Hacking News

Latest hacking information from the underworld

Trump’s Executive Order: What It Means for US Cybersecurity

The WannaCry ransomware attack has dominated headlines recently, and with good reason – it has infected hundreds of thousands of computers in close to 100 countries, shutting down hospitals in the UK, causing problems for companies as large as FedEx, and has so far earned the attackers at least $70,000 in ransom money. It’s no

Trump’s Executive Order: What It Means for US Cybersecurity Read More »

Buggy devices and lazy operators make VoLTE a security nightmare

Voice over LTE leaks like a sieve, because nobody’s paying attention to the details. That’s the conclusion in a paper (PDF) presented to the Symposium on Information and Communications Technology Security in Rennes, France last week. The researchers, from Priority 1 Security, warn the vulnerabilities could affect any of the hundred-plus operators using VoLTE worldwide.

Buggy devices and lazy operators make VoLTE a security nightmare Read More »

Post-WannaCry, 5.5 Million Devices Still Expose SMB Port

If you thought WannaCry inspired a global wakeup call and a massive crackdown on exposed and dangerous ports, you would be wrong. In its annual National Exposure Index report, Rapid7 found 160 million computers, IoT devices and servers with open ports that should not be exposed to the public network. The ambitious project scanned more

Post-WannaCry, 5.5 Million Devices Still Expose SMB Port Read More »

Windows XP Receives More Updates To Avoid Another WannaCry Attack

Microsoft releases new security fixes for 96 security bugs and is also considering the unusual step of releasing some fixes for the older and unsupported Windows XP operating system. The new patch brings updates and fixes for various remote code execution (RCE) bugs in Windows, Microsoft Edge and Microsoft Office which could be exploited remotely

Windows XP Receives More Updates To Avoid Another WannaCry Attack Read More »

Microsoft Ventures: A look at Redmond’s latest 13 investments

The latest addition, made public this week, is Trusona, an identity-authentication company. Trusona offers a password-free login, along with “the only insured authentication solution” for enterprises, according to a blurb on the Microsoft Ventures portfolio page. In May 2016, Microsoft announced plans to create Microsoft Ventures, a small early-stage investment group targeting startups in the cloud,

Microsoft Ventures: A look at Redmond’s latest 13 investments Read More »

Can you trust your Android antivirus software? Malicious fake protection apps flood Google Play Store

Hundreds of fake anti-virus apps are capitalising on fears around WannaCry and other ransomware to trick mobile users into downloading adware, trojans and other malware. Many of these malicious apps are available to download in the Google Play store and a proportion claim to protect the user against WannaCry – even though the ransomware doesn’t

Can you trust your Android antivirus software? Malicious fake protection apps flood Google Play Store Read More »

House pushes bill to demand notice when Pentagon uses Cyber weapons

A new bill would require the Defense Dept. to inform congressional overseers within two days of launching a cyberweapon. The measure, proposed by leading lawmakers on the House Armed Services Committee, would apply to both offensive and defensive operations launched by the Pentagon to “defeat an ongoing or imminent threat,” according to the text of

House pushes bill to demand notice when Pentagon uses Cyber weapons Read More »

How Smart Cities Can Minimize the Threat of Cyber Attacks

In the not-so-distant future, smart cities will weave the Internet of Things (IoT) and interconnected devices into existing technology infrastructure to bring entire communities online. Singapore, for example, recently launched its Smart Nation program, deploying citywide sensors and monitors to collect data on everyday living. Using an online platform dubbed Virtual Singapore, the city-state plans

How Smart Cities Can Minimize the Threat of Cyber Attacks Read More »