Infosecurity News
Android Info-stealing Baddie Targets Almost 100 Banks
The malware steals credentials for banking and social media apps, intercepts and sends SMS messages, and can wipe the phone.
#BHEU: Why AI Doesn’t Exist and Why Machine Learning is Only as Good as the Human
“Artificial intelligence doesn’t exist yet, nor will it for at least the next twenty years,” Ilia Kolochenko, CEO of High-Tech Bridge, told Infosecurity without hesitation at Black Hat Europe on November 4 2016.
#BHEU Quantum Crypto Edges Closer to Reality
Cryptography for quantum computers is taking a serious step forward, thanks to the launch of the OpenQuantumSafe Software Project.
NHS Trust Back Online After ‘Virus’ Caused Outage
Suspected ransomware attack forced cancellation of appointments for days
Convenience Trumps Security Policy for 90% of Workers
Most employees admit to ignoring security rules when they feel they have to: i.e., using personal devices to finish work at home.
Exaspy, a New Android Spyware, Targets Execs
Skycure found the commercial Android kit secretly recording meetings, taking screenshots and harvesting messaging info.
New Zealand Nurses Caught Out in Major Email Breach
Tens of thousands affected after staff member is phished
#UNITEDsummit: Heisenberg Project Outlines Cloud Attack Realities
Honeypots analyzed attacks inside AWS, Microsoft Azure, Digital Ocean, Google Cloud, Rackspace and IBM SoftLayer.
Kremlin Hackers Are Exploiting Microsoft's Unpatched Zero-Day
Russia's politically motivated Fancy Bear group is actively using the flaw—and a patch won't be available until Election Day.
Google to Distrust WoSign/StartCom Certificates
WoSign knowingly and intentionally mis-issued certificates in order to circumvent browser restrictions and CA requirements.
MI5 Boss Warns of ‘Aggressive’ Russian Cyber Threat
Andrew Parker claims Kremlin is on the offensive
Google AI Can Create Its Own Encryption
Google Brain has shown that artificial intelligence has the ability to create its own cryptography standard, dynamically.
Flash, Windows Zero-days Are Being Actively Exploited in the Wild
Microsoft hasn't patched the Windows flaw—a local privilege escalation that can be used as a security sandbox escape.
Fake Palo Alto Cyber-conference Invites Deliver Spy Trojan
The effort is related to ongoing Operation Lotus Blossom attack campaigns in the Asia Pacific region.
National Cyber Security Strategy Aims to Defend, Deter, Develop
Chancellor Philip Hammond has launched the new UK cybersecurity strategy, built on developing future talent, protecting what we have and identifying the malicious few.
Firms Value Threat Intel … But Fail to Use it Properly
Anomali survey finds organizations are suffering from data overload
NHS Trust Suspends Operations After Major Cyber Incident
Patients transferred after IT systems are shut down
Trend Micro: Fake Apple iOS Apps Are Rampant
The Apple iOS environment is riddled with malicious fake apps, signed with enterprise certificates.
IoT Control Wins Trusted Environment Hackathon
SafeHaven, a system for granular control of IoT devices in smart homes, has won Trusted Execution Environment (TEE) hackathon.
Cyberbit Range Offers Simulated Attack Training
The Cyberbit Range provides lifelike simulation for security operations trainees—kind of like the holodeck, in Star Trek.