The Agora Dark Web market cited Tor Hidden Services security vulnerabilities that could allow de-anonymization attacks and temporarily shut down operations after discovering suspicious activity on its servers.
Stories by Darlene Storm
MIT researchers created the first file system that is 'mathematically guaranteed' not to lose data even when a computer crashes.
At the Chaos Computer Club's Chaos Communication Camp, one brave soul explained how to jump paywalls, obtain academic research and freely share that research without being arrested.
126 types of cars have been hackable for years and can be stolen thanks to a keyless security flaw; Volkswagen spent two years suing the researchers and trying to keep the vulnerabilities a secret.
After the Office of Personnel Management breach, medical data was labeled as the "<a href="http://www.reuters.com/article/2015/06/05/cybersecurity-usa-targets-idUSL3N0YR30R20150605">holy grail</a>" for cybercriminals intent on espionage. "Medical information can be worth 10 times as much as a credit card number," reported Reuters. And now to steal such information, hospital networks are getting pwned by malware-infected medical devices.
You wouldn't likely know if you are under cell phone surveillance, but you would if you were about to make a call and your phone displayed an unencrypted connection warning that states, "Caution: The mobile network's standard encryption has been turned off, possibly by a rogue base station (IMSI Catcher'). Unencrypted calls not recommended."
If you are good at research by using Google searches, does that make you a malicious cyber actor? Of course not, but DHS, FBI and NCTC (National Counterterrorism Center) have issued a bulletin warning about malicious "Google dorking" cyber actors. If using <a href="https://sites.google.com/site/gwebsearcheducation/advanced-operators">advanced search techniques</a> on Google or Bing is considered suspicious, what does that make <a href="http://www.shodanhq.com/">Shodan</a> users who specifically target SCADA, ICS, VoIP, routers, switches, webcams and printers to name but a few?
- Multiple Xamarin Developers VIC
- Security Architect Other
- SAP Functional Lead NSW
- Release Manager (Salesforce) NSW
- Microsoft Systems Administrator VIC
- AWS DevOps Engineer - Brisbane QLD
- Network Engineer QLD
- Business / Systems Analyst NSW
- VMWare Specialist - Telco VIC
- Scrum Master / Project Manager NSW
- Upskill your Team. Transition your Career. Cyber Security Foundation & Practitioner™ instructor-led course, for anyone needing a solid understanding of Cyber Security.
- Business transforms when it comes together | Unite your IT , Ops, and Applications teams with shared solutions. Get Ready - Red Hat Cloud