The British government isn't letting up on its desire to track internet activity in the name of fighting terrorism. UK Home Secretary is proposing a bill that would require internet providers to keep tabs on who's using a given internet protocol address and hand it over to the police, who could theoretically use it to hunt down suspects.
Full details aren't available yet, but there would be some accountability involved. Police would have to get permission before collecting IP address info, and there would be documentation showing both when and why they needed that data. The potential law is more respectful of privacy than the failed Communication Data Bill.
Read moreRussia poses a serious cyber threat to industrial control systems, pharmaceutical, defense, aviation, and petroleum companies. Russian government cyber operations aim to use malware to steal information on files, persist on ICS equipment, and commit espionage.
There is nothing quick about studying Russian cyber operations. Beyond understanding the complexities of the malware itself, one must also match up the names of several families of malware, some which have evolved over time and have had different names, as well as to link together the names given to specific groups by a number of private security companies.
Read moreAutonomous Robocop-style robots, equipped with microphones, speakers, cameras, laser scanners and sensors, have started to guard Silicon Valley. The robots are programmed to notice unusual behavior and alert controllers. It also has odor and heat detectors, and can monitor pollution in carpets as well.
Last but not least: with cameras, the Robocops can remember up to 300 number plates a minute, monitoring traffic. The robotics company says that it will be placing the robots in patrol malls, offices, and local neighborhoods, as well as outdoor spaces like corporate campuses, college campuses and open air malls.
Read moreRegin's complex nature suggests a nation state is behind the cyberespionage tool's development, Symantec reports. An advanced piece of malware has been uncovered, which has been in use as far back as 2008 to spy on governments, companies and individuals.
The cyberespionage tool uses several stealth features to avoid detection that required a significant investment of time and resources, suggesting it's the product of a nation state, the antivirus software maker warned, without suggesting which country was behind it. The malware's design makes it highly suited for long-term mass surveillance. Other infections were identified monitoring network traffic and analyzing email from Exchange databases.
Read moreMore and more, governments are using powerful spying software to target human rights activists and journalists, often the forgotten victims of cyberwar. Now, these victims have a new tool to protect themselves. It scans a person's computer for traces of surveillance software, or spyware.
A coalition of human rights organizations launched it, with the goal of equipping activists and journalists with a free tool to discover if they've been hacked. The open-source tool was developed by security researcher who has been investigating government abuse of spyware for years. The tool designed to discover malware developed both by commercial firms, as well as popular spyware used by cybercriminals.
Read moreThe State Department's unclassified email network has been temporarily shut down to update security protocols in the wake of a suspected hacking attack that occurred in early October. A senior State Department official confirmed that the Department recently detected activity of concern in portions of its unclassified email system.
As a result of that incident the State Department scheduled an outage this weekend of some Internet systems to implement security improvements to its main unclassified network. The official said the shutdown has impacted some of the State Department's unclassified email traffic as well as access to some public web sites.
Read moreThe Trojan has once again branched out beyond its roots as banking malware and is now targeting the master passwords guarding major password management products. A new configuration file found on an infected computer targeting processes used by the respective password management tools.
Citadel, like most widely distributed malware families, is crossing over more and more from the realm of cybercrime to APT-style targeted attacks. New features and a hunger for legitimate credentials make the malware, which is already sitting on hundreds of thousands of machines, particularly dangerous to critical infrastructure, in addition to financial services.
Read moreGoogle can identify and transcribe all the views it has of street numbers in less than an hour, thanks to a neural network that’s just as good as human operators. Now its engineers reveal how they developed it. Google Street View has become an essential part of the online mapping experience.
It allows users to drop down to street level to see the local area in photographic detail. But it’s also a useful resource for Google as well. The company uses the images to read house numbers and match them to their geolocation. This physically locates the position of each building in its database.
Read moreA brute force attack is, simply, an attack on a username, password, etc. that systematically checks all possible combinations until the correct one is found. Scripts are usually used in these attacks to automate the process of arriving at the correct username/password combination.
This is why time is of the essence when it comes to detecting and stopping a brute force attack – the more time the attacker has, the more passwords can be tried. Brute force attacks are one of the few hacks detectable by their volume, rather than their type. As an IT professional - do you know what a brute force attack is, how to spot one when it happens, and how to prevent it?
Read moreUK to take action to close down Russian website streaming images from British webcams including baby monitors and those in gyms and bedrooms. The UK is to take international action to close down a Russian website that is streaming images from British webcams including baby monitors, bedroom cameras and gym.
The site feature live feeds from households and businesses across the world, including a gym in Manchester, a bedroom in Birmingham and an office in Leicester. The site highlighted the importance of setting secure passwords on devices that have access to the internet. It has become the source of concern for data watchdogs across the world.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland