Skip to main content

Security

Cybercrime kingpins are winning the online security arms race

posted onJuly 6, 2016
by l33tdawg

The cliché of the hacker-in-a-hoodie lone wolf is out of date. Cybercrime gangs are now almost as sophisticated as the big businesses they are trying to steal from, leading to a new security arms race that companies are losing.

The increasing threat from organized cyber-criminals and state-sponsored cyber espionage means companies need to forget about the idea of a lone hacker, think through the credible threats to their systems, and deal with them in order to disrupt their attackers' business models.

EU starts €1.8 billion cyber security plan

posted onJuly 6, 2016
by l33tdawg

The EU has signed an agreement with industry on cybersecurity and stepped up efforts to tackle cyber-threats which it hopes will trigger €1.8 billion of investment by 2020. It would be a big help to security suppliers, if the UK remained in the EU.

The new public-private partnership is part of a series of new initiatives to better equip Europe against cyber-attacks and to strengthen the competitiveness of its cybersecurity sector.

Darktrace intercepts $64M in fresh funding at a valuation of over $400M

posted onJuly 6, 2016
by l33tdawg

Darktrace, the U.K. cybersecurity startup whose backers include Autonomy founder Mike Lynch’s Invoke Capital, has closed $64 million in fresh funding.

The new round was led by global investment firm KKR, with participation from existing investor Summit Partners and new investors TenEleven Ventures and SoftBank.

EasyDoc malware adds Tor backdoor to Macs for botnet control

posted onJuly 6, 2016
by l33tdawg

Security firm Bitdefender has issued an alert about a malicious app that hands over control of Macs to criminals via Tor.

The software, called EasyDoc Converter.app, is supposed to be a file converter but doesn't do its advertised functions. Instead it drops complex malware onto the system that subverts the security of the system, allowing it to be used as part of a botnet or to spy on the owner.

Nasty BIOS bug slugs Gigabyte, hackers say

posted onJuly 6, 2016
by l33tdawg

Gigabyte has been swept into turmoil surrounding low-level security vulnerabilities that allows attackers to kill flash protection, secure boot, and tamper with firmware on PCs by Lenovo and other vendors.

Unconfirmed reports suggest the hardware vendor has used the "ThinkPwn" vulnerable code, thought to be born of Intel reference code, on four of its motherboards: Z68-UD3H, Z77X-UD5H, Z87MX-D3H, and Z97-D3H.

VIDEO: #HITB2016AMS Forging a Wireless Time Signal to Attack NTP Servers

posted onJuly 5, 2016
by l33tdawg

Radio timing service, such as GPS, BPC, JJY, WWVB, DCF77, WWVH have been widely used as a basic time source for industry or individual systems. These signals are used by millions of people to synchronize consumer electronic products like wall clocks, clock radios, and wristwatches. NTP sever also use these signals to get a precise time.

Approach IoT security as a system design problem

posted onJuly 5, 2016
by l33tdawg

The world with "everything" having access to the internet appears inevitable, and with it, the potential to do a lot of good. However, our not paying attention to warnings from the past can quickly negate any benefit derived from the Internet of Things (IoT).

With all the high-profile data breaches and malicious attacks discussed by tech media outlets each day, one might conclude that considering cybersecurity a system design problem has been largely ignored.

Euro 2016 causes spike in cyber-crime on mobile devices

posted onJuly 5, 2016
by l33tdawg

Fans are risking the cyber-security of themselves and their employers because of their eagerness to access UEFA football information while they are abroad.

Cyber-criminals have used the Euro 2016 Football tournament to target victims with malicious websites. As well as this, official apps for the football fest are also leaking data, it has been claimed.