Whether the hacker concerned wears a black hat, a white hat or a shade in-between, I wanted to know who the individuals, or groups, were who have made an impact upon security as we know it today. Here 's where the conversation took me.
"Regardless of the truth of his exploits in NASA," Amanda Finch, CEO of the Chartered Institute of Information Security (CIISec), says, "McKinnon gains his spot through becoming a cause celebre of some of the central arguments around hacking: what is the difference between damage and innocent curiosity? How do we decide the jurisdiction of hacking attacks? And what constitutes an appropriate reaction to individuals who are accused or caught?"
In case you are keeping track:
Be on the lookout for hackers and ransomware | wfmynews2.com
It's a type of malware that takes a hold of a device and then requires that user pay a fee to the hackers to get rid of the virus and even then there's no guarantee that they'll fulfill it.
One reason hackers are able to get into the systems so often is that people tend to avoid regularly updating their computers. The longer you put off those crucial updates the easier it is for hackers to get around them.
You might want to consider buying an external hard drive if you don't already have one. You can back up any important files you already have on your computer onto it. So if a hacker does take control of your computer, you won't have to pay them to get your information back.
FBI 'Drive-By' Hacking Warning Just Got Real: Here's How This Malicious New Threat Works
Well now the reality of that risk has been exposed by the researchers at Check Point, who continue their mission to expose vulnerabilities in the everyday technology we surround ourselves with. The firm's head of research, Yaniv Balmas, tells me that his team decided to target IoT, testing for security holes in these connected smart devices.
And find a serious vulnerability is exactly what they did. "Technically," Balmas tells me, "with this exploit I can be 200 or 300 metres away from your home or office. I can take over your device, I can connect to your network." Which makes this the reality of "drive-by" hacking. And the devices exposed have been sold by the tens of millions.
Hackers obtain 2,000 Carson City water customer's personal information | KRNV
Check out this next:
Hackers could shut down satellites – or turn them into weapons
If hackers were to take control of these satellites, the consequences could be dire. On the mundane end of scale, hackers could simply shut satellites down, denying access to their services. Hackers could also jam or spoof the signals from satellites, creating havoc for critical infrastructure. This includes electric grids, water networks and transportation systems.
Some of these new satellites have thrusters that allow them to speed up, slow down and change direction in space. If hackers took control of these steerable satellites, the consequences could be catastrophic. Hackers could alter the satellites' orbits and crash them into other satellites or even the International Space Station.
FBI warns that hackers are targeting software supply chain providers | TechRadar
The FBI has warned US private sector companies about an ongoing hacking campaign targeting supply chain software providers in a recent security alert.
According to the FBI, hackers are currently attempting to infect organizations with a remote access trojan ( RAT ) known as the Kwampirs malware. In a private industry notification sent to businesses last week, the law enforcement agency warned that software supply chain companies are being targeted as a way to reach their partners and customers, saying:
Hackers Actively Targeting U.S. Supply Chain Companies, FBI Warns - Security Boulevard
The Federal Bureau of Investigation has issued a private industry notification warning organizations across the U.S. that hackers are actively targeting their supply chain partners to compromise their systems.
* * *
*** This is a Security Bloggers Network syndicated blog from Business Insights In Virtualization and Cloud Security authored by Filip Truta . Read the original post at: http://feedproxy.google.com/~r/BusinessInsightsInVirtualizationAndCloudSecurity/~3/aZNQXjO2mEA/hackers-actively-targeting-u.s.-supply-chain-companies-fbi-warns
A US House candidate says she was hacked — now she’s warning others – TechCrunch
“I cannot think of a reason not to share this with the public,” Brianna Wu tweeted .
“Two of my non-campaign Google accounts were compromised by someone in Russia,” she said.
Wu isn’t just any other target. As a Democratic candidate for the U.S. House of Representatives in Massachusetts’ 8th District, she has a larger target on her back for hackers than the average constituent. And as a former software engineer, she knows all too well the cybersecurity risks that come along with running for political office.
No comments:
Post a Comment