APT Campaign Targeting Japanese Critical Infrastructure

APT Campaign Targeting Japanese Critical Infrastructure

Researchers from Cylance have outlined a sustained 5-year APT campaign targeting Japanese Critical Infrastructure using dynamic DNS domains and customized backdoors. The attacks have also occurred in the US, South Korea, and Europe. The campaign used custom Android backdoors in 2015 with a Trojan forwarded by SMS messages, and later through specific files, from infected […]

Nissan Leaf Cars Can Be Hacked

Nissan Leaf Cars Can Be Hacked

The BBC has reported that “some of Nissan’s Leaf cars can be easily hacked, allowing their heating and air-conditioning systems to be hijacked, according to a prominent security researcher. Troy Hunt reported that a flaw with the electric vehicle’s companion app also meant data about drivers’ recent journeys could be spied on.” Experts from AlienVault, ESET […]

MouseJack Hack on Wireless Keyboards and Mice from 100 Meters

Wireless Keyboards and Mice from 100 Meters

Researchers from Bastille Security* have discovered vulnerabilities in wireless keyboards and mice in which hackers could target from 100 meters away. The vulnerabilities are found in the dongles because they accept unencrypted packets. Researchers were able send a fake mouse packet to inject keystrokes into a computer without the encryption key. Researchers believe that many […]

Angler Exploit Kit and Ransomeware still Active on Popular Site

Angler Exploit Kit and Ransomeware still Active on Popular Site

Trustwave has discovered the popular Extendoffice.com Microsoft product site has begun redirecting people to the Angler Exploit Kit again, leaving many users still exposed to the TeslaCrypt ransomware. The exploit was initially closed last week after Trustwave discovered it, but has reappeared. According to the Google analytics tool VirusTotal, only one URL scanning engine (Trustwave […]

Human Exploitation the Biggest Threat of 2015

Human Exploitation the Biggest Threat of 2015

Proofpoint is releasing its annual Human Factor Report, which looks at the latest cyber security issues in email, social media and mobile apps. One of the most significant findings from the study is that in 2015 people were the targets: from email and web to social media and mobile apps, rather than relying on expensive […]

Insurance a Critical Component of Cyber Defence Strategy

Insurance a Critical Component of Cyber Defence Strategy

Cyber Essentials eases path to cyber insurance for UK’s SMEs Cyber insurance is critical to helping businesses view their cyber security defences holistically, but remains a missing piece of the puzzle for too many businesses, APMG International has warned. By achieving the UK Government’s Cyber Essentials, businesses automatically qualify for cyber insurance policies, providing a […]

“I’m a CFO and I’ve been Hacked” – with Cybercrime on the Rise does your Finance Function have a Plan to Fail?

Cybercrime on the Rise does your Finance Function have a Plan to Fail?

Cybersecurity is growing too dangerous and powerful to ignore and a head-in-the-sand attitude to this once nascent, now pervasive threat is no longer an option, according to a new study by IMA (Institute of Management Accountants) and ACCA (Association of Chartered Certified Accountants). The joint study, “Cybersecurity – Fighting Crime’s Enfant Terrible,” is an assessment […]

UK Websites Suffer 21% Increase in DDoS Attacks in Q4 2015

UK Websites Suffer 21% Increase in DDoS Attacks in Q4 2015

 325Gbps / 115 Mpps SYN flood mitigated. The attack occurred in mid-December and is one of the largest to ever be documented. 25.3 % increase in network layer attacks from prior quarter. A result of perpetrators preferring repeated short bursts for network layer attacks.  Longest application layer attack lasted for over 101 days. However, the […]

Vulnerabilities in Medical Devices

Vulnerabilities in Medical Devices

According to a new report, “the healthcare sector is a good 10 to 15 years behind the retail sector when it comes to security.” “We can’t accept what we have now. If we assume a loss of life scenario, the consequence of failure is too high.” Said Scott Erven, a medical device security advocate who […]