Archive for the ‘cybercrime/malcode’ category: Page 181
Dec 10, 2017
The WIRED Guide to Digital Security
Posted by Derick Lee in categories: cybercrime/malcode, mobile phones, privacy
IN AN AGE of nonstop breaches and hacks, getting a handle on your own digital security matters more than ever. But everyone has their own threat model—a set of concerns unique to themselves. The average smartphone user doesn’t need to know what a Faraday cage is; an NSA contractor probably already has a good grasp of security basics. (Or … do they?) In this guide, we’ve included a few ways to improve your online security posture based on those different levels of risk. These won’t prevent the next megabreach or banish ransomware from the earth. They’re not all-encompassing. But they’ll help get you in the mindset of the types of steps you should be taking based on your particular situation. And they’ll help ensure that the next time you read one of those paralyzing headlines, it doesn’t apply to you.
In an age of nonstop breaches and hacks, getting a handle on your own digital security matters more than ever. But everyone has their own threat model—a set of concerns unique to themselves. The average smartphone user doesn’t need to know what a Faraday cage is; an NSA contractor probably already has a good grasp of security basics. (Or … do they?) In this guide, we’ve included a few ways to improve your online security posture based on those different levels of risk. These won’t prevent the next megabreach or banish ransomware from the earth. They’re not all-encompassing. But they’ll help get you in the mindset of the types of steps you should be taking based on your particular situation. And they’ll help ensure that the next time you read one of those paralyzing headlines, it doesn’t apply to you.
Nov 21, 2017
Why cyborg creators must self-govern security, privacy efforts
Posted by Zoltan Istvan in categories: cybercrime/malcode, cyborgs, geopolitics, robotics/AI, transhumanism
Most people probably aren’t aware of this, but the 2016 U.S. Presidential election included a candidate who had a radio-frequency identification chip implanted in his hand. No, it wasn’t Donald J. Trump. It was Zoltan Istvan, a nominee representing the Silicon Valley-based Transhumanist Party and his body-worn chip unlocked his front door, provided computer password access and sent an auto-text that said: “Win in 2016!”
The transhumanist movement – employing technology and radical science to modify humans – offers a glimpse into the marriage of machines and people, the focus of a recent paper released by the Institute for Critical Infrastructure Technology (ICIT). With cybernetic implants already available to consumers, the prospect for techno-human transmutation – cyborgs – is not as far away as many may think.
Continue reading “Why cyborg creators must self-govern security, privacy efforts” »
Nov 20, 2017
EU Cybersecurity Package: New Potential for EU to Cooperate with NATO
Posted by Roman Mednitzer in category: cybercrime/malcode
The European Union’s new ambitious approach to cyber challenges could be a game-changer for its cyber posture as well as for the transatlantic and neighbourhood relations, concludes this analysis by Tomáš Minárik and Siim Alatalu of the NATO Cooperative Cyber Defence Centre of Excellence, the NATO-affiliated cyber defence think-tank. Nevertheless, the EU could make better use of existing expertise in NATO and individual Member States.
The following analysis does not represent the official views of NATO.
On 13 September 2017, the European Commission and the High Representative issued a Joint Communication to the European Parliament and the Council [JOIN(2017) 450 final], bearing the title Resilience, Deterrence and Defence: Building strong cybersecurity for the EU. It introduces an ambitious and comprehensive plan to improve cybersecurity throughout the EU. The Commission and the High Representative (HR) proposed a broad range of measures, divided into three areas – resilience, deterrence and defence:
Continue reading “EU Cybersecurity Package: New Potential for EU to Cooperate with NATO” »
Nov 17, 2017
Could Terrorists Hack an Airplane? The Government Just Did
Posted by Genevieve Klien in categories: cybercrime/malcode, government, transportation
Hopefully not!
Hacking experts having been warning for years that it’s too easy to breach a cockpit’s defenses. Now an alarming government test proves their point.
Nov 14, 2017
Security Breach and Spilled Secrets Have Shaken the N.S.A. to Its Core
Posted by John Gallagher in categories: business, cybercrime/malcode, neuroscience
A serial leak of the agency’s cyberweapons has damaged morale, slowed intelligence operations and resulted in hacking attacks on businesses and civilians worldwide.
Nov 1, 2017
North Korean hackers steal warship blueprints from South
Posted by John Gallagher in categories: cybercrime/malcode, engineering, military
South Korea is ‘almost 100 per cent certain’ that North Korean hackers have stolen the blueprints for their warships and submarines.
The despotic regime is thought to have taken the documents after hacking into Daewoo Shipbuilding & Marine Engineering Co Ltd’s database in April last year.
Continue reading “North Korean hackers steal warship blueprints from South” »
Oct 16, 2017
The World Once Laughed at North Korean Cyberpower. No More
Posted by John Gallagher in categories: cybercrime/malcode, existential risks, military
While the world is fixated on its nuclear missiles, North Korea has also developed a cyberattack program that is stealing millions and unleashing havoc.
Oct 12, 2017
Israel hacked Kaspersky, then tipped the NSA that its tools had been breached
Posted by John Gallagher in categories: cybercrime/malcode, government, privacy
Israel notified the NSA, where alarmed officials immediately began a hunt for the breach, according to people familiar with the matter, who said an investigation by the agency revealed that the tools were in the possession of the Russian government.
Israeli spies had found the hacking material on the network of Kaspersky Lab, the global anti-virus firm under a spotlight in the United States because of suspicions that its products facilitate Russian espionage.
Last month, the Department of Homeland Security instructed federal civilian agencies to identify Kaspersky Lab software on their networks and remove it on the grounds that “the risk that the Russian government, whether acting on its own or in collaboration with Kaspersky, could capitalize on access provided by Kaspersky products to compromise federal information and information systems directly implicates U.S. national security.” The directive followed a decision by the General Services Administration to remove Kaspersky from its list of approved vendors. And lawmakers on Capitol Hill are considering a governmentwide ban.
Continue reading “Israel hacked Kaspersky, then tipped the NSA that its tools had been breached” »
Sep 25, 2017
When a tanker vanishes, all the evidence points to Russia
Posted by Amnon H. Eden in category: cybercrime/malcode
Introducing: GPS attacks. “By creating a false signal it is possible to fool a system into thinking it’s in a different place.” Russian oligarchs undertaking piracy? Check.
“Spoofing is currently used in Russia. Around the Kremlin, GPS devices typically show the location 20 miles away,” says Nathan Brubaker, head of the cyber-physical intelligence unit at FireEye.