• New analysis method discovers eleven security flaws in popular Internet browsers

    Georgia Tech researchers developed a new cyber security analysis method which discovered eleven previously unknown Internet browser security flaws, and were honored with the Internet Defense Prize, an award offered by Facebook in partnership with USENIX, at the 24th USENIX Security Symposium. Their research explores vulnerabilities in C++ programs (such as Chrome and Firefox) which result from “bad casting” or “type confusion.” Bad casting enables an attacker to corrupt the memory in a browser so that it follows a malicious logic instead of proper instructions.

  • Einstein 3 Accelerated (E3A) deployment gets a push forward

    The two recent network breaches at the Office of Personnel Management (OPM), which allowed the pilfering of sensitive personal information of millions of federal employees, their families, clearance applicants, and contractors, has drawn attention to the Department of Homeland Security’s $3 billion network monitoring program called Einstein. The question now is whether that program is the capable of preventing another intrusion in the future.

  • view counter
  • Researchers use SMS to take control of a car remotely

    Researchers have discovered a serious flaw in vehicle security, which allowed them to hack a car, remotely activating its windscreen wipers, applying its brakes, and even disabling them – and do all this by using simple text messages. The vulnerability was found in small black dongles which are connected to the vehicles’ diagnostic ports. The dongles are used by insurance companies and fleet operators and are plugged into the car’s onboard diagnostics port (OBD-II).

  • Chinese government hackers target personal e-mails of “all top national security and trade officials”: U.S.

    The vulnerability of American government organizations to hacking by foreign government-baked hackers was in evidence again when, a few days ago, it was revealed that Russian government hackers, using spear-phishing attacks, breached Joint Staff e-mail system. The breach caused about 4,000 civilian and military employees to lose access to their e-mail while the system was cleaned. U.S. government sources say that a separate set of attacks by Chinese government hackers targeted the personal e-mails of “all top national security and trade officials.” These attacks, which began in 2010, were among the more than 600 hacks by hackers working for the Chinese government, and their target was the personal e-mail info of top administration officials. The hacks were still going on.

  • Russian government-backed hackers breach Joint Chiefs e-mail server

    Russian government-backed hackers have managed to hack the Pentagon’s unclassified e-mail server used by the office of the Joint Chiefs. Military officials said Thursday that the sophistication of the attack shows that it has been conducted by hackers with the resources typically available only to states. The e-mail system was taken offline as soon as the intrusion was detected. The required cyber protection measures and security patches were all in place, but the attackers still managed to circumvent them and find a way into the network in a manner that U.S. government cyber experts had not seen before, senior Defense officials said.

  • Improving the security of data transfer

    Georgia Tech researchers were awarded $4.2 million from the Defense Advanced Research Projects Agency (DARPA) and Air Force Research Laboratory (AFRL) to improve how data is tracked between computers, Internet hosts, and browsers for better cyber security. The four-year project, titled “THEIA” after the Greek goddess of shining light, attempts to shed light on exactly where data moves as it is routed from one Internet host to another and whether any malicious code, for example, is attached to data during transfer.

  • New tool to improve government computer network security

    Researchers have developed a computer network security tool to help government agencies, along with state and local governments. The software-based technology, known as the Network Mapping System (NeMS), discovers and characterizes computer networks. “It is important to know what you have on your networks, so that you can decide what best practices to apply,” says one of the researchers.

  • N.Y. village pays ransom to regain access to hacker-encrypted files

    The village Ilion in central New York paid ransom twice last year — $300 and $500 — to have access to its computers two official-looking e-mails planted malware throughout the village’s computer system. The New York State comptroller’s office has audited 100 municipal computer systems the past three years, and said the experience of Ilion should serve as a warning to others municipalities of the growing cyberthreat – especially attempts by hackers to infiltrate computer systems to make them inaccessible unless ransom is paid.

  • FDA to hospitals: Infusion system vulnerable to hacks, should not be used

    The Food and Drug Administration (FDA) issued a warning in which it “strongly encourages” hospitals to stop using Hospira’s Symbiq Infusion System, because the device is vulnerable to attacks by hackers who could remotely control dosages delivered via the computerized pumps. The FDS said that tests have shown that an unauthorized third party – hackers – could access the Symbiq infusion system by breaching hospital networks.

  • FireEye: Kremlin-backed hackers used Twitter to mask attacks on U.S.

    FireEye the other day released a new Threat Intelligence report which analyzes the functionality and obfuscation tactics of an advanced piece of malware employed by the likely Russian government-backed Advanced Persistent Threat (APT) group APT29. APT29 combines steganography, cloud storage, and social media services to fly under the radar of network defenders.

  • U.S. military bases vulnerable to cyberattacks on their power, utility systems

    U.S. military bases are at risk for cyberattacks against the bases’ power grid and other utility systems, according to a new report on defense infrastructure from the Government Accounting Office. The 72-page GAO document concludes military bases “may be vulnerable to cyber incidents that could degrade operations and negatively impact missions.”

  • Shoring up Tor

    With 2.5 million daily users, the Tor network is the world’s most popular system for protecting Internet users’ anonymity. For more than a decade, people living under repressive regimes have used Tor to conceal their Web-browsing habits from electronic surveillance, and Web sites hosting content that’s been deemed subversive have used it to hide the locations of their servers. Researchers have now demonstrated a vulnerability in Tor’s design, mounting successful attacks against popular anonymity network — and show how to prevent them.

  • Israel bolsters cyber defenses to cope with an escalating number of cyberattacks

    In 2013, Israel’s grid was cyberattacked, on average, a few hundred times per hour. Last year the average hourly attacks on Israel’s grid was 20,000.The number of detected cyberattacks on Israel reached two million a day during the war with Hamas last summer. The Israeli government decided there was a need to reorganize and improve the cyberdefense systems protecting Israel’s critical infrastructure.

  • Cellphones can steal data from isolated “air-gapped” computers

    Air-gapped computers are isolated — separated both logically and physically from public networks — ostensibly so that they cannot be hacked over the Internet or within company networks. Researchers at the Ben-Gurion University of the Negev (BGU) Cyber Security Research Center have discovered that virtually any cellphone infected with a malicious code can use GSM phone frequencies to steal critical information from infected “air-gapped” computers.

  • Russia offers safe haven for a major botnet operator

    Recently the FBI offered a reward of $3 million for any useful information which will lead to the apprehension of Evgeniy Mikhailovich Bogachev. Bogachev is notorious for creating the Gameover Zeus botnet, which the FBI had successfully shut down in mid-2014, but the agency failed to capture Bogachev himself. In early 2015 Bogachev managed to restore Zeus.The hackers behind Zeus are believed to have stolen more than $100 million since3 2011. Experts worry that botnet may be used for more than stealing money, and may become a weapon of cyber warfare.