The Sensors That Power Smart Cities Are a Hacker’s Dream

Credit to Author: Lily Hay Newman| Date: Thu, 09 Aug 2018 10:00:00 +0000
The IoT security crisis is playing out on a macro scale too, putting critical infrastructure at risk.
Read MoreRSS Reader for Computer Security Articles

Credit to Author: Lily Hay Newman| Date: Thu, 09 Aug 2018 10:00:00 +0000
The IoT security crisis is playing out on a macro scale too, putting critical infrastructure at risk.
Read More
Credit to Author: Brian Barrett| Date: Wed, 08 Aug 2018 20:15:30 +0000
An analysis of dozens of trading platforms reveals a range of cybersecurity concerns across mobile, desktop, and the web.
Read MoreCredit to Author: Trend Micro| Date: Thu, 09 Aug 2018 13:00:53 +0000

By Kevin Simzer Among the headline-grabbing reports of election hacking, nation-state raids on utilities firms, and mega-data breaches, few outside the industry ask the question: Did the cybersecurity skills shortage play a part? It’s impossible to say for sure. However, what we do know is that chronic industry skills gaps are putting organizations across the…
The post Fighting the Skills Gap Via Industry Leading Research and Inspiring Events appeared first on .
Read MoreCredit to Author: Pradeep Kulkarni| Date: Thu, 09 Aug 2018 08:46:11 +0000
According to a blogpost published on Aug 1, 2018, 200,000 routers in Brazil were compromised to deliver Cryptocurrency mining scripts to mine Monero (XMR) cryptocurrency. Hackers compromised the vulnerable MikroTik routers by injecting CoinHive scripts into the routers web pages in order to carry out the mass Cryptocurrency miner attack….
Read More
In this episode, Steve Ragan shows what a hybrid phishing attack looks like as it starts off on one service, and quickly moves to another.
Credit to Author: Sharky| Date: Tue, 07 Aug 2018 03:00:00 -0700
The time has come for the sales team at this financial services company to get new top-of-the-line laptops — and they’re being upgraded 80 at a time, reports an IT pilot fish there.
“Late one night, the guy in charge of the upgrade got a call from Security saying that a break-in had occurred,” fish says. “They told him that on the security cameras they saw the thieves making off with a lot of laptops.
“The upgrade project manager arrived at the scene to meet the police — who were very puzzled when he started laughing.
“Turns out the thieves stole 80 decommissioned laptops with no hard drives, while ignoring the 80 new laptops sitting in boxes beside the decommissioned ones.”

What is a phishing kit? In this video, Steve Ragan offers an answer and a look at some of the kits Salted Hash has collected.

Credit to Author: Jonny Evans| Date: Mon, 06 Aug 2018 05:21:00 -0700
Apple chipmaker TSMC suffered a serious WannaCry-related ransomware infection that closed down production at some of its factories. The incident should be a wake-up call for manufacturers across every industry.
TSMC has said the incident was not the result of a direct attack. Instead it says its systems were exposed to the malware “when a supplier installed tainted software without a virus scan.”
The malware spread fast and impacted some of the company’s most advanced facilities used to build Apple’s A-series chips.