Cyber Security

 

Report: Google Play Infested with Cash-Stealing Web Apps (The Register)

Security researcher Joshua Shilko says phishing apps targeting some of the world's biggest payment services have slipped past screening and landed on Google Play. Shilko says he... More

Check Your Spotify Account: Users Report Unusual Activity After Credentials Posted Online (Financial Post)

If you use the popular music streaming service Spotify, there is a chance you may be vulnerable after a report has surfaced that the emails, usernames, passwords and other details ... More

Office 365 Vulnerability Exposed any Federated Account (ThreatPost)

A severe vulnerability in the way Microsoft Office 365 handles federated identities via SAML put an attacker in position to have access to any account and data, including email mes... More

Verizon: Cyber Criminals Exploit Human Nature

You know how long it took cyber attackers to compromise any given system in 2016? In 93% of cases reviewed in a new report from Verizon Enterprise Solutions (VES), it took just min... More

Law Enforcement, Government Agencies See Phishing as Main Cyber Risk (Softpedia)

The Global Cyber Alliance (GCA) was founded at the start of January this year, and on March 19 held its first Strategic Advisory Committee (SAC) meeting. Here, founding members ... More

Zero-Day Exploits More Than Double as Attackers Prevail in Security Arms Race (ARS Technica)

The number of attacks that exploited previously unknown software vulnerabilities more than doubled in 2015 as hackers raced against security defenders to find effective ways to inf... More

Ransomware Alert: Prevent and Mitigate Ransomware Attacks (U.S.-CERT)

In early 2016, destructive ransomware variants such as Locky and Samas were observed infecting computers belonging to individuals and businesses, which included healthcare faciliti... More

Apple, FBI set to Resume Encryption Fight at House Hearing (CNET)

The encryption battle between Apple and the FBI is moving from the courtroom to Congress next week. Representatives from the tech titan and the federal law enforcement agency ar... More

Who Gets to Define the Terms of Hacking? (The Atlantic)

On March 11, 2013, Thomas Donilon, President Obama’s national-security adviser, gave a speech at the Asia Society on Manhattan’s Upper East Side. Much of it was boilerplate: a ... More

F.B.I. Used Hacking Software Decade Before iPhone Fight (New York Times)

In early 2003, F.B.I. agents hit a roadblock in a secret investigation, called Operation Trail Mix. For months, agents had been intercepting phone calls and emails belonging to mem... More

Meet the $100 Million Cyber Security Startups (CSO Online)

A dozen cybersecurity startups have each raised $100 million or more in funding since 2014, according to Dow Jones VentureSource -- a database that reports on companies globally wh... More

Obama Names Cyber Experts To New Anti-Hacking Panel (Fortune)

The chief executive of MasterCard, the former head of the National Security Agency and officials from Microsoft and Uber will join a commission to strengthen U.S. cyber defenses, t... More

Crooks Steal, Sell Verizon Enterprise Customer Data (Krebs on Security)

Verizon Enterprise Solutions, a B2B unit of the telecommunications giant that gets called in to help Fortune 500’s respond to some of the world’s largest data breaches, is ree... More

Eight tips for preventing ransomware (Naked Security)

Chances are you know someone, or some organization, who has suffered a ransomware attack – it could be your local police department, a small business, big hospital, or someo... More

Even Security Experts Fail to Spot Phishing Emails, Finds Report (SC Magazine)

An online phishing quiz conducted by Intel Security found that 97 percent of people failed to correctly identify all of the sample emails in the test. Intel Security tested 19,000... More

Cyber Insurance: Why is Growth Stymied? (Bank Info Security)

A dearth of actuarial data stymies the growth of the cyber insurance market, industry experts told Congress at a March 22 hearing. "Unlike fire insurance, [cyber] insurers do not ... More

F.B.I. Clash With Apple Loosed a Torrent of Possible Ways to Hack an iPhone (New York Times)

For weeks, the United States government has said that the only way to open an iPhone used by a gunman in a mass shooting was to get Apple’s help, a position that set off a cl... More

Certified Ethical Hacker Web Site Caught Spreading Crypto Ransomware (ARS Technica)

For the past few days, including during the hour that this post was being prepared on Thursday morning, a major security certification organization has been spreading TeslaCrypt m... More

Watch Out Gamers: Steam Stealer Malware is up and Running (Hack Read)

According to the researchers at Kaspersky Lab, Steam Stealer has provided a happy hunting ground for all malicious hackers. The low cost of Steam Stealer makes it accessible for ... More

Stagefright Variant ‘Metaphor’ Puts Millions of Samsung, LG and HTC Phones at Risk (Threat Post)

Millions of Android users are at risk of a new Metaphor exploit that can take over Samsung, LG and HTC phones in under 20 seconds. The hack gives attackers access to the targeted p... More

Sign up for our newsletters
* indicates required
MESA Newsletters