More Attacks against Computer Automatic Update Systems

Last month, Kaspersky discovered that Asus’s live update system was infected with malware, an operation it called Operation Shadowhammer. Now we learn that six other companies were targeted in the same operation. As we mentioned before, ASUS was not the only company used by the attackers. Studying this case, our experts found other samples that used similar algorithms. As in… Continue reading More Attacks against Computer Automatic Update Systems

More Attacks against Computer Automatic Update Systems

Last month, Kaspersky discovered that Asus’s live update system was infected with malware, an operation it called Operation Shadowhammer. Now we learn that six other companies were targeted in the same operation. As we mentioned before, ASUS was not the only company used by the attackers. Studying this case, our experts found other samples that used similar algorithms. As in… Continue reading More Attacks against Computer Automatic Update Systems

Financial Cyber Threats: 10 Cases of Insider Bank Attacks

With most breaches in financial institutions attributed to employees, not hackers, what risks do banks really face from their own staff? Find out here
The post Financial Cyber Threats: 10 Cases of Insider Bank Attacks appeared first on Security Bouleva… Continue reading Financial Cyber Threats: 10 Cases of Insider Bank Attacks

"Insider Threat" Detection Software

Notice this bit from an article on the arrest of Christopher Hasson: It was only after Hasson’s arrest last Friday at his workplace that the chilling plans prosecutors assert he was crafting became apparent, detected by an internal Coast Guard program that watches for any "insider threat." The program identified suspicious computer activity tied to Hasson, prompting the agency’s investigative… Continue reading "Insider Threat" Detection Software

El Chapo’s Encryption Defeated by Turning His IT Consultant

Impressive police work: In a daring move that placed his life in danger, the I.T. consultant eventually gave the F.B.I. his system’s secret encryption keys in 2011 after he had moved the network’s servers from Canada to the Netherlands during what he told the cartel’s leaders was a routine upgrade. A Dutch article says that it’s a BlackBerry system. El… Continue reading El Chapo’s Encryption Defeated by Turning His IT Consultant

How Criminals Recruit Telecom Employees to Help Them Hijack SIM Cards

Sources who work for some of America’s major cellphone carriers tell us how criminals are trying to recruit them to get help hacking victims. Continue reading How Criminals Recruit Telecom Employees to Help Them Hijack SIM Cards

Intimate Partner Threat

Princeton’s Karen Levy has a good article computer security and the intimate partner threat: When you learn that your privacy has been compromised, the common advice is to prevent additional access — delete your insecure account, open a new one, chang… Continue reading Intimate Partner Threat

Intimate Partner Threat

Princeton’s Karen Levy has a good article computer security and the intimate partner threat: When you learn that your privacy has been compromised, the common advice is to prevent additional access — delete your insecure account, open a new one, change your password. This advice is such standard protocol for personal security that it’s almost a no-brainer. But in abusive… Continue reading Intimate Partner Threat