PRINT
PRINT
SEND MAIL
SEND MAIL

Category: Cyber Threats

Cyber ThreatsTOP 10 STORIES

Hackers Can Turn Body Cameras Into Malware Spewing Machines, Security Expert Says

Once lauded as tools to enhance police accountability, body cameras have been facing increasing scrutiny from privacy advocates, and now one researcher has identified them as cybersecurity time bombs. Speaking to Wired ahead of a Def Con presentation, Josh Mitchell, a consultant at the security firm Nuix, demonstrated that many body cameras are vulnerable to hacking, making several different nightmare scenarios possible: officers themselves could be tracked while wearing the cameras, footage could be doctored or deleted entirely, and the cameras could be hijacked to spread ransomware…

Cyber ThreatsTOP 10 STORIES

PCs still infected with Andromeda botnet malware, despite takedown

Despite being the subject of an international takedown operation last year, traces of the Andromeda botnet can still be found on many PCs. The Andromeda botnet was associated with 80 different malware families and grew so large that it was at one point infecting a million new machines a month, distributing itself via social media, instant messaging, spam emails, exploit kits, and more. View Full Story ORIGINAL SOURCE: ZDNet The post PCs still infected with Andromeda botnet malware, despite takedown appeared first on IT SECURITY…

Cyber ThreatsTOP 10 STORIES

US voting systems: Full of holes, loaded with pop music, and ‘hacked’ by an 11-year-old

Hackers of all ages have been investigating America’s voting machine tech, and the results weren’t great. For instance, one 11-year-old apparently managed to hack and alter a simulated Secretary of State election results webpage in 10 minutes. The Vote Hacking Village, one of the most packed-out locations at this year’s DEF CON hacking conference in Las Vegas, saw many of the most commonly used US voting machines hijacked using a variety of wireless and wired attacks – and replica election websites so poorly constructed…

Cyber ThreatsTOP 10 STORIES

Cisco patches IOS in response to boffins’ IKE-busting breakthrough

Cisco has pushed out an update for its internetwork operating system (IOS) and IOS XE firmware in advance of a Usenix presentation on circumventing cryptographic key protocol. The networking behemoth is advising all customers running hardware that uses IOS and IOS XE to get the updates that address CVE-2018-0131, a security bypass vulnerability stemming from a weakness in the Internet Key Exchange (IKEv1) protocol. View Full Story ORIGINAL SOURCE: The Register The post Cisco patches IOS in response to boffins’ IKE-busting breakthrough appeared first…

Cyber ThreatsTOP 10 STORIES

25 Android smartphone models contain severe vulnerabilities off the shelf

Mobile device malware may still be far behind when it comes to the prevalence of threats crafted for traditional PC systems, but threat actors are seeking ways to compromise these important devices we use on a daily basis. View Full Story ORIGINAL SOURCE: ZDNet The post 25 Android smartphone models contain severe vulnerabilities off the shelf appeared first on IT SECURITY GURU.

Cyber ThreatsTOP 10 STORIES

Iran ‘gearing up to launch cyber strikes’ over US sanctions – and Britain is not safe

Iran is ready to hit back at Donald Trump’s reimposition of US sanctions with cyber strikes, according to security experts who pointed to an increase in chatter related to the threat. The risk of a cyber offensive has been growing ever since the US president withdrew in May from the 2015 deal, under which world powers relaxed economic sanctions in exchange for restrictions on Iran’s nuclear programme. View Full Story ORIGINAL SOURCE: The Telegraph The post Iran ‘gearing up to launch cyber strikes’ over US sanctions – and…

Cyber ThreatsTOP 10 STORIES

UK cyber cops: Infosec pros could help us divert teens from ‘dark side’

UK police are looking to cybersecurity firms to help implement a strategy of steering youngsters away from a life in online crime. The National Crime Agency’s Prevent campaign sits within the wider five-year UK National Cyber Security Strategy of 2016-2021. The NCA’s scheme aims to point teenagers towards careers in cyber security rather than following a path that may lead them towards more serious offending. View Full Story ORIGINAL SOURCE: The Telegraph The post UK cyber cops: Infosec pros could help us divert teens from ‘dark…

Cyber ThreatsTOP 10 STORIES

Over 146 billion records to be stolen over next five years

More than 33 billion records will be stolen by cyber criminals in 2023 alone, despite data protection laws mandating strong measures to protect personal and financial data, a study has found. View Full Story ORIGINAL SOURCE: Computer Weekly The post Over 146 billion records to be stolen over next five years appeared first on IT SECURITY GURU.

Cyber ThreatsTOP 10 STORIES

Malicious faxes leave firms ‘open’ to cyber-attack

Booby-trapped image data sent by fax can let malicious hackers sneak into corporate networks, security researchers have found. Since many companies use fax machines that are also printers and photocopiers, they often have a connection to the internal network. The malicious images exploit protocols established in the 1980s that define the format of fax messages. The research was presented at the Def Con hacker conference in Las Vegas. View Full Story ORIGINAL SOURCE: BBC The post Malicious faxes leave firms ‘open’ to cyber-attack appeared…