Understanding Looming Threats and the Need to Hunt With Anonymity

Situational awareness is critical in every kind of engagement. The internet is no exception. Effectively all modern conflicts take place, at least in part, online. To understand the threats you will inevitably face, you need to go hunting outside your perimeter. Only by surreptitiously monitoring and engaging with potential attackers and malware developers will you…

Privacy, security concerns grow for wearables

While Google Glass was not the success Google wanted it to be, there is no doubt that the wearable camera market is growing. People may have not been comfortable with the fact that random persons can record their action without them being aware of it, but most have no trouble with law enforcement agents, first…

CIA Router Hacking Tool Exposed by WikiLeaks

Documents published by WikiLeaks on Thursday provide details on a tool allegedly used by the U.S. Central Intelligence Agency (CIA) to hack routers and access points. Dubbed CherryBlossom, the tool is described by its developers as a system designed for monitoring a target’s Internet activity and delivering software exploits via wireless networking devices. WikiLeaks said…

Week in review: PowerPoint malware delivery, dark web fraud guides, security through APIs

Here’s an overview of some of last week’s most interesting news and articles: UK ICO offers grants for practical privacy research The programme is open to academic institutions, civil society groups, trade and industry associations and organisations with a genuine commitment to public benefit outcomes. Proposals do not need to be technology based but must…

Healthcare organizations still complacent about cybersecurity

The rapid fire spread of the WannaCry ransomware, which infected thousands of organizations globally, is one of the most significant cyberattacks in recent digital history. The impact was particularly damaging to the healthcare sector, with the UK’s National Health Service (NHS) being one of the first and most adversely affected victims, causing numerous patient services…

Fake LinkedIn emails phishing job seekers

The scammers are trying to impersonate the popular employment-oriented social networking service, but careful users will immediately spot many things that point to the email being fake: The email sender address that has nothing to do with LinkedIn The lack of certain design elements and the “unsubscribe” footer usually contained in LinkedIn emails The email…

Are travel Wi-Fi routers secure?

Last week at Kaspersky Lab’s Security Analyst Summit (the SAS), there was a lot of cool research that made you think. Although a lot of talks centered on deep APT research and threats to businesses, there were a few sessions where consumer security was shown to be at risk as well. One such talk was…

Putting IoT Security Front and Center

The Internet of Things (IoT) is not just hype anymore. It is taking off at an enormous rate, and the predictions of 20 billion connected devices by 2020now sound entirely likely. But as it takes off, so do IoT security challenges for both enterprises and consumers. Obstacles range from software updating issues to employee education…

Bug Allowed Theft of Over $400,000 in Zcoins

An implementation bug has allowed someone to make a profit of more than $400,000 after creating roughly 370,000 units of the Zcoin cryptocurrency, users were told on Friday. Zcoin (XZC), worth approximately $2 per unit, is an implementation of the Zerocoin protocol, which aims to provide fully anonymous currency transactions. Zerocoin has also been used…