Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.
Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for highlights of the goings-on each week!
The promotional emails are cluttering the inboxes of consumers as Black Friday nears. Promotion after promotion hypes all kinds of savings, sending some online shoppers into a frenzy. But they also leave hackers salivating for entirely different reasons.
To this day, there remains to be no silver bullet or an all-encompassing solution to the ransomware threat. However, in the decade or so that ransomware has evolved from a nuisance to the thriving criminal business that it is today, the security world has since stepped up by developing tactics to counter its continuing surge.
With more than 3.5 billion Internet users worldwide, there are millions of opportunities for hackers to exploit, and in recent years, Black Friday and Cyber Monday have become prime targets for cyber criminals to create scams that lure unsuspecting victims.
Shoppers who use Amazon need to be aware that hackers are targeting accounts. A woman says a hacker got into her account and spent nearly $1,700 even though she changed her password multiple times. Once in her account, the hacker changed her phone number, then ordered more than $1,500 in merchandise and had it sent to an out-of-state address.
In the coming year, a high-profile auto manufacturer will be forced to recall vehicles due to a cybersecurity breach for the first time, experts have warned. Our cars are no longer simply a way to travel from A to B; but rather, they have become reliant on computer systems to function properly.
The Pentagon announced a new policy Monday that will give cyber security researchers a legal pathway to hack the Department of Defense. The Department of Defense Vulnerability Disclosure Policy provides clear guidelines for researchers to discover vulnerabilities in the Pentagon’s public-facing systems.
Possibly to maximize the earning potential of Cerber’s developers and their affiliates, the ransomware incorporated a routine with heavier impact to businesses: encrypting database files. These repositories of organized data enable businesses to store, retrieve, sort, analyze, and manage pertinent information.
Here is an update on the continued use of the backdoor and one of the TippingPoint Digital Vaccine (DV) filters you may have seen firing in large numbers as of late. DV filter 32391, which checks for attempts to scan for this backdoor, still fires in massive amounts on detection of backdoor communication attempts.
Tech industry giant Oracle announced Monday it has acquired Dyn, the Internet traffic company that was the victim of an epic hack a month ago that knocked out multiple popular sites for much of a day. Oracle said Dyn will benefit its cloud customers.
While we’re increasingly mobile in our habits, much of the time we’re still accessing the internet via our home network. There’s only one problem: the bad guys know this, and they’re coming after us. Like any system, the home network is only as strong as its weakest link.
A hacker group called Cobalt targeted ATMs across Europe in “smash and grab” operations. The hackers are reported to have remotely attacked ATMs using malicious software, which manipulated the systems to dispense cash.
Michele Orru has released an automated phishing toolkit to help penetration testers better exploit businesses. The well-known FortConsult hacker dropped the phishing kit at the Kiwicon hacking event in Wellington New Zealand last week.
Less than a month ago, hackers took control of an ocean of unsecured connected home devices, then essentially crashed the entire internet by using them to flood the web’s largest internet management company with bogus traffic.
Please add your thoughts in the comments below or follow me on Twitter; @JonLClay.