Source: National Cyber Security – Produced By Gregory Evans Security expert says these types of attacks are likely to become more common. EHRs and other hospital IT systems could face dramatic new risks. In what some are calling the biggest distributed denial-of-services attack ever seen, a botnet comprising thousands The…
Connected devices need e-commerce standard security say cyber security experts
Source: National Cyber Security – Produced By Gregory Evans Cambridge, UK – July 20, 2016: Billions of connected devices are potentially at risk unless security sensitive software can be managed to an e-commerce standard, according to a group of leading technology security experts. The companies, including ARM, Intercede, Solacia and…
Wearable devices can leak PINs
Source: National Cyber Security – Produced By Gregory Evans With the uproar over mobile biometrics lately, some would say consumers are better off with PINs and passwords. But a recent study found that hackers could access a devices’ PIN via motion sensing data from wearable devices. “Friend or Foe?: Your…
10 million Android devices affected by Chinese malware earning millions for hackers
Source: National Cyber Security – Produced By Gregory Evans Check Point, a cybersecurity software maker, estimates that at least 10 million Android devices have been infected by the HummingBad malware since it was seen last February. The malware generates US$300,000 a month of ad revenue for the hacking group. The…
Cybersecurity, Personal Email Accounts and Personal Devices
Source: National Cyber Security – Produced By Gregory Evans In October, we learned that a hacker claiming to be a teenager had accessed the personal email account of CIA Director John Brennan. WikiLeaks then published at least some of the emails. According to WikiLeaks, the published materials include a list…
Most Sophisticated Android Bootkit Malware ever Detected; Infected Millions of Devices
Source: National Cyber Security – Produced By Gregory Evans Hardly two month ago we reported about the first widely spread Android Bootkit malware, dubbed as ‘Oldboot.A‘, which infected more than 500,000 Smartphone users worldwide with Android operating system in last eight months, especially in China.Oldboot is a piece of Android…
Cell phone security on Apple and Google -operated devices help criminals duck justice
Source: National Cyber Security – Produced By Gregory Evans The answers to the shooting death of a Louisiana woman could be locked in her iPhone 5, but without a password not even Apple can access the data. It’s an unsolved murder from April that law enforcement officials say is symbolic…
Are connected medical devices a disaster waiting to happen?
Source: National Cyber Security – Produced By Gregory Evans Remember in late July when the Food and Drug Administration issued an advisory warning of security flaws in Hospira’s Symbiq smart infusion pumps? That warning, which was not a mandatory recall or an order to stop using Symbiq pumps, apparently was a…
Free Microsoft Windows for the Internet of Things and Mobile Devices
Source: National Cyber Security – Produced By Gregory Evans Tomorrow, 8th April could be a sad day for all those who are still using Windows XP, as it is an official assassination day of it, but there is also a good news that Microsoft is going to stop charging for…
He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium – a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.” The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director ) “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said. As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them. The consortium claims to have discovered cyber espionage operation under which phones of Indian Army personnel, who had downloaded some mobile application related to news, had been compromised by hackers based in Pakistan. IIC CEO Jiten Jain has said that the findings were handed over to security agencies who promptly acted and sanitised the infected handset early this year.
Source: National Cyber Security – Produced By Gregory Evans He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium – a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums…