Cybersecurity News

The FBI-Apple case: the next encryption and privacy firestorm

(Originally published on Information Week’s Dark Reading)   The startling events over the last few weeks in the San Bernardino shooting case, which has come to be known as “the FBiOS case” in some circles, have left me incredibly conflicted. On the one hand, the surprise filing and discovery of a “capable third party” to unlock the iPhone …

The FBI-Apple case: the next encryption and privacy firestormRead More »

The Ukraine power grid hack: Why did the attackers succeed?  

Last December, the lights went out in the Ivano‐Frankivsk region of Ukraine, and over 225,000 people were left without electricity for several hours. This blackout was caused by advanced attackers, presumably from Russia, who managed to disconnect 145 substations from the power grid.   E‐ISAC and SANS ICS published a detailed analysis of this attack. The analysis …

The Ukraine power grid hack: Why did the attackers succeed?  Read More »

Researchers have created a honeyclient capable of on-the-wire detection

Attackers switch between different types of malware, move their exploit kits between servers or constantly morph the traffic to look legitimate. By the time relevant data is collected and transformed into a signature for a defender’s NIDS, the attacker might have already breached the network and reached their objective. According to a new study by researchers at …

Researchers have created a honeyclient capable of on-the-wire detectionRead More »

The VTech hack’s numbers revealed: 4.83 million users compromised

A lack of basic encryption and a flawed system design made it easy for attackers to gain access to the Interactive toy maker’s user data. Alongside user passwords and personal details, the stolen data contained 2.3 million pictures of children. The inglorious book of massive data thefts just got another top entry: Last week, Interactive …

The VTech hack’s numbers revealed: 4.83 million users compromisedRead More »

Scroll to Top