IoT is Coming Even if the Security Isn’t Ready: Here’s What to Do

Posted by & filed under Cyber Security, Internet of Things.

In a May study of 553 IT decision makers, 78% said they thought it was at least somewhat likely that their businesses would suffer data loss or theft enabled by IoT devices. Some 72% said the speed at which IoT is advancing makes it harder to keep up with evolving security requirements. Source: Wired Magazine Date: February 23rd, 2018… Read more »

ATM “jackpotting” comes to the U.S. as alleged thieves trick machines into giving up $328,200

Posted by & filed under Cyber Security.

Two Venezuelan men went on a crime spree through Colorado, Idaho and Utah, cracking into seven ATMs and using software to trick the machines into spitting out as much as $98,000 at a time.  The alleged crooks used a technique common in Latin America and Europe but very new in the U.S. called “jackpotting.” Thieves use a key… Read more »

Data-stealing spyware ‘traced to Lebanon’

Posted by & filed under Cyber Security.

A security bug that has infected thousands of smartphones has been uncovered by campaign group the Electronic Frontier Foundation (EFF).  Working with mobile security firm Lookout, researchers discovered that malware in fake messaging designed to look like WhatsApp and Signal had stolen gigabytes of data.  Targets included military personnel, activists, journalists and lawyers.  Researchers say they traced the… Read more »

Update your software today. Seriously.

Posted by & filed under Cyber Security.

Chances are you own a smartphone or computer that contains a chip hackers could potentially exploit to get access to sensitive information.  That’s because billions of devices are affected by two major security flaws revealed by cybersecurity researchers recently. The flaws — dubbed Meltdown and Spectre — affect processing chips made by Intel (INTC), AMD(AMD) and ARM Holdings. That means if you… Read more »

The labs that protect against cyber warfare

Posted by & filed under Cyber Security.

The world has entered a new era of conflict – offensive cyber-attacks aimed at infrastructure and society, all done without a shot being fired. The first nation state-level cyber-attack on critical infrastructure, widely attributed to a joint collaboration between American and Israeli intelligence against Iran, was uncovered in 2010. Known as the Stuxnet virus, the attack aimed… Read more »

HP laptops found to have hidden keylogger

Posted by & filed under Consumer Technology, Cyber Security, Ethical issues.

Hidden software that can record every letter typed on a computer keyboard has been discovered pre-installed on hundreds of HP laptop models. Security researcher Michael Myng found the keylogging code in software drivers preinstalled on HP laptops to make the keyboard work. HP said more than 460 models of laptop were affected by the “potential security vulnerability”. Source: BBC Technology… Read more »

A Tiny New Chip Could Secure the Next Generation of IoT

Posted by & filed under Cyber Security, Internet of Things, IT Security.

The challenge with internet of things security so far has been the cost of implementing hardened features. It’s cheaper and faster to develop a product without spending time and resources on security. Devices rush off the line without adequate protections, often riddled with bugs, and rarely have a mechanism for manufacturers to distribute patches. An attacker who… Read more »

Face ID iPhone X ‘hack’ demoed live with mask

Posted by & filed under Apple, Cyber Security.

A Vietnamese cyber-security firm has shown the BBC how a mask can be used to unlock Apple’s new iPhone X. The demo took place about a week after Bkav first claimed to have undermined the handset’s security. But other experts have cast doubt on what the “hack” amounts to. Apple has not commented beyond referring… Read more »

Your browser could be mining cryptocurrency for a stranger

Posted by & filed under crypto-currency, Cyber Security.

THERE’S SOMETHING NEW to add to your fun mental list of invisible internet dangers. Joining classic favorites like adware and spyware comes a new, tricky threat called “cryptojacking,” which secretly uses your laptop or mobile device to mine cryptocurrency when you visit an infected site.  Malicious miners aren’t new in themselves, but cryptojacking has exploded in popularity… Read more »