-
Information on hacking tool could be of use to “hostile entities”: FBI
The FBI on Monday said it was right for the agency to withhold documents which detail how it unlocked an iPhone used by one of the San Bernardino, California, shooters. The FBI said that the information, if released, could be exploited by “hostile entities.” The Justice Department, in response to a FOIA law suit by the AP, Vice Media, and Gannett, the parent company of USA Today, earlier this month released heavily redacted records relating to the incident – but withheld information about how much the FBI paid a third party to unlock the work phone of Syed Rizwan Farook.
-
-
Child from Pittsburgh admits to hack attempt of Brussels Airport after ISIS attacks
A Pittsburgh child has admitted to launching a cyberattack against Brussels Airport in the aftermath of the 22 Mach 2016 suicide bombing by Belgian ISIS followers, which killed more than thirty people. The Belgian federal public prosecutor’s office said the suspect aimed to take down the website of the airport operator – the Brussels Airport Company — and “infiltrate the computer system,” but was unsuccessful.
-
-
Cyberattacks increase stress hormone levels, perceptions of vulnerability
A new study shows that individuals exposed to a simulated cyberterror attack had significantly increased levels of the stress hormone cortisol in their saliva compared to a control group. Following the cyberattack, study participants were more likely to fear an imminent cyberthreat and to express feelings of personal insecurity.
-
-
New technique identifies smartphone thieves in seconds
Three million phones were stolen in the United States. Ben-Gurion University of the Negev (BGU) researchers have developed a technique that identifies a smartphone thief or intruder in under fourteen seconds.
-
-
ISIS followers hack U.K. National Health Service
ISIS-linked hackers have attacked and defaced several NHS (U.K. National Health Service) websites in a series of cyberattacks. The hackers, going by the name of Tunisian Fallaga Team, targeted six websites three weeks ago, replacing legitimate web pages with graphic photos of the war in Syria. The attacks said they were retaliating for the West’s interference in the Middle East.
-
-
How computer hacking is becoming Russia’s weapon of choice
The Russian government has long been known to source its technology, world-class hacking talent, and even some intelligence information from local cybercrime rings. What’s more, this criminal fraternity probably receives state immunity for cybercrimes committed outside Russia in return for offering services to the Russian state. Russia’s clear long-term strategy is to use the internet to further its aims in information warfare. It has proved that this form of warfare is more potent than kinetic warfare and that it can reap the benefits quickly and without fear of a coordinated response from the United States or NATO. Its use of criminal cyber rings ensures that it benefits from no (provable) direct links to the Russian government. A further downside is that China, North Korea, and Iran seem to be copying this model and have already been active in attacks against other nation states. The internet has changed mass communication in countless positive ways. But it is becoming an increasingly dangerous tool for subversive activity. A re-think and a re-boot are looking increasingly necessary.
-
-
Protecting quantum computing networks against hackers
As we saw during the 2016 U.S. election, protecting traditional computer systems, which use zeros and ones, from hackers is not a perfect science. Now consider the complex world of quantum computing, where bits of information can simultaneously hold multiple states beyond zero and one, and the potential threats become even trickier to tackle. Even so, researchers have uncovered clues that could help administrators protect quantum computing networks from external attacks.
-
-
Trump loosens sanctions on Russian intelligence agency which helped his 2016 campaign
The Trump administration has loosened sanctions imposed by Barack Obama on Russia’s Federal Security Service (FSB), one of the two Russian government intelligence agencies which actively interfered in the U.S. 2016 presidential campaign in order to help Trump win. The loosening of the sanctions would make it easier for American companies to do business with the FSB, which is the successor of the KGB.
-
-
NATO must more firmly counter Russia's cyber-weaponry: U.K defense minister
NATO must begin to compete on the cyber-battlefield to counter Russian hacking aimed at undermining democracy in the United States and Western Europe, the British defense secretary, Sir Michael Fallon, has said in a speech earlier today (Thursday, 2 February) at St. Andrews University, one of the main centers for Russian studies in the United Kingdom. In his harshest and most pointed criticism yet of Russia, he accused Moscow of targeting the United States, France, Germany, Holland, Bulgaria, and Montenegro.
-
-
Global entities come shopping for Israeli cybersecurity
As computer devices and Internet of Things (IoT) connectivity continue to break new boundaries and create changes to our lifestyle, new cybersecurity technologies to defend our tech-savvy lives are crucial. “We’re still at the beginning for the cyber arena. We still need the security solution for smart homes, we still don’t have security solutions for autonomous cars, or for connected medical devices or MRI machines, or for connected kitchen appliances. Every technology that will be introduced to our lives in the coming years will need a cyber solution,” says one expert.
-
-
Hunting hackers: An ethical hacker explains how to track down the bad guys
When a cyberattack occurs, ethical hackers are called in to be digital detectives. In a certain sense, they are like regular police detectives on TV. They have to search computer systems to find ways an intruder might have come in – a digital door or window left unlocked, perhaps. They look for evidence an attacker left of entry, like an electronic footprint in the dirt. And they try to determine what might have been copied or taken. But how do people track down hackers, figuring out what they have done and who they are? What’s involved, and who does this sort of work? The answer is that ethical hackers like me dig deep into digital systems, examining files logging users’ activity and deconstructing malicious software. We often team up with intelligence, legal and business experts, who bring outside expertise to add context for what we can find in the electronic record. But when the attack is more advanced, coordinated across multiple media platforms and leveraging skillful social engineering over years, it’s likely a government-sponsored effort, making arrests unlikely. That’s what happened when Russia hacked the U.S. presidential election. Diplomatic sanctions are an option. But pointing fingers between world superpowers is always a dangerous game.
-
-
Android device’s Pattern Lock security can be cracked within five attempts
The popular Pattern Lock system used to secure millions of Android phones can be cracked within just five attempts – and more complicated patterns are the easiest to crack, security experts reveal. Pattern Lock is a security measure that protects devices, such as mobile phones or tablets, and which is preferred by many to PIN codes or text passwords. It is used by around 40 percent of Android device owners.
-
-
NSA/DHS endorse DCC cybersecurity program
Virginia Governor Terry McAuliffe on last week praised Danville Community College for becoming the “first rural community college in Virginia” to earn a prestigious cybersecurity designation from the National Security Agency (NSA) and the Department of Homeland Security (DHS). DCC is now one of just four community colleges in Virginia to achieve this milestone, which the governor called “a very big deal” for both attracting new industry and securing digital information.
-
-
Senior manager at Russia’s biggest cybersecurity firm arrested
Kaspersky Lab on Wednesday confirmed reports in the usually reliable Kommersant newspaper that Ruslan Stoyanov, the head of the cybersecurity firm computer incidents investigations unit, was arrested in December. Kommersant said Stoyanov was detained along with a senior Russian FSB intelligence officer and that they both faced charges of treason. Kaspersky Lab is Russia’s biggest cybersecurity firm. “It destroys a system that has been 20 years in the making, the system of relations between intelligence agencies and companies like Kaspersky,” says one expert.
-
-
“Anonymized” Web browsing history may not be anonymous after all
Raising further questions about privacy on the internet, researchers have released a study showing that a specific person’s online behavior can be identified by linking anonymous Web browsing histories with social media profiles. The new research shows that anyone with access to browsing histories — a great number of companies and organizations —can identify many users by analyzing public information from social media accounts.
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.