Home » Archives by category » Headlines (Page 3)

Guccifer never hacked Clinton email server, FBI director says

Hillary Clinton’s personal server was never breached by the Romanian computer hacker known as “Guccifer,” FBI Director James Comey said Thursday, contradicting previous claims that had prompted heightened concerns over the former secretary of state’s unorthodox email setup. Testifying before the House Oversight Committee, Mr. Comey acknowledged that the hacker was indeed interviewed by the FBI while authorities conducted their investigation into the presumptive presidential nominee’s contentious email configuration. Contrary to claims made to the media, however, the hacker failed to access Mrs. Clinton’s server, Mr. Comey revealed. “Can you confirm that…

Taking aim at cyber attackers

Cybersecurity today is less about stopping adversaries from breaching networks and more about damage control once they get in, an adjustment that has government and businesses embracing a new trend that merges security and big data. This confluence gives rise to a growing practice called threat hunting, the act of aggressively going after cyber adversaries rather than waiting to learn they have breached security perimeters. While growing in popularity, a recent survey of security experts notes that a significant portion of threat hunting is still being performed ad hoc, negating benefits of…

Hackers sold access to 170,000 compromised servers, many in the U.S.

The market for hacked servers might be much larger than previously thought, with new evidence suggesting that hackers sold access to over 170,000 compromised servers since 2014, a third of them located in the U.S. The new revelation comes from antivirus firm Kaspersky Lab, whose researchers reported last week that a black market website called xDedic was selling remote access to more than 70,000 compromised servers for as little as $6. Following the report, a user with the moniker AngryBirds shared several Pastebin lists of IP addresses along with dates that allegedly…

Five security threats to watch out for this summer

It’s summertime, and that means some much-needed vacation for most of us out there. But with people out of the office and working from remote locations more often, they’re likely to let their guard down, increasing the risk of data breach incidents. From malware to hackers to malicious insiders to data thieves, there’s no shortage of security concerns. “Cybercriminal organizations don’t take summer vacations, and many employees just don’t realize the security risks they are taking,” said Usman Choudhary, chief product officer at ThreatTrack Security. “Criminals understand the seasonality of consumer…

People go to extreme lengths to protect their devices – but do not understand the threats

There are 3.2 billion people across the world with a connection to the internet, up from 2.9 billion in 2014, but many online users are not cyber savvy at all. Many users do not use the correct methods to keep them safe online. Multiple research studies and ‘Are you cyber savvy?’ quizzes carried out by cyber security company Kaspersky Lab show that not enough users are aware of the risks. Full story…… Read More

Slicing into a point-of-sale botnet

Last week, KrebsOnSecurity broke the news of an ongoing credit card breach involving CiCi’s Pizza, a restaurant chain in the United States with more than 500 locations. What follows is an exclusive look at a point-of-sale botnet that appears to have enslaved dozens of hacked payment terminals inside of CiCi’s locations that are being relieved of customer credit card data in real time. Over the weekend, I heard from a source who said that since November 2015 he’s been tracking a collection of hacked cash registers. This point-of-sale botnet currently includes…

Google Dorking: Exposing the hidden threat

Virtually everyone uses Google or other search engines, but what most people don’t know is that these search engines can perform advanced queries that are exploited to carry out successful cyberattacks. For example, earlier this year, a cyberattack by suspected Iranian hackers made headlines when they used a simple technique called Google Dorking to access the computer system that controlled a water dam in New York. Google Dorking is readily available and has been used by hackers for many years to identify vulnerabilities and sensitive information accessible on the Internet. Since its…

Botnet detection advances with use of Big Data analysis

Steven Wilson, who has lead the European Cybercrime Center at Europol since January of this year, knows cybercriminals. According to Europol, he is a 30-year veteran of Police Scotland and oversaw all cyber-related crime investigations. Europol has recently fought malicious actors with botnet detection techniques. The organization was part of the group that took down Dorkbot in December 2015, according to an official agency press release.
How Botnet Detection Affects Cybercriminals Wilson has seen how cybercriminals are adapting to the latest law enforcement efforts. At the recent International Conference on Big Data…