New report reveals Russian hackers have been masquerading as Iranian hackers in order to access sensitive government, military and commercial secrets in 35 countries.
Cyber Security
Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.
So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.
It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.
Cybersecurity is an ever-changing landscape with attackers constantly trying to develop new threats. See how companies are turning to AI to secure their sensitive data.
Check Point discovered another security vulnerability in Qualcomm chips affecting 40% of smartphones, allowing hackers to inject code in Android phones, including Google, Samsung, LG, Xiaomi, and One Plus brands.
As location-based services become ubiquitous and the rise of selfie soldiers, the Strava heat map incident shows the difficulty in governing civilian technology in military settings.
A threat actor listed on a hacker forum data belonging to over 17 companies containing over 34 million records. Victims include Eatigo and Alibaba-owned Lazada's RedMart online grocery.
A new draft China cybersecurity law could restrict certain U.S. companies from doing business in the country which clearly represent a tit-for-tat in the escalating trade and cyber war between U.S. and China.
Apple attributes iPhone security to its "walled garden" approach. Among other claims, Apple says that an Android device is up to 47 times more likely to contract malware and that allowing app sideloading would attract a wave of cyber crime to the iOS platform.
A new phishing campaign that chains exploits from Microsoft’s Sway, OneNote and Sharepoint services is targeting C-suite executives at a wide range of organizations worldwide.
New report from DataVisor reveals cybercriminals are increasingly targeting mobile channels to commit fraud, with 90% of mobile fraud originating from Android devices.
FlexBooker, a commonly used appointment scheduling and calendar service, is apologizing to its customers after 3.7 million records appeared on a dark web hacker forum following a DDoS attack.