Sunday, March 1, 2020

How North Korean Hackers Rob Banks Around the World | WIRED

The bills are called supernotes. Their composition is three-quarters cotton and one-quarter linen paper, a challenging combination to produce. Tucked within each note are the requisite red and blue security fibers. The security stripe is exactly where it should be and, upon close inspection, so is the watermark. Ben Franklin's apprehensive look is perfect, and betrays no indication that the currency, supposedly worth $100, is fake.

* * *

These North Korean hackers have carried out a systematic effort to target financial institutions all over the world. Their methods are bold, though not always successful. In their most profitable operations, they have manipulated how major financial institutions connect to the international banking system. By duping components of this system into thinking their hackers are legitimate users, they have enabled the transfer of tens of millions of dollars into accounts they control.

Publisher: Wired
Author: Ben Buchanan
Twitter: @wired
Reference: (Read more) Visit Source



Were you following this:

Coronavirus: Hackers are exploiting the COVID-19 outbreak to steal your information - TechRepublic

Karen Roby: Is it possible the coronavirus could increase our risk for a cyberattack? As we know, sometimes when we're most vulnerable, bad things can happen, and we don't even realize they're happening. Rasmus Holst is the chief revenue officer for Wire. Rasmus, thanks for being with us here today to talk about this.

* * *

It's our job just to pass along information to people, give people things to think about, especially at a time like right now. We're hearing so much information, different things coming in from different outlets about the coronavirus and what we need to keep in mind. So connect the dots for us here between coronavirus and cybersecurity.

Publisher: TechRepublic
Twitter: @TechRepublic
Reference: (Read more) Visit Source



Cyber security experts: Hackers target children’s SS numbers | TribLIVE.com

For computer hackers looking to steal someone’s identity, there’s nothing better than taking the social security number of a child, say cyber security experts at two area universities.

Excela, which has an information systems security professional on its cyber team, said its intrusion software caught the hackers and its detection software reported the largest number originated in Vietnam.

“This (stealing children’s IDs) has been around for quite a while, but there has been a slight resurgence recently,” said Brad Messner, a computer science, cyber security and data analytics instructor at Seton Hill University in Greensburg.

Publisher: TribLIVE.com
Date: 2020-02-27T16:13:51-05:00
Author: Joe Napsha
Twitter: @triblive
Reference: (Read more) Visit Source



Clearview AI's Massive Client List Got Hacked | WIRED

It was the RSA security conference in San Francisco this week, and the security industry descended on Moscone Center for days of handing out free stickers, demoing products, and presenting research. And the week was punctuated by fewer handshakes and more elbow bumps thanks to Covid-19. WIRED looked at research that North Korea is recycling Mac malware , and how it's indicative of booming malware reuse.

Longtime vulnerability disclosure advocates Katie Moussouris and Chris Wysopal looked back on progress —as well as frustrating limitations—of disclosure today. And one hacker shared a story of sending his mother to break into a South Dakota prison . For research!

Publisher: Wired
Author: WIRED Staff
Twitter: @wired
Reference: (Read more) Visit Source



Not to change the topic here:

RSA 2020: Cyber Pros Talk How to Track and Fight Hackers

SAN FRANCISCO — As hackers have become a more ubiquitous threat to state and local governments, cities and states will occasionally hire cybersecurity researchers like the kind who spoke at RSA 2020's Emerging Threats seminar this week.  

Trained to track, identify and combat bad cyber actors, researchers like Timothy Gallo, a solutions architect for FireEye, use a combination of intelligence gathering and threat analysis to understand the types of individuals and groups that attack and harass companies and governments. 

Date: 2020-02-28
Author:
Twitter: @govtechnews
Reference: (Read more) Visit Source



Hackers and Spies Could Sabotage Coronavirus Pandemic Response

Last week, U.S. officials accused Russia of spreading disinformation about the coronavirus in yet another coordinated campaign. Beginning around the middle of January, thousands of Twitter, Facebook, and Instagram accounts—many of which had previously been tied to Russia—had been seen posting nearly identical messages in English, German, French, and other languages blaming the United States for the outbreak. Some of the messages claimed that the virus is part of a U.S.

As much as this disinformation can sow discord and undermine public trust, the far greater vulnerability lies in the United States' poorly protected emergency-reponse infrastructure, including the health surveillance systems used to monitor and track the epidemic. By hacking these systems and corrupting medical data, states with formidable cybercapabilities can change and manipulate data right at the source.

logo
Publisher: Foreign Policy
Author: Bruce Schneier Margaret Bourdeaux
Twitter: @ForeignPolicy
Reference: (Read more) Visit Source



Hackers Are Everywhere. Here's How Scholars Can Find Them. - Lawfare

There are a variety of ways to approach these questions. Some scholars have constructed intricate formal models that use game theory to predict how states will behave in cyberspace. Others have used surveys and war games, asking participants to imagine what they would do in various situations of crisis. Still others have expanded the aperture of study, creating vast catalogs of cyber incidents, even comparatively minor ones, and subjecting them to quantitative analysis.

But I want to advocate for a different technique, one that does not replace the others but supplements them: Deeply study the hacks that have taken place. This case study method is out of vogue in political science, which has preferred large- n samples and regression models.

Publisher: Lawfare
Date: 2020-02-26T11:04:18-05:00
Twitter: @lawfareblog
Reference: (Read more) Visit Source



Seven hackers have now made a million dollars each from bug bounties, says HackerOne | ZDNet

Hacking is growing, but in some cases, that's no bad thing. That's the main take-away from the annual report on the state of ethical hacking published by bug bounty platform HackerOne. As of 2020, the organization can boast a base of 600,000 white hat hackers; a community twice as big as the previous year, which altogether cashed in a record $40 million in bounties in the past 12 months.

High-profile organizations – which according to the report include General Motors, Google, Goldman Sachs, Toyota and IBM – are understandably interested in making sure that HackerOne's security researchers dig out the vulnerabilities in their products and services before malicious hackers do.

logo
Publisher: ZDNet
Author: Daphne Leprince Ringuet
Twitter: @ZDNet
Reference: (Read more) Visit Source



Happening on Twitter

No comments:

Post a Comment