Week in review: Evaluating AI-based cyber security systems, how CIA hit air-gapped computers

Here’s an overview of some of last week’s most interesting news and articles: How the CIA gained access to air-gapped computers A new WikiLeaks release of documents believed to have been stolen from the CIA show the intelligence agency’s capability to infect air-gapped computers and networks via booby-trapped USB sticks. Hackers extorted a cool $1…

With ransomware, pay up if you want to keep paying

A hospital CEO is contacted in the middle of the night with a dire warning. Hackers have taken control of computer systems used for patient care, CT scans, and lab work. The hacker wants money. Rather than pay the ransom, the hospital CEO enlists several experts to try to break back into the system. It…

Privacy, security concerns grow for wearables

While Google Glass was not the success Google wanted it to be, there is no doubt that the wearable camera market is growing. People may have not been comfortable with the fact that random persons can record their action without them being aware of it, but most have no trouble with law enforcement agents, first…

Week in review: PowerPoint malware delivery, dark web fraud guides, security through APIs

Here’s an overview of some of last week’s most interesting news and articles: UK ICO offers grants for practical privacy research The programme is open to academic institutions, civil society groups, trade and industry associations and organisations with a genuine commitment to public benefit outcomes. Proposals do not need to be technology based but must…

Al-Jazeera reportedly hit by systematic hacking attempts

Al-Jazeera, the Doha-based broadcaster owned by the ruling family of Qatar, says the websites and digital platforms of Al Jazeera Media Network, its parent company, “are undergoing systematic and continual hacking attempts.” “These attempts are gaining intensity and taking various forms. However, the platforms have not been compromised,” the broadcaster said in a statement that…

Application security trends: What you need to know

Today at Infosecurity Europe 2017, High-Tech Bridge released a summary report on application security trends for Q1 – Q2 2017. Statistical data mentioned in the report largely comes from the ImmuniWeb application security testing platform and High-Tech Bridge’s free web security services, but also leverages a wealth of data from various open sources. The most…

Week in review: WannaCry decryptor available, stealing Windows credentials using Google Chrome

Here’s an overview of some of last week’s most interesting news and articles: DocuSign breached, stolen info used for targeted phishing campaign Phishing emails impersonating electronic signature technology provider DocuSign are not an unusual sight, but the latest campaign has the added advantage of specifically targeting registered DocuSign users. There’s now a WannaCry decryptor tool…

Microsoft to governments: Stop hoarding vulnerabilities

Microsoft is full of surprises lately: first they issued patches for unsupported versions of Windows, then they publicly criticized the NSA for hoarding knowledge about critical software vulnerabilities (and exploits for them). “We have seen vulnerabilities stored by the CIA show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers…