This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the Internet. In addition, we talk to Doug Levin, founder of the K12 cybersecurity resource center and advisor to the K12 Security Information Exchange, about how schools can plan for a cybersecure 2021.
Education faced a crisis in the US this year, a
Hackers: They’ll turn your computer into a BOMB!
“Hackers turning computers into bombs” is a now legendary headline, taken from the Weekly World News. It has rather set the bar for “people will murder you with computers” anxiety. Even those familiar with the headline may not have dug into the story too much on account of how silly
A group of hacktivists that goes online with the name Ghost Squad Hackers has defaced a site of the European Space Agency (ESA).
A group of hackers that goes online with the name Ghost Squad Hackers has defaced a site of the European Space Agency (ESA), https://business.esa.int/.
I have reached them for a comment and they told me that the atta
From protests and sit-ins to doxxing and distributed denial-of-service attacks, a new kind of activism rose in the ranks. In 1996, cyber-activism gained a reputation and was given a new name: hacktivism. Consisting of breaking into a computer system for political, social, religious, or anarchistic reasons, hackers began to wage a war on information.
Proven t
Cookies can do a lot more than just track your web browsing activity. Now it appears that hackers have found a way to steal your passwords too.
What are computer cookies?
A cookie is a tiny file that websites store on your computer. They are normally perfectly harmless – and quite useful too. In fact, many of the websites you use every day rely on cook
byLisa VaasKnow anything about North Korean hackers and their activities in cyberspace, past or ongoing?The US on Wednesday said that it’s got up to $5 million in Rewards for Justice money if you cough up useful details, which you can do here.The FBI and the Departments of State, Treasury, and Homeland Security (DHS) put out an advisory about the persi
Who is hacking the hackers? Experts from Cybereason a mysterious hackers group is targeting other hackers by spreading tainted hacking tools.
Experts from security firm Cybereason warn of a mysterious group of hackers that are distributing trojanized hacking tools on an almost daily basis for the past years.
These hacking tools are used by fellow hack
IOTA Foundation behind the IOTA cryptocurrency was forced to shut down its entire network following a cyber attack that resulted in the theft of funds.
Hackers have exploited a vulnerability in the official IOTA wallet to steal funds from the users. In response to the incident, the IOTA Foundation, the nonprofit organization behind the IOTA cryptocurrenc
Government-supported hackers tried to steal 12,000 Google credentials in 2019
Google’s Threat Analysis Group (TAG) revealed in a report that they distributed more than 12,000 warnings to users in nearly 150 countries that include the United States of America. The recipients were notified that they have been subject of state-sponsored phishing attempts.
Kaspersky Security Bulletin 2019. Advanced threat predictions for 2020
Cybersecurity of connected healthcare 2020: Overview and predictions
5G technology predictions 2020
Cyberthreats to financial institutions 2020: Overview and predictions
Moving to the cloud
The popularity of cloud services is growing, and threat actors are here to exploit the trend.
We
Someone recently asked me what I wanted for Christmas this year, and I had to think about it for a few minutes. I certainly don’t need any more stuff. However, if I could name one gift that would make me absolutely giddy, it would be getting a chunk of my privacy back.
Like most people, the internet knows way too much about me — my age, address, phone
Webcams may have been around for a long time, but that doesn’t mean we know what we’re doing with them. Webcam hacking has been around for equally as long, yet new research from Wizcase indicates that more than 15,000 private, web-connected cameras are exposed and readily accessible to the general public.
So forget hacking, cybercriminals can just take a str
Today organizations are struggling with the best way to protect against attacks that are targeting the endpoint.
Too often, the security strategy has been to put the onus on the individual employee.
Research has shown, over and over again, that training and user restrictions are both tedious and expensive, and have a very low success rate.
This is because c
Wireless chips are an increasingly important part of day-to-day life. We use contactless cards to pay for goods, they have replaced travel tickets, and many people even use embedded chips to access their offices at work.
But almost every chip required another plastic card – pretty soon you end up with a wallet full of contactless cards. Which is why some ind
Bluetooth is an important smartphone technology, allowing us to transfer files, or to listen to music, wirelessly. It’s so useful that many people leave it switched on all the time.
But researchers have discovered a vulnerability in the technology that allows hackers to take control of a victim’s phone remotely. Known as “BlueBorne”, the technique can be use