, Doctoral School on Safety and Security Sciences, Óbuda University, Budapest, Hungary


APPLICATIONS OF LORAWAN TECHNOLOGY
By Döníz Borsos PhD student, Óbuda University, Doctoral School on Safety and Security Sciences, Hungary


WARFLYING – 2.4 GHZ AND 5 GHZ WIRELESS NETWORK DETECTION BY DRONE IN CRITICAL INFRASTRUCTURE
By Barnabás Sándor, Óbuda University, Doctoral School for Safety and Security Sciences, Budapest, Hungary
 

SUBSCRIBE
to

Cyber Security Review
insights, threat intelligence
and news round-up

Copyright © 2022 Cyber Security Review. All Rights Reserved. Privacy Policy
Catch Base by Catch Themes
Scroll Up
  • About the Review
    • Advanced Persistent Threat
    • Critical Infrastructure Protection
      • Aviation
      • Banking and Finance
      • Defence and Aerospace
      • Education and Academia
      • Energy
      • Government
      • Healthcare
      • Industrial Security
      • Telecommunications
      • Transportation
      • Utilities
    • Cybercrime
      • DDoS
    • Malware
    • Network Security
  • News
    • News – June 2022
    • News – May 2022
    • News – April 2022
    • News – March 2022
    • News – February 2022
    • News – January 2022
    • News Archive
  • Articles
  • Events – Media Partners
  • Editorial
    • Editorial contributors
  • Subscribe
    • Cyber Security Review eNewsletter Subscription Form
    • Cyber Security Review – past PDF or Print editions
  • Resources
    • Print editions archive
    • Useful Links
  • Contact Us