A Romanian woman has pleaded guilty in connection with a ransomware attack against over 125 surveillance cameras in Washington DC ahead of the 2017 presidential inauguration. Demanding a payment of $60,800 in Bitcoin for restored access to the machines, the hackers were foiled by police IT departmen...
Posts Tagged: cyber-attack
“At a time when Washington is cautiously hopeful of a breakthrough in its long-troubled relations with Pyongyang, senior US officials are making strong allegations about the regime’s cyber crimes.In early September, The US Justice Department published a criminal complaint against a North Korean ...
Disruptions caused by natural disasters make organizations more vulnerable to cyberattacks, a reality that has many companies scrambling to ensure asset security as Hurricane Florence forces them to move computers, switch to backup networking equipment, and other non-routine practices that provide w...
Researchers have published details on the recent British Airways hack, connecting it to a criminal network active since 2015. The group is otherwise known for taking advantage of websites that have failed to secure payment data entry forms and skimming data submissions. The British Airways attack, h...
“The damage that most military weapons do is irreversible. When a gun fires and a bullet strikes a target, it’s impossible to bring a life back from the dead. But experts say that cyber weapons, which are reversible, can be even more effective precisely because their consequences can be mitigate...
President Trump has reversed rules governing the protocols for U.S. cyberattacks. The move gives the Pentagon greater freedom to deploy advanced cyber operations without approval from the State Department and the intelligence community. Previous regulations required multi-agency approval for cyber o...
Cyber thieves stole $13.5 million by using malware to withdraw cash in 14,849 transactions in 28 countries, all within 2 hours. The malware attack redirected payments to a proxy switching system responsible for processing payment requests. This proxy approved the fraudulent requests. Police are purs...
“It’s tempting think of fax machines as a relic, every bit as relevant as an eight-track tape. But fields like health care and government still rely on faxes every day. Even your all-in-one printer probably has a fax component. And new research shows that vulnerabilities in that very old tech...