Email
Password
Remember meForgot password?
    Log in with Twitter

Cyberattack News

Q&A: Former NSA Chinese espionage expert details cyber-threats Special

Charity Wright, former NSA Chinese espionage expert, and current threat researcher with global threat intelligence firm, IntSights, has released a new analysis on Chinese influencer campaigns. Charity shares with Digital Journal the main findings.

Q&A: Delving into Accenture's 2019 Cyber Threatscape Report Special

Accenture Security iDefense has released its 2019 Cyber Threatscape Report, which provides annual analysis into the main threats influencing the cyber landscape. Accenture's Howard Marshall provides some analysis for Digital Journal.

Q&A: Huge increase in cyber attacks against colleges reported Special

Cyberattacks against colleges and universities are increasing dramatically, and school officials are often completely unprepared to deal with these attacks. A security expert at Jenzabar, provides some insight.

North Korean spear-phishing campaign attacks U.S. firms Special

Several U.S. businesses have been targeted by a campaign seemingly to originate from North Korea and using the tactic of spear-phishing. The cyber-assault is sophisticated, using legitimate documents as the targets. Alexander García-Tobar explains more.

Report: Digital extortion schemes are soaring Special

Digital extortion schemes have increased by 319 percent, according to a new report released by Trend Micro. Of these, business email compromise remains a major threat, with detections jumping 52 percent, as Greg Young reveals.

Are IoT attacks on Internet-connected gas pumps imminent? Special

Reports suggests that Internet-connected gas pumps could be at risk from cyberattacks, with information appearing in discussion forums about how hackers are contemplating disrupting this part of the energy system. Eve Maler of ForgeRock weighs in.

New vulnerabilities with Uber and Instagram identified Special

Two stories have appeared which demonstrate severe vulnerabilities affecting Instagram and Uber. Both of these require a rapid response in order to protect users of the services, as expert Vinay Sridhara explains.

Interview: The consultant who discovered Cisco’s FTD Bug Special

A vulnerability in Cisco's Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive, private data. We speak to the man who discovered the issue.

Monster.com user resumes found exposed online Special

A misconfigured cloud server is thought to be behind a database containing resumes from job seekers, many from the recruitment site Monster Worldwide Inc., being found exposed online.

Android 10 promises increased security, but there are risks Special

A leading security expert explains why the release will still leave security issues, some of which is tied to the behaviors of late adopters.

Looking behind the tweet: Dorsey hack explained Special

Twitter CEO Jack Dorsey was recently hacked on his own platform. New information that the hacker or hackers leveraged a SIM swapping tactic has come to light. A leading expert explains how this has happened and how to address the security weakness.

Q&A: In a cloud-connected world, cybersecurity is key Special

Cloud computing is becoming a critical tool for business, in terms of storing an assessing data. With the increases use of the cloud comes greater security risks. A leading expert assesses the solutions.

Q&A: How companies can improve cybersecurity through gamification Special

To help protect businesses from cyberattacks and to change the workplace culture, some business have adopted gamification as a means to engage employees. Gaurav Banga of Balbix explains how gamification can be successfully implemented.

Cyberattack creates crime scene backlog

A cyberattack on a leading company that performs forensic science analysis - Eurofins Scientific - has led to a backlog of 20,000 forensic samples, delaying police operations and criminal justice cases.

Vermont develops action plan for tackling cybersecurity issues

Montpelier - The demand for cybersecurity talent is at an all-time high and supply struggles to keep pace. To address this, Vermont, a U.S. state of fewer than 650,000 people, is tackling this cybersecurity skills shortage in novel ways.

Global security concerns reach record high

According to the 2019 Unisys Security Index, a long running snapshot of consumer security concerns conducted globally, global security concern has increased to the highest level in 13 years of the Unisys Security Index.

Data breach at cloud solution provider PCM

Cloud provider PCM has been hacked with customer information stolen in relation to a gift card scam. The hack happened in May 2019, although it has just been revealed after being flagged by KrebsOnSecurity.

Revealed: The biggest cybersecurity breaches of past three years

A new report from Bitglass examines the biggest data breaches affecting companies from the last three years. This includes the Marriott breach of 2018, the Equifax breach of 2017 and the Yahoo! breach of 2016.

Army cuts power to large military base to simulate cyberattack

Last week, the U.S. Army's largest military base, Fort Bragg in North Carolina was purposely plunged into darkness for 12 hours. This was done to “determine the readiness and resiliency of the installation in a real-world scenario."

Why leading the cyber battle needs better people, not technology

Cyber threats are part and parcel of everyday business life. Better technology can, to a degree, help to combat the daily hacking and phishing threats. However, the key to a joined-up strategy is people, according to a leading expert.

Q&A: Report on how phishing got personal Special

Q4 2018 proved to be one of the biggest influxes of phishing attacks on enterprises ever, displaying the ease with which criminals can access, acquire and execute attacks across platforms. A leading expert offers advice to businesses.

New international standard to reduce cyber-attacks on machinery

Smart industry requires smart machinery and technology. Cyberattacks pose a risk to such systems, not only in terms of the Internet of Things but to individual machines. A new standard aims to provide guidance.

Largest public data breach by volume revealed

The biggest ever data breach has been reported, in terms of the volume of data exposed. Dubbed 'Collection #1', the data loss extends to 772,904,991 unique emails and 21,222,975 unique passwords having been exposed.

Q&A: Fortune 500s are turning to academics for cybersecurity Special

Fortune 500 companies are fighting huge security and privacy hurdles by harnessing ‘super radical math’ developed by cryptography expert Professor Nigel Smart. The academic explains his approach and how it can help.

IT security-focused predictions for 2019

Consultants Trend Micro predict the biggest upcoming technology trends expected to have an impact on security. A special summary of these predictions have been provided to Digital Journal readers.

Major security gaps in cryptocurrency exchanges

Research conducted by Dr. Vidy Potdar has found that nearly every exchange has massive security flaws in both their password protocols and their HTTP security protocols.

Why business have mixed reactions to cyberattacks

The extent that businesses are taking cyberattacks seriously is mixed and the level of response relates to the form of the attack (or perceived risk), according to a new study from Canada.

Op-Ed: A look back at the year of the Facebook scandals

Facebook has not had a good year, and least from the perspective of its users and the public at large. Crowning this was the involvement with Cambridge Analytica, but there have been other data privacy issues too.

Why time matters when dealing with cyber threats

IT professionals are engaged in a continuous arms race with threat actors. In relation to vulnerabilities, this arms race is between attackers' access to exploits and defenders' ability to assess, remediate and mitigate them.

BlackBerry bounces back as a cybersecurity consultancy

BlackBerry may still be associated with the first wave of smartphones, However the Canadian company has had more success recently with system security services and products.
  1 2 3 4 Next»

Set up a news alert for

Cyberattack


Cyberattack Image

Untitled
Philippe HUGUEN, AFP/File
Three men have pleaded guilty to US charges stemming from the Mirai botnet attacks that shut down pa...
Three men have pleaded guilty to US charges stemming from the Mirai botnet attacks that shut down parts of the internet last year
DAMIEN MEYER, AFP/File
Deloitte confirmed a data breach caused by an email admin account left without two-factor authentica...
Deloitte confirmed a data breach caused by an email admin account left without two-factor authentication enabled
Pixabay / Pexels
Untitled
absentmindedprof
U.S. Cyber Command
U.S. Cyber Command
DOD

Latest News
Top News