Tomer Teller CNBC Back in 2010, the FBI joined law enforcement agencies across the globe in shutting down a criminal operation that stole some $70 million from U.S. banks. The gang’s weapon of choice was not a machine gun or a set of safe-cracking tools. Instead, the gang relied …
Read More »Hackers Have Backdoor Access US Weapons Systems Via Microchip
Mark Clayton Christian Science Monitor A secret nanoscale “backdoor” etched into the silicon of a supposedly secure programmable chip could give cyberattackers access to classified US weapons systems, including guidance, flight control, networking, and communications systems, according to a new report by cybersecurity researchers in Britain. The Cambridge University study is …
Read More »FEMA Sponsored Cyber Attack Simulation on Critical U.S. Infrastructure
Chris Dougherty Virtual Threat Contributing Writer President Barack Obama and several senior U.S. officials participated in a FEMA sponsored cyber attack simulation on Tuesday. The simulation focused on how the U.S. government would react to cyber warfare targeting the country’s critical infrastructure. The exercise was designed in part to help pinpoint weaknesses in …
Read More »Google Adds Cyberattack Warning For Victims of State-Sponsored Attacks
News.com.au GOOGLE has added a feature to warn users whose accounts it believes are targets of “state-sponsored attacks”. Google, however, closed its search engine in China in 2010 after saying it no longer wanted to cooperate with Beijing’s internet censorship following hacking attacks traced to China. A message …
Read More »NSA Utah Data Center Largest Spy Compound Ever – Part 2
James Bamford Wired.com (Threat Level) Continued from: NSA Utah Data Center Largest Spy Compound Ever – Part 1 For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail. William Binney was a senior NSA crypto-mathematician largely responsible for …
Read More »NSA Utah Data Center Largest Spy Compound Ever – Part 1
James Bamford Wired.com (Threat Level) The spring air in the small, sand-dusted town has a soft haze to it, and clumps of green-gray sagebrush rustle in the breeze. Bluffdale sits in a bowl-shaped valley in the shadow of Utah’s Wasatch Range to the east and the Oquirrh Mountains to the west. It’s …
Read More »NYTimes.com Site Vulnerability Allows Attacker to Post Fake Story
Chris Dougherty Virtual Threat Contributing Writer In this day and age we all depend heavily on the Internet and social networking to stay informed about important happenings around the world and in our own communities. What many people may not realize is the fact that there is a cyber …
Read More »Android Smartphone Hackers Building Malware in Russia
Antone Gonsalves CSO The malware business growing around Google Android — now the leading smartphone operating system — is still in its infancy. Today, many of the apps built to steal money from Android users originate from Russia and China, so criminal gangs there have become cyber-trailblazers. Sophos and …
Read More »Cyber Spies Are Exploiting Your Mac and Windows Computers
Antone Gonsalves CSO Cyber spies have planted Java- and Flash-exploiting malware on Web sites focused on human rights, defense and foreign policy. Over the last two weeks, the Shadowserver Foundation, a nonprofit group that tracks Internet threats, has discovered several such compromised Web sites that download the malware through …
Read More »10 Hacking Incidents That Made History
Joan Goodchild PC Advisor – UK Hacking has been around for decades. Today’s crimes are often financially-motivated fraud. Here are ten hacking incidents that made history In our first Rogues Gallery, we looked at ten infamous social engineers — con men who exploited human weaknesses rather than technical vulnerabilities. But there have …
Read More »