Feds Raid Apartment of Suspected CIA Leaker, Find 10,000 Images of Child Porn

Former CIA and NSA agent Joshua Schulte is being prosecuted on child porn-related charges, but not on charges related to allegedly leaking the “Vault 7” hacking tools to Wikileaks. Continue reading Feds Raid Apartment of Suspected CIA Leaker, Find 10,000 Images of Child Porn

6 Best Practices to Avoid Leaks in 2018

One of the most dangerous threats to your business in 2018 is a data leak. Hackers can sell your information on the black market or simply destroy it. This could ruin your business overnight if you are not careful. So, you should use the best practices… Continue reading 6 Best Practices to Avoid Leaks in 2018

Facebook Archives Predictive Name: Some Found Online

Facebook is in the news for a few days after the disclosure of the Cambridge Analytica scandal. A few days ago, another wave of rumours revealed that the Facebook app could collect your private data. Facebook denied and a ping-pong game started. Is it true or false? The fact is

[The post Facebook Archives Predictive Name: Some Found Online has been first published on /dev/random]

Continue reading Facebook Archives Predictive Name: Some Found Online

How a Low-Level Apple Employee Leaked Some of the iPhone’s Most Sensitive Code

This is how a small group of friends lost control of the leaked iBoot source code. The story behind one of Apple’s most embarrassing leaks. Continue reading How a Low-Level Apple Employee Leaked Some of the iPhone’s Most Sensitive Code

Bromium Response: Intel CPU Design Flaw Creates Work for Everyone

The design flaw has been in existence for the last decade and does not affect Bromium. Operating system vendors are the only ones who can remediate the vulnerability. The Microsoft patch – out today – requires Bromium customers to upgrade b… Continue reading Bromium Response: Intel CPU Design Flaw Creates Work for Everyone

More Than 120 Malware Detections Triggered on NSA Employee’s Computer

Kaspersky Lab has concluded an internal investigation into an incident that led to the company being accused of using its antivirus program to copy secret files from the personal computer of an NSA employee. The company believes it has identified the incident in its logs, but telemetry data revealed more than 120 malware detections on..

The post More Than 120 Malware Detections Triggered on NSA Employee’s Computer appeared first on Security Boulevard.

Continue reading More Than 120 Malware Detections Triggered on NSA Employee’s Computer

Japanese businesses are the latest victims of attacks disguised as ransomware

A sustained ransomware campaign aimed at extorting Japanese companies now appears to have been part of an elaborate cyber espionage operation that included destroying data to conceal evidence, according to Israeli cybersecurity firm Cybereason. Based on malware analysis and other technical indicators discovered on victims’ networks, Cybereason concluded the two-part virus, dubbed “MBR-ONI,” was specially designed to target specific Japanese organizations in order to steal data during a certain timeframe. While the infections first appeared to be limited to conventional, cybercrime-related ransomware, further inspection by Cybereason revealed hidden commands were taking place behind the scenes, including a script that wiped Windows event logs. “We suspect that the ONI ransomware was used as a wiper to cover up an elaborate hacking operation,” a blog post published Tuesday by the company reads. “These targeted attacks lasted between three to nine months and all ended with an attempt to encrypt hundreds of machines at […]

The post Japanese businesses are the latest victims of attacks disguised as ransomware appeared first on Cyberscoop.

Continue reading Japanese businesses are the latest victims of attacks disguised as ransomware