Home » Archives by category » Headlines (Page 2)

China hackers swipe millions in data breach

A big Wall Street technology firm is being sued after allegedly falling for a run-of-the-mill email scam and wiring client funds to hackers. SS&C Technologies, a $6 billion market capitalization company that bills itself as “the most comprehensive powerhouse of software technology in the financial services industry,” was duped by China-based hackers who sent sloppy emails to company staffers in order to trick them into releasing client money, according to a complaint. And that, now, has taken Tillage Commodities Fund offline temporarily. The investor has suspended business operations after nearly $6 million…

FBI says foreign hackers penetrated state election systems

The FBI has uncovered evidence that foreign hackers penetrated two state election databases in recent weeks, prompting the bureau to warn election officials across the country to take new steps to enhance the security of their computer systems, according to federal and state law enforcement officials. The FBI warning, contained in a “flash” alert from the FBI’s Cyber Division, a copy of which was obtained by Yahoo News, comes amid heightened concerns among U.S. intelligence officials about the possibility of cyberintrusions, potentially by Russian state-sponsored hackers, aimed at disrupting the November…

Cyber threats on FERC’s radar, commissioner says

The growing number of cyber threats to the nation’s electric grid are at the forefront of the Federal Energy Regulatory Commission’s mind these days, FERC Commissioner Cheryl LaFleur told Bloomberg BNA in an exclusive interview. “The difficulty is that the threats are evolving very, very rapidly. I don’t think I knew what ransomware was six months ago, and now it’s all over the press. There seem to be constant new words of new types of cyber incursions, and the standards process is not nimble enough to continually adapt to all of…

Meet USBee, the malware that uses USB drives to covertly jump airgaps

In 2013, a document leaked by former National Security Agency contractor Edward Snowden illustrated how a specially modified USB device allowed spies to surreptitiously siphon data out of targeted computers, even when they were physically severed from the Internet or other networks. Now, researchers have developed software that goes a step further by turning unmodified USB devices into covert transmitters that can funnel large amounts of information out of similarly “air-gapped” PCs. The USBee—so named because it behaves like a bee that flies through the air taking bits from one place…

FBI’s Comey: Hillary Clinton not ‘sophisticated enough’ to understand classified markings

FBI Director James Comey said Thursday that former Secretary of State Hillary Clinton may not have been “sophisticated enough” to understand the classified markings on emails she sent and received, which explains why did didn’t know she was breaking the letter of the law. Under intense questioning from Republicans, Mr. Comey said Mrs. Clinton’s public explanations of her behavior were not true. But he said his investigators couldn’t find evidence that Mrs. Clinton intended to break the law, which he said is the key to making a criminal case. “I know that…

Guccifer never hacked Clinton email server, FBI director says

Hillary Clinton’s personal server was never breached by the Romanian computer hacker known as “Guccifer,” FBI Director James Comey said Thursday, contradicting previous claims that had prompted heightened concerns over the former secretary of state’s unorthodox email setup. Testifying before the House Oversight Committee, Mr. Comey acknowledged that the hacker was indeed interviewed by the FBI while authorities conducted their investigation into the presumptive presidential nominee’s contentious email configuration. Contrary to claims made to the media, however, the hacker failed to access Mrs. Clinton’s server, Mr. Comey revealed. “Can you confirm that…

Taking aim at cyber attackers

Cybersecurity today is less about stopping adversaries from breaching networks and more about damage control once they get in, an adjustment that has government and businesses embracing a new trend that merges security and big data. This confluence gives rise to a growing practice called threat hunting, the act of aggressively going after cyber adversaries rather than waiting to learn they have breached security perimeters. While growing in popularity, a recent survey of security experts notes that a significant portion of threat hunting is still being performed ad hoc, negating benefits of…

Hackers sold access to 170,000 compromised servers, many in the U.S.

The market for hacked servers might be much larger than previously thought, with new evidence suggesting that hackers sold access to over 170,000 compromised servers since 2014, a third of them located in the U.S. The new revelation comes from antivirus firm Kaspersky Lab, whose researchers reported last week that a black market website called xDedic was selling remote access to more than 70,000 compromised servers for as little as $6. Following the report, a user with the moniker AngryBirds shared several Pastebin lists of IP addresses along with dates that allegedly…