Small hacks: Free coffee, spying taxis, and a vulnerable airport

News websites often feature stories about computer errors and vulnerabilities used to perpetrate sophisticated large-scale incidents like last year’s WannaCry and NotPetya attacks. But experts know that most successful hacks and cracks are the result of very basic blunders by system developers or installers. Incorrectly configured systems are everywhere, and only a few hours separate the moment when a…

UK Parliament Cuts Email Access After Cyberattack

Britain’s parliament shut down external access to e-mail accounts on Saturday following a cyberattack. Parliamentary authorities described the attack as “sustained and determined”, in an email sent to lawmakers and published by the Daily Telegraph. “Earlier this morning we discovered unusual activity and evidence of an attempted cyberattack on our computer network,” it read. “Closer…

Security skills need to be deep and wide to mitigate critical risks

Businesses recognize security as a growing imperative, but many remain on the defensive, fighting cyber threats with dated tactics and training, according to CompTIA. Companies need to adopt proactive measures to identify weak links before they are exploited; broaden the security skills of their technology professionals; and implement top to bottom security training throughout the…

The Necurs Botnet: A Pandora’s Box of Malicious Spam

This is the tale of a cybercrime botnet operation that, within about five years of its existence, has been named one of the largest botnets in the world. It’s called the Necurs botnet. It militarizes up to 6 million zombie endpoints, delivers some of the worst banking Trojans and ransomware threats in batches of millions…

Apple: Mac, iPhone Bugs That CIA Allegedly Exploited Were Fixed Years Ago

The Apple desktop and mobile product vulnerabilities that were revealed this week, in a WikiLeaks data dump of documents allegedly describing several secret CIA projects, were all fixed years ago, Apple said Friday. The leaked information on the Apple vulnerabilities is from a larger collection of documents that WikiLeaks has dubbed “Vault 7,” containing hitherto…