cybersecurity

  1. cageymaru

    The Department of Justice Revised the Computer Fraud and Abuse Act to Permit Good-Faith Computer Security Research

    The Department of Justice has formally acknowledged the role that computer security researchers play in testing the safety of networks, devices, and online services. The DOJ has announced that the Computer Fraud and Abuse Act (CFAA) has been revised to recognize the importance of good-faith...
  2. cageymaru

    The DHS Issues Medical Advisory for Medtronic Cardiac Devices

    The Department of Homeland Security (DHS) has issued a cybersecurity warning that documents vulnerabilities in the Medtronic Conexus Radio Frequency Telemetry Protocol. Medtronic makes cardio-defibrillators that are planted into a patient's chest and can be read and programmed by trained medical...
  3. cageymaru

    Microsoft Announces Microsoft Defender ATP for Mac

    Microsoft Defender ATP for Mac brings the same robust protection from Windows Defender to the Mac platform. Microsoft has created a "cross-platform next-generation protection and endpoint detection and response coverage" heterogeneous solution that will help Microsoft reach its goal of securing...
  4. cageymaru

    Facebook Employees Had Access to Millions of User Passwords Stored in Plain Text

    In a new blog post entitled "Keeping Passwords Secure" Facebook VP Engineering, Security and Privacy Pedro Canahuati explains how the social media giant accidentally stored Facebook user's passwords on internal data storage systems in plain text. Pedro explains how "these passwords were never...
  5. cageymaru

    Senate Report: Equifax Accused of Failing to Prioritize Cybersecurity

    In a Senate report, Equifax is accused of neglecting its own cybersecurity policies which ultimately led to the 2017 data breach that exposed personally identifiable information (PII) of 145 million Americans . The company's key Senior Managers didn't attend cybersecurity meetings and an audit...
  6. cageymaru

    NSA Releases Free "GHIDRA" Reverse Engineering Tool

    Today, the NSA released its free "GHIDRA" software reverse engineering tool. It can be used to analyze malicious code and malware like viruses. Cybersecurity professionals can use it to better understand potential vulnerabilities in their networks and systems. NSA will be making Ghidra available...
  7. cageymaru

    773 Million Records from Massive Data Breach Uploaded to Have I Been Pwned

    Troy Hunt is a Microsoft Regional Director and is the owner and creator of Have I Been Owned (HIBP). Today he alerted the security community to a massive 87GB data breach that the hacker community calls "Collection #1." It contains 773 million unique email addresses, 1.1 billion unique...
  8. cageymaru

    New Magecart Attack Used a Compromised Advertising Agency to Deliver Its Payload

    Magecart Group 12 is suspected of compromising an ad agency that delivers advertising to eCommerce websites. By directly injecting payment skimming code into JavaScript libraries provided by French online advertising company, Adverline to its eCommerce customers, it enabled all websites embedded...
  9. AlphaAtlas

    The Department of Defense is Still Not Very Secure

    According to a new report from the Pentagon's Inspector General (PDF Warning), which was spotted by Motherboard, the Department of Defense still has some glaring cybersecurity issues. While the Pentagon has apparently made some great strides since 2017, there are still "266 open...
  10. cageymaru

    The Idaho National Laboratory Protects the U.S. Infrastructure from Cyber Attacks

    The Idaho National Laboratory is known as one of the primary cybersecurity facilities in the United States. It has a premier cybersecurity research and development lab that is currently getting a $85 million expansion complete with 20 laboratories and separately housed supercomputers. These...
  11. cageymaru

    Dell Foils Hack Attempt with Rapidly Deployed Countermeasures

    Dell has announced that its cybersecurity team foiled an unauthorized intrusion into its network that attempted to extract Dell.com customer information; limited to names, email addresses and hashed passwords. The Dell security team stopped the hackers by immediately implementing...
  12. S

    Home Network Security Cocktail

    What's your flavor? Here's mine: FortiGate 60E NGFW (if you're in the industry you can get these free from Fortinet at various events/etc. - watch for them and sign up - the common combo is an 8 port managed switch, this, and an AP) - pfSense is great if you're a roll your own guy/open source...
  13. cageymaru

    Cybersecurity Vulnerabilites in Weapon Systems Blemish the Department of Defense

    A study by the U.S. Government Accountability Office (GAO) has shown how vulnerable U.S. weapon systems under the control of the Department of Defense (DOD) have become. This is due to the weapon systems becoming more networked and software dependent and the DoD is still in the early stages of...
  14. cageymaru

    Three Young Hackers Get Light Sentences After Assisting the FBI Fight Cybercrime

    Three hackers aged 21, 22, and 22 all received 5 years of probation and 62 1/2 weeks of community service in the U.S. District Court in Anchorage. Josiah White, Paras Jha, and Dalton Norman all pleaded guilty to computer fraud charges in December. They were ordered to pay $127,000 in...
  15. R

    Major Tech Companies Pledge To Never Help Governments Launch Cyber Attacks

    33 tech companies have pledged to never help governments launch cyberattacks in what the New York Times calls the "Digital Geneva Accord." Inquisitr summarizes the pledge dubbed the "Cybersecurity Tech Accord," which in addition to not helping governments launch a cyber attack, pledges to have...
  16. DooKey

    Gamers are Strong Candidates for Cybersecurity Jobs

    Gamers may be good candidates for cybersecurity jobs according to a new report from McAfee. McAfee surveyed hundreds of cybersecurity professionals and managers at major corporations and most of the respondents said the current generation of gamers are strong candidates for cybersecurity jobs...
  17. DooKey

    SEC Clarifies Guidance Regarding Cybersecurity Risks

    The SEC has issued an interpretive release that further clarifies guidance concerning disclosure of cybersecurity risks. The SEC wants companies to put policies in place that result in timely notification of breaches to the public, and better yet, policies that prevent executives from trading...
  18. DooKey

    British Telecom Secures Patent for a Cybersecurity Method to Protect Blockchain

    Great Britain’s biggest Internet and telecoms provider British Telecommunications PLC (BT) has secured a patent for its proposed cybersecurity system for Blockchain protection in late October. Based on the patent, one use case involving the patent is the so-called “majority control attacks” or...
  19. DooKey

    'Instant Replay' for Computer Systems Shows Cyber Attack Details

    Cybersecurity researchers at the Georgia Institute of Technology are working to automate the process that investigators use to pinpoint how intruders enter a network, what data they took, and which computer were compromised. It's known as Refinable Attack INvestigation (RAIN) and it will...
  20. FrgMstr

    US Army Shuts Down Use of Off-the-Shelf Due to Cybersecurity Concerns

    Mass produced consumer drones have been used by the Army for quite some time now, but that has come to a screeching halt as of two days ago. DJI drones mass produced in China, not secure? Whodathunkit? Document here. If you are into drones and security, this hour long video will tell you...
  21. Bees

    Kaspersky Lab Under U.S. Scrutiny for Russian Government Ties

    In a classified briefing with FBI and Homeland Security officials, the U.S. Senate Intelligence Committee reportedly discussed growing concerns in relation to cybersecurity firm Kaspersky Lab. The Moscow, Russia-based company has created these concerns in the Senate due to apparent previous...
Back
Top