Pacemaker hacking concerns

Pacemaker hacking concerns

Around half a million pacemaker have been recalled because of security concerns. Vulnerabilities in the pacemakers discovered by cyber security watchdog MedSec shows that anyone with basic knowledge and proper equipment could access these pacemakers and do anything they pleased with them.

New phishing attack on Microsoft Office 365

New phishing attack on Microsoft Office 365

Microsoft Office 365, a convenient, online version of the Microsoft Office suite, has recently become the target of a new, widespread attack designed to steal user/employee credentials and ultimately launch attacks from within an organization. Microsoft Office 365, while relatively new, has a large and growing user base currently with 100 million users and counting, therefore this is a serious issue that must be attended to.

Cybersecurity AI

Cybersecurity AI

Even though hackers are constantly finding new ways to breach security, it looks like we may have a new way to defend – AI. A system developed by MIT’s Computer Science and Artificial Intelligence Laboratory called Ai2 goes through millions of log lines per day and identifies threats, which are then checked by a human expert.

Universities face a new issue

Universities face a new issue

As students flock in to campus come the beginning of the new school year, many nervous thoughts will be flowing through their heads, although likely not regarding their own personal cyber security. Along with all their supplies and belongings, they bring their own personal, generally poorly secured electronic devices with themselves, causing the process of cyber security on campus to be much more tedious.

The cybersecurity crackdown

The cybersecurity crackdown

It is quite evident that cyber attacks are one of the most dangerous, and unfortunately most prevalent risks that businesses face today. The reason why new cybersecurity regulations are being put into place is because of the fact that the majority of all cyber attacks occurring within businesses are largely preventable.

USB attack infects computers through indirect means

USB attack infects computers through indirect means

Researchers at Trend Labs were investigating a case involving a backdoor (BKDR_ANDROM.ETIN) which was being filelessly installed onto target machines. The process of infection within a Windows 10 machine has a relatively straightforward path, beginning with the insertion of the USB, which contains two malicious files and ending in the decryption of a normal file and release of the BKDR_ANDROM.ETIN file.

CIA uses bogus update to steal data from partners

CIA uses bogus update to steal data from partners

Wikileaks’ series of documents called “Vault 7” allegedly exposes the CIA’s secret collection of biometric data from liaison agencies, such as the NSA, the DHS, and the FBI. CIA developed a tool called ExpressLane, is installed by an officer with an USB drive, then displays a bogus update screen, while in the background the targeted biometric data is compressed, encrypted and copied to the officer’s USB drive. If an agent does not return with the ExpressLane USB drive within a period of time, the software is automatically disabled.