U.S. Companies Urged to Protect Against Foreign Government Hackers

The National Counterintelligence and Security Center began sending out detailed advisories, in brochure and video forms, to companies around the country to show them how to guard against cyber-incursions. The blitz follows hotel chain Marriott’s disclosure last week that hackers stole more than five million passport numbers of guests at its properties. It was the…

Vulnerabilities in high-performance computer chips could lead to failures in modern electronics

A Washington State University research team has uncovered significant and previously unknown vulnerabilities in high-performance computer chips that could lead to failures in modern electronics. The researchers found they could damage the on-chip communications system and shorten the lifetime of the whole computer chip significantly by deliberately adding malicious workload. Led by Partha Pande, assistant…

7 warning signs of an insider threat

Employees conducting attacks on their own employees – known as insider threats – are becoming increasingly common and costly. According to a CA report, over 50 percent of organizations suffered an insider threat-based attack in the previous 12 months, while a quarter say they are suffering attacks more frequently than in the previous year. Ninety…

How email fraud tactics continue to find new life

Almost as soon as email became widely used, crooks and scammers began using it as a means to defraud people. In today’s world, malicious fake emails continue to be a huge problem for individuals and businesses. Businesses make lucrative targets Losses due to BEC scams are escalating, and criminals are targeting organizations with emails that,…

New techniques expose your browsing history to attackers

Security researchers at UC San Diego and Stanford have discovered four new ways to expose Internet users’ browsing histories. These techniques could be used by hackers to learn which websites users have visited as they surf the web. The techniques fall into the category of “history sniffing” attacks, a concept dating back to the early…

Hackers are finding creative ways to target connected medical devices

Hackers are leveraging error messages from connected medical devices — including radiology, X-ray and other imaging systems — to gain valuable insights, according to Zingbox. These insights are then used to refine the attacks, increasing the chance of successful hack. “Hackers are finding new and creative ways to target connected medical devices. We have to…

Surge in Blended Attacks Stirs New Cyber Worries

Symantec, NH-ISAC partner on blended threat workshop series as healthcare industry deals with alarming rise in number of incidents. It sounds like a nightmare: A targeted piece of malware infects computers and devices, temporarily shutting down critical technologies used in the healthcare community. As the malware begins to become contained, a natural disaster hits the…