Black Hat Europe: IoT devices can hack phones
The Internet of things (IoT) has already been used to launch the biggest DDoS attacks ever, but now it represents a potential path for attackers to compromise cell phones.
The Internet of things (IoT) has already been used to launch the biggest DDoS attacks ever, but now it represents a potential path for attackers to compromise cell phones.
ExtraHop is introducing a way to capture files just before ransomware encrypts them, making it possible to restore them but without regularly scheduled comprehensive updates.
Cisco has announced security upgrades to cut the time compromises go unnoticed on endpoints, giving attackers less time to do damage if they get past preventive security measures.
The DDoS attacks that flooded Dyn and knocked high-profile Web sites offline don’t mean businesses should abandon DNS service providers, in fact they should use more than one DNS provider for redundancy.
IBM Security is introducing online banking protection that flags fraudulent account users based on how they move their mouse.
IoT devices make good botnet material because they are poorly defended and the Mirai source code to create them has been made public.
Dyn says that the DDoS attack that swamped its DNS resolution service last week was backed by far fewer internet of things (IoT) devices than it thought before.
The massive DDoS attack that disrupted the internet address-lookup service Dyn last week was perhaps pulled off by a script kiddie targeting PlayStation Network and using Mirai malware to assemble a massive IoT botnet, according to research by Flashpoint.
A Q&A on what caused the Dyn DDoS attacks and what to do to protect yourself and your network.
The attacks that overwhelmed the internet-address lookup service provided by Dyn today were well coordinated and carefully plotted to take down data centers all over the globe, preventing customers from reaching more than 1,200 domains Dyn was in charge of.
Attacks against DNS service provider Dyn resumed today after a two and a half hour lull, and could indicate a new application of an old criminal technology, experts say.
A Russian hacking group used spearphishing to steal the Gmail login credentials of Hillary Clinton campaign staff, and that may be how campaign emails now being released were stolen, according to Secure Works.
Level 3 Threat Research has noted an uptick in activity by new IoT botnets backed by Mirai malware, with some attacks enlisting 100,000 hijacked devices.
Cisco has taken a look at its security capabilities and those of its partners and come up with a playbook to address ransomware.
Now that its source code has been released you can expect more attacks from Mirai, the malware behind the largest DDoS attack on record, which was powered by hijacked IoT devices.