Hacking the Wind

BLACK HAT USA – Las Vegas – Gaping security holes in wind energy control networks make them vulnerable to cyberattacks for extortion and physical destruction purposes, a researcher showed here today. Jason Staggs, a security researcher at the University of Tulsa, has spent the past couple of years crisscrossing the US and hacking away at…

7 Hardware & Firmware Hacks Highlighted at Black Hat 2017

When enterprises build their security models based on implied trust at the hardware and firmware level, they’re building them on a foundation of sand. Security researchers are going to repeatedly hammer that lesson home at Black Hat this week as they demonstrate a range of vulnerabilities, attack techniques and tools designed to get as close…

Forecasting the Future of Ransomware

There’s no question that ransomware is one of the most formidable threats to a business. With so much riding on digitized data, important applications and other systems, any interruption to access of these crucial assets can quickly spell disaster for an organization. Despite efforts on the part of enterprises to educate staff and enhance their…

Apple iOS Malware Growth Outpaces that of Android

Number of iOS devices running malicious apps more than tripled in three consecutive quarters, while infected Android devices remained largely flat, report shows. iPhones and other devices running Apple’s iOS have seen a jump in malicious apps attacking them while Android malware infections have remained largely stable, according to a report released today by mobile…

Hacker allegedly stole $7.4 million worth of Ether in 3 minutes

While there is a general consensus that the Knightscope security robot in Washington, D.C., committed suicide on Monday, the same everyone-agrees-opinion is not true for the $7.4 million heist of the cryptocurrency Ether that happened on the same day. CoinDash maintains that a hacker made off with the Ether, which comes from the app platform ethereum, during its…

FBI Issues Warning on IoT Toy Security

IoT toys are more than fun and games and can potentially lead to a violation of children’s privacy and safety, the Federal Bureau of Investigation warned Monday. Internet-connected toys carry the potential of violating children’s privacy and safety, given the amount of information the toys can collect and store, the Federal Bureau of Investigation warned…