Cibersecurity

Beijing targets American biz amid tech tariff tiff

American biz Beijin El buen fin targets

Beijing targets American biz amid tech tariff tiff

Beijing targets American biz amid tech tariff tiff Three years after the governments of America and China agreed not to hack corporations in each other's countries, experts say Beijing is now back to its old ways. And if that's the case, we can well imagine Uncle Sam having a pop back. Speaking at the Aspen Cyber Summit in San Francisco on Thursday, a panel including top NSA adviser Rob Joyce and Symantec CEO Greg Clark said the 2015 truce the Obama administration struck with Beijing has been all but wiped out over the past year. The Middle Kingdom has now...

Read more →


North Korea-linked hacking group stole millions from ATMs

ATMs North Korea-linked hacking group stole millions from ATMs

North Korea-linked hacking group stole millions from ATMs

North Korea-linked hacking group stole millions from ATMs Lazarus, North Korea-linked hacking group that was behind the notorious WannaCry attack, managed to steal tens of millions of dollars from ATMs in Asia and Africa, according to a report from security firm Symantec. The hackers deployed malware called Trojan.FastCash and infected thousands of servers that communicate with ATMs. It then used that access to approve its own fraudulent transactions and withdraw money from the machines. The FastCash scheme has been going on for years. According to Homeland Security's Computer Emergency Readiness Team (US-CERT), which issued a warning about the attack last...

Read more →


Learn to play defense by hacking these broken web apps

broken apps hacking play defense

Learn to play defense by hacking these broken web apps

Learn to play defense by hacking these broken web apps The best way to learn to play defense is to play offense, and the OWASP Broken Web Applications Project makes it easy for application developers, novice penetration testers, and security-curious management to flex their offensive muscle in the safety of a virtual machine on their own laptop. Web applications are the most visible front door to any enterprise and are often designed and built without strong security in mind. Stressing out over hardware vulnerabilities like Spectre or Meltdown is fun and trendy, but while you're digging a moat around your...

Read more →


New Android Malware Framework Turns Apps Into Powerful Spyware

Apss New Android Malware Framework Powerful Spyware

New Android Malware Framework Turns Apps Into Powerful Spyware

New Android Malware Framework Turns Apps Into Powerful Spyware Security researchers have uncovered a new, powerful Android malware framework that is being used by cybercriminals to turn legitimate apps into spyware with extensive surveillance capabilities—as part of what seems to be a targeted espionage campaign. Legitimate Android applications when bundled with the malware framework, dubbed Triout, gain capabilities to spy on infected devices by recording phone calls, and monitoring text messages, secretly stealing photos and videos, and collecting location data—all without users' knowledge. The strain of Triout-based spyware apps was first spotted by the security researchers at Bitdefender on May...

Read more →


T-Mobile Hacked — 2 Million Customers' Personal Data Stolen

2 Million Customers Personal Data Stolen T-mobile T-Mobile Hacked

T-Mobile Hacked — 2 Million Customers' Personal Data Stolen

T-Mobile Hacked — 2 Million Customers' Personal Data Stolen T-Mobile today confirmed that the telecom giant suffered a security breach on its US servers on August 20 that may have resulted in the leak of "some" personal information of up to 2 million T-Mobile customers. The leaked information includes customers' name, billing zip code, phone number, email address, account number, and account type (prepaid or postpaid). However, the good news is that no financial information like credit card numbers, social security numbers, or passwords, were compromised in the security breach. According to a brief blog post published by the company...

Read more →