Cryptojackers now Attacking IoT Devices, and What Users Can Do to Stay Safe

Cryptojackers Now Attacking IoT Devices An article by Manuel, Editorial Manager at IoT Business News. Step down, ransomware; cryptojackers have been the latest and greatest malware threat for the past few months, and this latest evolution is proving they deserve the top spot on digital threat lists. Unlike other forms of malware, cryptojackers don’t make themselves known…

US border agency contractor breached, license plate and travelers’ photos stolen

US border agency contractor breached, license plate and travelers’ photos stolen US Customs and Border Protection (CBP) announced that a hacker may have stolen sensitive data collected by the agency from a subcontractor’s network. “On May 31, 2019, CBP learned that a subcontractor, in violation of CBP policies and without CBP’s authorization or knowledge, had…

Cyber weapons readily available to criminals, researchers warn

Cyber weapons readily available to criminals, researchers warn Security researchers have discovered an attack campaign infrastructure designed to scan, brute-force and infect tens of thousands of MS-SQL and PHPMyAdmin servers China-based cyber attackers have breached more than 50,000 servers belonging to companies in the healthcare, telecommunications, media and IT sectors using sophisticated attack tools, security…

‘NanshOu’ China-Based Attack Uses APT-Like Techniques

‘NanshOu’ China-Based Attack Uses APT-Like Techniques to Infect Servers Worldwide During the past two months, the Guardicore Labs team says that it has been following a China-based campaign trying to infect Windows MS-SQL and PHPMyAdmin servers worldwide. They observed that the breached machines included over 50,000 servers belonging to companies in the healthcare, telecommunications, media and IT…

The ‘Unprecedented Challenge’ of Cybersecurity in an Age

The ‘Unprecedented Challenge’ of Cybersecurity in an Age of Burgeoning Threats   Technological and legal complexities abound in this age of heightened cybersecurity threats—including a rise in state-sponsored hacking. This “unprecedented challenge” was the topic of conversation between Dorian Daley, Oracle executive vice president and general counsel, and Edward Screven, Oracle’s chief corporate architect. Here…

Binance Announces ‘Significant’ Security Changes Following Hack

Binance Announces ‘Significant’ Security Changes Following Hack Cryptocurrency exchange Binance has revealed that it will be revamping its security network to prevent a recurrence of the 7,000 BTC hack it experienced on May 78, 2019. Per a blog post on its official website, the exchange announced that it will be implementing “significant” changes to its fundamental security infrastructure, including…

This DIY Biohacker is Under Investigation by California’s DCA.

THIS DIY BIOHACKER IS UNDER INVESTIGATION KRISTIN HOUSER Let’s Talk Josiah Zayner rose to internet fame after performing various biohacking stunts on himself — including a live streamed attempt to edit his own genes using CRISPR. Those antics are coming to haunt Zayner. Now, the California Department of Consumer Affairs (DCA) is investigating a “complaint of unlicensed practice of medicine”…