Z-Wave protocol is a radio frequency-based communications technology created to facilitate the management of Internet of Things appliances. Unfortunately, despite its sophisticated encryption system, Z-Wave is vulnerable to a downgrade attack – a protocol that forces computers to abandon their high-quality mode of operation in favour of a less effective… Read more »
With cyberspace the new global battlefield, the finance sector is finding itself in the firing line; and it’s having to draft in appropriate personnel to fight back – many of them former soldiers, spies or counter-intelligence agents. With cybercrime losses now amounting to $445 billion per annum, the need for… Read more »
It seems likely that the recent Bad Rabbit ransomware attack on Russia and Ukraine originates from the same source as the NotPetya infestation earlier this year. Since this article was originally published, there have been some German and Turkish victims of this bug. The actors behind both attacks go by… Read more »
It is currently possible to buy a potentially lucrative Remote Desktop Protocol (RDP) on the dark web for as little as $3.00. Anyone wishing to hack remotely into a compromised corporate computer can now purchase the relevant RDP on the Ultimate Anonymity Services (UAS) dark web market. While the RDPs… Read more »
The general health of cybersecurity in the medical profession can only be described as parlous. Yet another case of lame practice has resulted in the sensitive medical records of 150,000 patients (including sensitive medical information such as blood test results), amounting to more than 47GB of data, being left for… Read more »
Be wary of plausible-looking log-in forms – they could be a phishing attack designed to steal your password. An Apple iOS researcher has discovered that it takes hardly any time or expertise to knock together the coding for a bogus pop-up requesting a user’s credentials. Even Apple’s two-factor authentication is… Read more »
Despite repeated warnings from a number of security organisations, Swiss banking technology company BPC continues to maintain that its SmartVista ecommerce software system remains secure. BPC deploys its SmartVista product suite in sixty countries, either as an individual point solution to meet a specific need or implemented together to form… Read more »
It now looks as if every one of Yahoo’s 3 billion account holders was affected by the data breach in 2013, a figure dramatically larger than the original estimate of 1 billion. Yahoo, which is now part of Verizon’s media and telematics subsidiary Oath Inc, was breached again in 2014,… Read more »
According to its now former CEO Richard Smith, the Equifax data breach that began in March this year was the fault of a single unnamed employee. This hapless member of staff had been tasked with communicating instructions to the security team to deploy a software patch that was issued as… Read more »
There’s probably no mention of malware in the Hippocratic Oath. However, malicious software is now posing as much of a threat to patient’s lives as a hospital superbug or a slip of the scalpel. While doctors battle to restore their charges to good health, their efforts are being under mined… Read more »