-
December 6, 2013
The Internet of Everything, Including Malware
The Internet of Everything, Including Malware: We are witnessing the growth of the Internet of Everything (IoE), the network of embedded physical objects accessed through the Internet, and it’s connecting new devices to the Internet which may not traditionally have been there before. Unfortunately, some of these devices may be deployed with a security posture that may […]
-
December 6, 2013
Hack on JPMorgan website exposes data for 465,000 card holders
Hack on JPMorgan website exposes data for 465,000 card holders: JPMorgan Chase has warned 465,000 holders of prepaid cash cards that their personal information may have been obtained by hackers who breached the bank’s network security in July, according to a report published Thursday. JPMorgan issued the cards on behalf of corporations and government agencies, […]
-
December 5, 2013
PCI 3.0 special report: Reviewing the state of payment card compliance
PCI 3.0 special report: Reviewing the state of payment card compliance: It’s been three years in the making. The third iteration of the Payment Card Industry Data Security Standard, arguably enterprise information security’s most important and successful mandate, updates the rules merchants must follow to protect customer payment card data. PCI DSS 3.0 raises the […]
-
December 5, 2013
What IT Can Teach Utilities About Cybersecurity & Smart Grids
What IT Can Teach Utilities About Cybersecurity & Smart Grids: Protecting smart grids from cyber attack is a popular conversation in information security circles. But the threats are far worse than generally believed.There is a perception within IT circles that cybersecurity threats against critical infrastructure like smart grids are a problem waiting to happen — […]
-
December 5, 2013
Korea expert: Cyberconflict likely to escalate
Korea expert: Cyberconflict likely to escalate: North Korea is likely to escalate its cyberattacks on South Korea in the coming years in an effort to convince its southern neighbor to back off demands to limit its nuclear program, a Korea expert predicted. After a series of cyberattacks beginning in 2008, North Korea will continue to […]
-
December 5, 2013
Worm may create an Internet of Harmful Things, says Symantec (Take note, Amazon)
Worm may create an Internet of Harmful Things, says Symantec (Take note, Amazon): The Hitchcockian plotlines are endless. Replace The Birds with flying Amazon delivery drones. Or imagine, as researchers did recently at Black Hat, someone hacking your connected toilet, making it flush incessantly and closing the lid repeatedly and unexpectedly. With those visions in […]
-
December 5, 2013
Riyadh, Tel Aviv Cooperating to Sabotage Iran’s N. Program
Riyadh, Tel Aviv Cooperating to Sabotage Iran’s N. Program: “Saudi spy chief Prince Bandar bin Sultan bin Abdulaziz Al Saud and director of Israel’s Mossad intelligence agency Tamir Bardo sent their representatives to a meeting in Vienna on November 24 to increase the two sides’ cooperation in intelligence and sabotage operations against Iran’s nuclear program,” […]
-
December 5, 2013
Black Friday to Cyber Monday: Keeping Hackers From Having Their Day
Black Friday to Cyber Monday: Keeping Hackers From Having Their Day: Stores across the country were a mad house when Black Friday arrived, with throngs of shoppers showing up to take advantage of seasonal sales. Online, the customer rush is similar, though the security challenge businesses face takes on a different form. This year, according […]
-
December 5, 2013
Flying hacker contraption hunts other drones, turns them into zombies
Flying hacker contraption hunts other drones, turns them into zombies: Serial hacker Samy Kamkar has released all the hardware and software specifications that hobbyists need to build an aerial drone that seeks out other drones in the air, hacks them, and turns them into conscripted army of unmanned vehicles under the attacker’s control. Dubbed SkyJack, […]
-
December 5, 2013
Businesses Suffer An Average Of 9 Targeted Attacks Per Year
Businesses Suffer An Average Of 9 Targeted Attacks Per Year: Advanced persistent threat (APT)-style attacks may be even more pervasive than thought: organizations have suffered on average of nine such targeted attacks in the past 12 months, a new study finds. Even more chilling: nearly half of those organizations say the attackers successfully stole confidential […]