You are here:-Tag:Darkmatters

Five Weakest Links in Cybersecurity That Target the Supply Chain

By | 2018-09-14T19:15:52+00:00 September 14th, 2018|Categories: Vulnerabilities | Alerts | Solutions|Tags: , |

Third-party breaches have become an epidemic as cybercriminals target the weakest link. Organizations such as BestBuy, Sears, Delta and even NYU Medical Center are just a few that have felt the impact of cyberattacks through third-party vendors. The fallout from these breaches can be costly, as the average enterprise pays $1.23 million per

DEF CON 2018: Hacking Medical Protocols to Change Vital Signs

By | 2018-08-12T07:17:12+00:00 August 12th, 2018|Categories: Vulnerabilities | Alerts | Solutions|Tags: , |

LAS VEGAS – In recent years there has been more attention paid to the security of medical devices; however, there has been little security research done on the unique protocols used by these devices. Many of the insulin pumps, heart monitors and other gadgets found in hospital rooms use aging protocol to communicate

Comments Off on DEF CON 2018: Hacking Medical Protocols to Change Vital Signs

Emotet Malware | US-CERT

By | 2018-07-20T22:24:00+00:00 July 20th, 2018|Categories: Vulnerabilities | Alerts | Solutions|Tags: , , , , |

Emotet continues to be among the most costly and destructive malware affecting SLTT governments. Its worm-like features result in rapidly spreading network-wide infection, which are difficult to combat. Emotet infections have cost SLTT governments up to $1 million per incident to remediate.Emotet is an advanced, modular banking Trojan that primarily functions as a

Comments Off on Emotet Malware | US-CERT

Newsmaker Interview: Scott Helme on Securing the Web

By | 2018-07-11T21:59:53+00:00 July 11th, 2018|Categories: Vulnerabilities | Alerts | Solutions|Tags: , |

Scott Helme, the well-known security researcher, international speaker and the founder of the securityheaders.com and report-uri.com free tools for web security, has devoted himself to improving the security environment of the internet for the past decade. Threatpost sat down with Helme to discuss the state of web security, particularly on the encryption front

Comments Off on Newsmaker Interview: Scott Helme on Securing the Web

Bug Bounty Programs Turn Attention to Data Abuse | Threatpost

By | 2018-07-02T05:01:06+00:00 July 1st, 2018|Categories: Vulnerabilities | Alerts | Solutions|Tags: , |

More companies – particularly social media firms – may follow Facebook’s footsteps in turning to bug bounty programs to scout out any data privacy abuse on their platforms, experts say. On the heels of Facebook’s Cambridge-Analytica scandal in March, the social media giant launched a “Data Abuse Bounty Program” in an attempt to

Comments Off on Bug Bounty Programs Turn Attention to Data Abuse | Threatpost

MacOS Malware Targets Crypto Community on Slack, Discord | Threatpost

By | 2018-07-02T03:25:40+00:00 July 1st, 2018|Categories: Vulnerabilities | Alerts | Solutions|Tags: , |

Hackers using MacOS malware are targeting cryptocurrency investors that use both the Slack and Discord chat platforms. The malware, dubbed OSX.Dummy, uses an unsophisticated infection method, but those who are successfully attacked open their systems up to remote arbitrary code execution. “If the connection to the attacker’s C&C server succeeds, the attacker will

Comments Off on MacOS Malware Targets Crypto Community on Slack, Discord | Threatpost

EFF Sues to Repeal Controversial Online Sex Trafficking FOSTA Law | Threatpost

By | 2018-06-30T03:40:59+00:00 June 29th, 2018|Categories: Vulnerabilities | Alerts | Solutions|Tags: , |

The Electronic Frontier Foundation on Thursday announced it is suing to invalidate a recently passed law that is meant to fight online sex trafficking. The Allow States and Victims to Fight Online Sex Trafficking Act of 2017 (FOSTA), which was passed 97-2 by Congress in March and signed into law in April, is

Comments Off on EFF Sues to Repeal Controversial Online Sex Trafficking FOSTA Law | Threatpost

Rowhammer Variant ‘RAMpage’ Targets Android Devices All Over Again | Threatpost

By | 2018-06-30T01:58:52+00:00 June 29th, 2018|Categories: Vulnerabilities | Alerts | Solutions|Tags: , |

Researchers have found a new variation of the Rowhammer attack technique they have dubbed RAMpage. The vulnerability could allow an adversary to create an exploit to gain administrative control over targeted Android smartphones and tablets. The flaw impacts Android devices dating back to 2012. RAMpage follows a string of Rowhammer variants that have

Comments Off on Rowhammer Variant ‘RAMpage’ Targets Android Devices All Over Again | Threatpost

Norwegian Agency Dings Facebook, Google For “Unethical” Privacy Tactics | Threatpost

By | 2018-06-29T05:58:29+00:00 June 28th, 2018|Categories: Vulnerabilities | Alerts | Solutions|Tags: , |

While GDPR is forcing large data-crushing service providers to be transparent around data collection and usage, some are still employing a number of tactics to nudge end users away from data privacy. That’s what the Norwegian Consumer Council said in an in-depth report, released Wednesday, which  says that providers like Facebook and Google

Comments Off on Norwegian Agency Dings Facebook, Google For “Unethical” Privacy Tactics | Threatpost

Rewards Points Targeted by Teens in Hack of 500K Accounts | Threatpost

By | 2018-06-29T04:26:38+00:00 June 28th, 2018|Categories: Vulnerabilities | Alerts | Solutions|Tags: , |

A pair of Russian teens have been arrested for infiltrating more than a half-million online accounts, in particular targeting services that offer rewards points. Russian authorities at the Ministry of Internal Affairs said in an announcement Wednesday that the duo came to their attention in late 2015, when they carried out a large-scale “dictionary

Comments Off on Rewards Points Targeted by Teens in Hack of 500K Accounts | Threatpost