UK Man Gets Five Years for Online Abuse Campaign

UK Man Gets Five Years for Online Abuse Campaign

A Nottingham man has been sentenced to more than five years behind bars after blackmailing and harassing several women, according to the National Crime Agency (NCA). The UK’s law enforcement agency for serious and organized crime. revealed that Shaquille Williams, 26, was jailed for five years and three months late last week at Nottingham Crown Court,  He was found guilty of one count of blackmail related to one victim, three counts of harassing three women…

Read More

How to apply Sun Tzu’s ‘The Art of War’ to cybersecurity

How to apply Sun Tzu’s ‘The Art of War’ to cybersecurity

How to apply Sun Tzu’s ‘The Art of War’ to cybersecurity | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

My “Cybercrime” Isn’t Your “Cybercrime” | The State of Security

My “Cybercrime” Isn’t Your “Cybercrime” | The State of Security

Talk to cybersecurity experts about cybercrime on their network, and they will mention malicious activity like scans, attacks, events, and incidents. Probably at some point, they will slip into geek-speak with a vast array of confusing acronyms and jargon while explaining tactics and techniques by referencing infamous attacks, Internal protocols, and industry shorthand.   Talk to federal law enforcement officers about cybercrime, and they will probably mention the Computer Fraud and Abuse Act (CFAA), unauthorized access,…

Read More

Why Your Hospital Network Needs an IoT Security Policy

Why Your Hospital Network Needs an IoT Security Policy

By Marc Laliberte, Technical Security Operations Manager, WatchGuard Technologies The Internet of Things (IoT) industry has a security problem that has existed since its inception. From the Mirai botnet that took disrupted internet goliaths like Netflix, Twitter, and Reddit in 2016 to the recent Verkada security camera breaches that impacted tech giants Tesla and Cloudflare, IoT weaknesses have continued to be a popular tool in the cybercriminal arsenal despite constant warnings from security professionals. While…

Read More

TeamTNT cybercrime gang expands its arsenal to target thousands of orgs worldwide

TeamTNT cybercrime gang expands its arsenal to target thousands of orgs worldwide

The financially motivated TeamTNT hacking group expanded its arsenal with new tools used to target thousands of victims worldwide. Researchers from AT&T Alien Labs uncovered a new campaign, tracked as Chimaera, conducted by the TeamTNT group, aimed at organizations worldwide. Evidence collected by the experts suggests that the campaign began on July 25, 2021, threat actors used a large set of open-source tools in the attacks. Threat actors leverage open-source tools to avoid detection and make…

Read More

Microsoft warns of a zero-day in Internet Explorer that is actively exploited

Microsoft warns of a zero-day in Internet Explorer that is actively exploited

Microsoft warns of a zero-day vulnerability in Internet Explorer that is actively exploited by threat actors using weaponized Office docs. Microsoft warns of a zero-day vulnerability (CVE-2021-40444) in Internet Explorer that is actively exploited by threat actors to hijack vulnerable Windows systems. Microsoft did not share info about the attacks either the nature of the threat actors. The vulnerability was exploited by threat actors in malspam attacks spreading weaponized Office docs. The remote code execution…

Read More

Keeping Health Records Safe from Cyber Criminals

Keeping Health Records Safe from Cyber Criminals

By Dexter Caffey, Founder and CEO, Smart Eye Technology The healthcare industry is currently one of the most lucrative targets for hackers. A recent report by a mobile security company shows that many digital health platforms have vulnerabilities that allow criminals to access medical health records, personal information, and even credit card and billing information. Cyber-thieves then use all this data at their disposal to commit financial/insurance fraud and identity theft. Healthcare organizations are usually…

Read More

Before You Download: Steer Clear of Malicious Mobile Apps

Before You Download: Steer Clear of Malicious Mobile Apps

Cybercriminals like to get in on a good thing. Case in point, mobile apps. We love using apps and they love making bogus ones—malicious apps designed to harm phones and possibly the person using them.   It’s no wonder that they target smartphones. They’re loaded with personal info and photos, in addition to credentials for banking and payment apps, all of which are valuable to loot or hold for ransom. Add in other powerful smartphone features like cameras, microphones, and GPS, and a compromised phone may allow a hacker to:  Snoop on your current location and everyday travels.  Hijack your passwords to social media, shopping, and financial accounts. Drain your wallet by racking up…

Read More

University Hacker Sent to Prison

University Hacker Sent to Prison

A student who hacked into a British university’s computer network and made thousands of dollars by selling the answers to exams has been sentenced to prison. Hayder Aljayyash, who is 29 and was born in Iraq, was welcomed into the UK as an asylum seeker. Between November 2017 and May 2019, Aljayyash illegally accessed the computer system of the University of South Wales where he had been studying for a master’s degree in embedded system…

Read More

Poland Extradites Alleged Botnet Operator to US

Poland Extradites Alleged Botnet Operator to US

A Ukrainian accused of decrypting the credentials of thousands of computers across the globe and selling them on the dark web has been extradited to the United States. US authorities indicted Glib Oleksandr Ivanov-Tolpintsev in October 2020 in connection with charges of conspiracy, trafficking in unauthorized access devices, and trafficking in computer passwords.  Polish authorities arrested 28-year-old Ivanov-Tolpintsev on October 3, 2020. The defendant, who is from Chernivtsi, Ukraine, was recently extradited to the US, where he…

Read More
1 2,246 2,247 2,248 2,249 2,250 2,738