Tuesday , 21 November 2017
Home » Tag Archives: Technology (page 30)

Tag Archives: Technology

NHS cyber-defender Marcus Hutchins to appear in US court

British cyber-security researcher Marcus Hutchins will appear in court in Las Vegas later charged in a US cyber-crime case. The 23-year-old has been accused of involvement with Kronos – a piece of malware used to steal banking logins from victims’ computers. Mr Hutchins, from Ilfracombe in Devon, came to prominence after he stalled the WannaCry cyber-attack which hit the NHS ... Read More »

South Korea spy agency admits trying to rig 2012 presidential election

National Intelligence Service says it mobilised cyberwarfare experts to ensure Park Geun-hye beat rival and now president Moon Jae-in South Korea’s spy agency has admitted it conducted an illicit campaign to influence the country’s 2012 presidential election, mobilising teams of experts in psychological warfare to ensure that the conservative candidate, Park Geun-hye, beat her liberal rival. View Full Story ORIGINAL ... Read More »

How a Group of Engineers Hacked a 113-Year-Old Subway System’s Signs

For those of us living in New York City, taking the train this summer has been, let’s just say, an interesting experience. Amid delays, 100-degree train cars, and weekend construction, New York’s Gov. Andrew Cuomo even announced a state of emergency for the Metropolitan Transit Authority (MTA) in June, and pumped an extra $1 billion into the problem. View Full ... Read More »

Caltrans Sign In Northern California Hacked To Read ‘Trump Has Herpes’

At least one computer hacker in Northern California is clearly not a fan of President Donald Trump. CBS 13 in Sacramento reported Wednesday evening that drivers along I-80 had to do double-takes after seeing a hacked sign that said TRUMP HAS HERPES. The first reports about the hacked sign started popping up on Twitter just before 11 p.m. View Full ... Read More »

Ransomware can cost firms over $700,000; cloud computing may provide the protection they need

High-profile cybercrime such as data theft, ransomware and computer hacks seem to be occurring more frequently and with higher costs, but cloud computing may provide the security that companies are searching for, experts suggest. “Cloud computing improves IT security and security professionals need as much help as possible,” said Nick McQuire, vice president of enterprise research at CCS Insight. View ... Read More »

PandaLabs Records a 40% Increase in Attacked Devices this Quarter

In their quarterly report, PandaLabs, the Security Operations Center at Panda Security, presents a rundown of the three most harrowing months in cybersecurity in recent years. The Quarter in Numbers This quarter has been defined by two major attacks: WannaCry and Petya. The first infected over 230,000 computers in May and caused losses of between one and four billion dollars. ... Read More »

Mitigating ransomware in the healthcare sector

Peter Groucutt, Managing Director,

The healthcare sector is now a prime target for cyber criminals who are keen to capitalise on this sector’s need to run an always-on operation and malware infections are the biggest information security concern amongst healthcare providers, as revealed by KPMG.   A recent Freedom of Information (FoI) request revealed that 88 NHS trusts out of 260 across England, Scotland ... Read More »

Why advanced threat protections are the key to outsmarting the next ransomware attack

Mark Weir, Regional Director UK & I,

The most prevalent cybersecurity concern in 2017 is undeniably ransomware, this year has seen it reassert itself into the public eye in a big way. The WannaCry attack in May was one of the largest ransomware attacks ever, affecting more than 300,000 computers running Microsoft Windows worldwide. What’s more the attack hit a huge range of public and private organisations. ... Read More »

Pentagon tests tablet access to secret classified documents

The Pentagon has expanded a pilot program to allow some top officials to access documents with a ‘secret’ classification using 8-inch tablets. The move follows a similar program that gave some officials access to both ‘secret’ and ‘top secret’ classified documents on smartphones. With this program, the government hopes to make it easier for these individuals to access data when ... Read More »

US DOJ publishes guidelines for setting up a vulnerability disclosure program

Instituting a vulnerability disclosure program (aka bug bounty program) that won’t blow up in the organization’s face can be a daunting task. Some will prefer to enlist outside experts to advise them on how to do it, and others will want to rely on their own IT or security department. For the latter, here’s some good news: the US Department ... Read More »