Hackers are finding creative ways to target connected medical devices

Hackers are leveraging error messages from connected medical devices — including radiology, X-ray and other imaging systems — to gain valuable insights, according to Zingbox. These insights are then used to refine the attacks, increasing the chance of successful hack. “Hackers are finding new and creative ways to target connected medical devices. We have to…

Connected car security is improving, researchers say

The automotive industry has apparently stepped up their game when it comes to improving connected car security. According to the latest IOActive report, which was compiled from the results of the company’s extensive research in the field in 2016 and 2017, there has been a significant improvement in front-end cybersecurity, i.e. vehicles’ hardware systems. Risk…

You should prepare for the next mega data breach

As of September 2018, it’s been one year since the historical Equifax mega data breach that impacted nearly half of all consumers in the U.S. Since this monumental invasion of personal data, fraudsters have shown little to no notion of slowing down as evident by the continued emergence of additional data breaches. In fact, within…

U.S. Unveils First Step Toward New Online Privacy Rules

The Commerce Department said the announcement is part of an effort to “modernize US data privacy policy for the 21st century.” The move follows the implementation this year of ramped up data protection rules imposed by the European Union, and a new privacy law enacted in California. Both measures will impact internet firms whose websites…

Cryptocurrency mining malware increases 86%

McAfee released its McAfee Labs Threats Report September 2018, examining the growth and trends of new cyber threats in Q2 2018. In the second quarter, they saw the surge in cryptomining malware growth that began in Q4 2017 continue through the first half of 2018. McAfee also saw the continued adaptation of the type of…

A law enforcement view of emerging cybercrime threats

Cybercriminals are adopting creative new techniques to target their victims at an unprecedented pace and are constantly seeking methods to avoid law enforcement detection. To stay ahead of them, law enforcement should target cybercriminals offering “off-the-shelf” cyber-attack services or products to make it more difficult for low-level cybercriminals to carry out high-level attacks. Europol’s fifth…

Retail Sector Second-Worst Performer on Application Security

The retail industry’s cybersecurity preparedness continues to lag behind almost every other sector despite efforts by the major credit card associations to bolster retail security via the Payment Card Industry Data Security Standard (PCI DSS). Third-party risk management firm SecurityScorecard recently analyzed a total of 1,444 domains in the retail industry with an IP footprint…

U.S. Takes Off the Gloves in Global Cyber Wars: Top Oficials

National Security Advisor John Bolton said the country’s “first fully articulated cyber strategy in 15 years” was now in effect. The new more aggressive posture follows a decision by President Donald Trump to revoke rules established by his predecessor Barack Obama to require high-level authority for any big military cyber operations. “Our hands are not…