Thursday , 19 July 2018
Home >> H >> Hacking

Hacking

Hacker takes down Copenhagen’s bike-hire network and deletes database

Copenhagen’s bike network was rendered useless in a cyber attack over the weekend in which the hacker was able to completely wipe the network’s database.  Officials claim that the attack happened some time between 4 May and 5 May, and meant that people were not able to hire bikes from the Bycyklen system – similar to London’s ‘Santander Hire’ bike hire system, ... Read More »

City of London Police to set up crack cyber-detective branch

City of London Police is building a new branch of supposedly IT-savvy detectives to protect businesses and consumers from cyber crime. According to a new report in the Daily Telegraph, City of London Police is planning to hire cyber detectives direct from some of the UK’s best universities to work as part of a specialist cyber security branch. In an interview with ... Read More »

Hackers target Oracle WebLogic Servers following botched patch

Non-malware attacks and ransomware take centre stage This report looks at research from over 1000 organisation, representing more than 2.5 million endpoints, to understand the prevalence and growth of non-malware attacks. Download now to find out more. Download Read More »

Sentencing of alleged Yahoo hacker Karim Baratov postponed as the judge grows suspicious of DoJ

Non-malware attacks and ransomware take centre stage This report looks at research from over 1000 organisation, representing more than 2.5 million endpoints, to understand the prevalence and growth of non-malware attacks. Download now to find out more. Download Read More »

Almost half of UK businesses are vulnerable to IoT hacking

2.7 million firms in the UK are leaving their corporate networks vulnerable due to insecure IoT devices, ForeScout research has shown. Almost half (47 per cent) of the 500 CIOs and IT managers who took part told ForeScout that they allowed IoT devices onto their corporate network without changing the default password – equating to about 2.7 million businesses out ... Read More »

DNC hacker Guccifer 2.0 makes VPN mistake revealing they’re a ‘member of Russian military intelligence’

Guccifer 2.0, the hacker supposedly responsible for hacking into the Democratic National Committee computer network, who claimed to be Romanian, has been outed as working from Moscow, most likely for the Russian foreign military intelligence agency, known as the GRU. The DNC materials that were sent to Wikileaks and other organisations and exposed details about Hilary Clinton’s presidential campaign and information ... Read More »

4G mobile networks are riddled with exploitable security flaws, claim researchers

Driven by Data in association with IBM The channel looks at how software-defined storage is an enabler of multi-cloud, AI, IoT, and arguably plays a pivotal role in digital transformation. Security Spotlight in association with Malwarebytes The channel looks at all things security, including all the news, analyses, opinion and research into these new, yet clear and present, dangers. Read More »

Online advertising network accused of serving crypto-jacking scripts on users’ PCs

Researchers at Qihoo 360 Netlab have warned that an online advertising network has been serving crypto-jacking scripts with adverts, and deployed tools to evade ad blocking technology. The crypto-jacking scripts are deployed to exploit users’ PCs to mine for Monero cryptocurrency on behalf of the advertising network.   According to Qihoo 360 Netlab, the unnamed network has been sneaking in-browser cryptocurrency miners into ... Read More »

Top Security Threats of 2018: Part 2

Driven by Data in association with IBM The channel looks at how software-defined storage is an enabler of multi-cloud, AI, IoT, and arguably plays a pivotal role in digital transformation. Security Spotlight in association with Malwarebytes The channel looks at all things security, including all the news, analyses, opinion and research into these new, yet clear and present, dangers. Read More »

Top Security Threats of 2018: Part 2

Driven by Data in association with IBM The channel looks at how software-defined storage is an enabler of multi-cloud, AI, IoT, and arguably plays a pivotal role in digital transformation. Security Spotlight in association with Malwarebytes The channel looks at all things security, including all the news, analyses, opinion and research into these new, yet clear and present, dangers. Read More »

close
==[ Click Here 1X ] [ Close ]==