Posts

Gas pipeline

Atlanta 2 weeks later

Re: With paper and phones, Atlanta struggles to recover from cyber attack

With paper and phones, Atlanta struggles to recover from cyber attack

Atlanta ransom ware

The grid

911

Atlanta

Cryptocurrency Hacking Raises Threats of Financial Vulnerability

Here's a List of 29 Different Types of USB Attacks

Germany Says Hackers Infiltrated Main Government Network

Cyberattacks Put Russian Fingers on the Switch at Power Plants, US Says

Detroit Free Press: Audit: State of Michigan computer systems are vulnerable to attack

Cert

Dragonfly: Western energy sector targeted by sophisticated attack group | Symantec Blogs

Cyberattacks Put Russian Fingers on the Switch at Power Plants, US Says

Explosive hack

Cyberthreats: The Vexing New Front in Modern Warfare

BBC News: The tactics of a Russian troll farm

The money in malware!

https://www.computing.co.uk/ctg/news/3026422/hacke...

How a Tiny Startup Became the Most Important Hacking Shop You've Never Heard Of

Fwd: test

Fwd: [New post] Is Blockchain right for your business?

Researchers find new flaw in Oracle

AMD will Spectre-proof the Zen 2 architecture, and 4 other nuggets from its earnings call

Intel's Never-Ending Spectre Saga Continues to be a Hot Mess

The Coincheck hack and the issue with crypto assets on centralized exchanges

ATM makers warn of 'jackpotting' hacks on US machines

Russia could cause ‘thousands and thousands’ of deaths through energy grid attack | E&T Magazine

Chrome attack

Meltdown echoes

Blokchain attack

Re: App SIP App shared by Ken Hh

Intel chip security fix could permanently slow down PCs by up to 30 per cent | E&T Magazine

We all need some of this....

Trust must always be minimal and subject to scientific proof through lambda-calculus and Church-Turing machinery implemented in hardware. K J HAMER-HODGES....E.G. Rutkowska: Trust Makes Us Vulnerable

Security industry needs to be less trusting to get more secure • The Register Forums

Apple releases patch for catastrophic security flaw in MacOS 10.13 | Computing

GDPR: What will happen in the first 72 hours after a data breach? | Computing

Re: [Caja] WASM and ocaps

BBC News: Artificial intelligence smart enough to fool Captcha security check

The KRACK Wi-Fi vulnerability, explained like you're five

Cat theory

MarketWatch: Opinion: The cyberwars are coming — here’s how to prepare (and make money)

Marketplace APM: 10/12/2017: A computer science "genius" on why we haven't fixed cybersecurity

Engadget: 37,000 Chrome users downloaded a fake Adblock Plus extension

Re: Unit 42 Threat Intelligence ALERT

Re: App VJ Foot Spa shared by Ken Hh

Sec hack

Play Store malware

Cost of Ransom ware attack on FedEx

Reuters: Exclusive: U.S. Homeland Security found SEC had 'critical' cyber weaknesses in January

Reuters | Homeland Security detected five critical cyber security weaknesses in SEC's computers in January: confidential report

Equifax data breach

Malware in trusted downlod

Piggy back hacking

Nothing can be trusted!

Cybersecurity Incident & Important Consumer Information | Equifax

The hidden history of cyber-crime forums - BBC News

Equifax data breach

The Next Web: Google made a tiny error and it broke half the internet in Japan

Wikileaks Vault 7: CIA backdoored software updates to spy on allies | Computing

How A Hoax Made To Look Like A Guardian Article Made Its Way To Russian Media

When it all kicks off: What happens at a security firm when a global malware outbreak occurs?

Elon Musk just made Microsoft Azure 100% cooler by association

DNA attack

Doctor Opens Fire at Bronx Hospital, Killing Woman and Wounding 6 Others

Facebook now has 2 billion monthly users…and responsibility

Seven Things You Must Anticipate For The 2017 Solar Eclipse

Massive cyberattack hits Europe with widespread ransom demands

Blame game for cyber attacks grows murkier as spying, crime tools mix | Reuters

Blame game for cyber attacks grows murkier as spying, crime tools mix | Reuters

Cyber Threats 101: Fileless Attacks (The Stealthiest of All) - Infosecurity Magazine

Ponzi Scheme Meets Ransomware for a Doubly Malicious Attack - NYTimes.com

Blame game for cyber attacks grows murkier as spying, crime tools mix | Reuters

Cyber attack eases, hacking group threatens to sell code | Reuters

NHS cyber-attack causing disruption one week after breach | Society | The Guardian

NYTimes.com: Hackers Hide Cyberattacks in Social Media Posts

British Airways vows 'never again' after costly IT collapse

Microsoft issues 'highly unusual' Windows XP patch to prevent massive ransomware attack

Hacking Attack Has Security Experts Scrambling to Contain Fallout

Europol: Ransomware attack is of unprecedented level

Status report: Windows 10 Creators Update at one month old

Cyber executive order a reasonable step forward, yet more remains to be done

Ukrainian military compromised by Trojanised targeting app on soldiers' smartphones | Computing

Qubes OS plans commercial versions, team expansion

Cherokee, NC

UK rail network hit by multiple cyber attacks last year

Cyber attacks cost UK business more than £34bn a year, study shows

Google hopes cryptography will protect Chrome browsers from quantum computer attacks : Tech : Yibada

WIRED: Clever Attack Uses the Sound of a Computer’s Fan to Steal Data

Google is fighting future hackers with post-quantum cryptography

FBI Warns Nation-State Cyber Attacks Are Continuing

Fwd: Reuters: How a hacker's typo helped stop a billion dollar bank heist

Fwd: Reuters: How a hacker's typo helped stop a billion dollar bank heist

What's the point of secure software if you can't trust your CPU? - Computing. This is exactly the reason the PP 250 instruction set was built to guarantee security in hardware

Exclusive: Inside the ProtonMail siege: how two small companies fought off one of Europe's largest DDoS attacks - TechRepublic

Fwd: [cap-talk] [friam] Re: UX resources for object capabilities