Resources

Blog

Windows XP Still Used By 90% of NHS Hospital Trusts

The overwhelming majority of NHS hospital trusts in England are continuing to use Microsoft’s unsupported Windows XP operating system, putting patients and their organizations at risk. According to new research conducted by software company Citrix, nine out of ten NHS trusts questioned confirmed they still have PCs running the outdated software....
Blog

POS Malware Activity Quadrupled over Thanksgiving Weekend

Point-of-sale (POS) malware activity, specifically network traffic for data exfiltration, quadrupled over Thanksgiving weekend. For their ongoing threat analysis, researchers at Proofpoint use network sensors deployed by its Emerging Threats group to track POS malware contact with command and control (C&C) servers. They had expected increased...
Blog

Patch Your Sony Security Cameras Against Backdoor Attacks!

If you have a Sony network-connected CCTV camera, you may have a security problem. Researchers at SEC Consult uncovered a backdoor in Sony IP cameras that could allow a hacker to remotely execute malicious code, spy on users, brick devices, or recruit them into a DDoS botnet. As the vandal-resistant Sony IPELA Engine IP cameras at the centre of the...
Blog

Getting Ahead of the EU General Data Protection Regulation (GDPR)

The fact that you're reading this blog means that you're probably familiar with the EU GDPR, the possible impact it may have on your business, and the consequences should you find yourself on the wrong side of non-compliance – especially if that non-compliance is highlighted as the result of a breach in which identifiable personal data is...
Blog

Man Receives 5 Years in Jail for Hacking Celebrities' Email Accounts

A man has received five years in prison for hacking into the email accounts of a number of celebrities and athletes. On 6 December, the Federal District Court in Manhattan passed down the sentence to Alonzo Knowles, 24, who gained unauthorized access to celebrities' email accounts and stole sensitive data. Back in December 2015, an undercover agent...
Blog

Compensating Controls: An Impermanent Solution to an IT Compliance Gap

Compliance is a concern for every organization that handles customers' data. Unfortunately, it's not always easy for companies to meet the security requirements of frameworks like PCI DSS. Each organization faces technological and/or business constraints; factors which shape its security decisions and sometimes rule out the implementation of certain...
Blog

Trust: The Social Basis of the Internet Ecosystem

Societies function on the basis of trust, and Internet users are no different. Users need to trust the Internet. They need to trust it to keep their data secure, protected and private, and they need to trust it to reliably give them the content they want to view and share. If governed in an inclusive way, users will continue to place their trust in...
Blog

Is Quantum Networking The End of Man-in-the-Middle Attacks?

Research on quantum networking is well under way. In April 2012, Gerhard Rempe and other researchers at the Max Planck Institute of Quantum Optics in Germany announced their first working quantum network to the world. Then, just this year, Wolfgang Tittel and his researchers at the University of Calgary transported a light particle's properties...
Blog

Thieves Used Radio Jammers to Block Motorists from Locking Their Cars

Thieves used radio jammers to steal from motorists by preventing them from locking their cars after they parked at service stations. According to BBC News, Thames Valley Police said it received 14 reports of theft at the Chieveley, Reading, and Membury stations on the M4 in Berkshire during the last two weeks of November. Each of those incidents...
Blog

Women in Information Security: Zoё Rose

Women are eagerly needed in information security because we offer unique perspectives and there are so few of us. So far in this series, I interviewed Tiberius Hefflin, Tracy Maleef, Isly, Kat Sweet, and Jess Dodson--five different women from different parts of the English-speaking world and from different areas of IT. For my sixth and final...
Blog

Shamoon 2: Nothing Whets Disttrack's Appetite Like Destroyed Data

Most families of malware operate on a common assumption: a user's data is valuable. For instance, some malware samples transmit pieces of a victim's data to their command-and-control (C&C) server as means of setting up an attack, while others fully embrace the spyware classification and collect as much information about a user as possible. At the...
Blog

Uber Now Tracks Users' Location Data After a Trip Ends

Uber has issued an update allowing the online transportation network company to track passengers' data after a trip ends. Hoping to improve passengers' experience using the service, Uber released the update as a means of broadening its ability to collect "trip-related data." The company clarifies that point on its website: "Uber collects your...
Blog

Under attack: How hackers could remotely target your pacemaker

Once again, researchers have uncovered security flaws that could allow malicious hackers to attack implanted medical devices, such as heart pacemakers and cardiac defibrillators, with the potential to deliver fatal shocks. In a newly-published paper, "On the (in)security of the Latest Generation Implantable Cardiac Defibrillators and How to Secure...
Blog

FBI's Expanded Hacking & Surveillance Powers Take Effect Under Rule 41

Changes that expand the Federal Bureau of Investigation's (FBI) hacking and surveillance powers took effect on 1 December under Rule 41. Previously, it was an established fact of criminal procedure that a judge's warrants pertained only to a suspected criminal's misdeeds in particular district. If the subject committed crimes in multiple districts,...
Blog

How “Peter Parker’s” Mirai Variant Took Down 900,000 Routers

What happens when service providers issue routers with remotely exploitable flaws? This weekend, we saw a glimpse of what is possible when attackers attempted to load Mirai-based malware on routers through a vulnerability in an exposed remote management protocol. Although the attackers probably failed in their ultimate goal of creating a large...
Blog

Hacking the Human at BSides Philly: Social Engineering Basics

My talk at BSides Philly on December 3 is called "Hacking the Human: Social Engineering Basics," and it's about providing a social engineering foundation for people to adapt to their individual situation and needs. "Teach a man to fish" and all that, you know? Over the course of the talk I reference many thinkers, philosophers, psychologists, and...