Hacks sponsored by nation-states and attacks fueld by IoT-powered botnets are just some of the daunting threats we will see in 2017, says cybersecurity thought leader Tom Kellermann. What are his top predictions, and how should security leaders respond?
Over the past two years, DDoS attacks have grown in strength and in purpose - they are often used now as a tool of extortion, says Richard Meeus of security vendor NSFOCUS. How should security leaders prepare to respond to these strikes?
Remote attackers could easily exploit backdoor accounts and software problems in more than 80 models of Sony IP cameras to install IoT malware such as Mirai, warns Austrian security firm SEC Consult.
Mirai, the ever-morphing malware behind devastating DDoS attacks, has also disrupted two U.K. broadband providers. The malware's framework is becoming a platform for attacks against IoT devices.
Deutsche Telekom says 900,000 customers were unable to access the internet after their routers were infected with malware. Researchers say it's a modified version of Mirai - code for building an internet-of-things botnet.
The latest ISMG Security Report leads with a look at the ransomware attack against San Francisco's light rail agency. Also featured is an analysis of the ongoing fallout from Australia's online census project.
IBM will pay an unspecified amount to the Australian government for the vendor's role in the technical problems related to the recent online census, which dented public confidence in large-scale IT projects.
A Danish telecommunications company says it has seen successful DDoS attacks directed at enterprise firewalls that could be launched using only a single laptop.
U.K. Chancellor Philip Hammond used the launch of Britain's new five-year National Cyber Security Strategy to trumpet the country's strike-back capabilities. But other parts of the strategy - including more automated defenses - hold much greater promise.
As if the internet of things didn't seem secure enough, now we have to worry about apps on our smartphones posing a risk too. At Black Hat Europe, researchers from Invincea Labs demonstrated zero-day flaws in Belkin's WeMo home-automation device firmware as well the WeMo Android app, which have been patched.
DDoS attacks apparently were directed at the small west African country of Liberia from the same botnet that struck networking services provider Dyn. Were the attacks just a test for a bigger attack to come?
As investigations into the distributed denial-of-service attack on Singaporean ISP StarHub continue, experts believe that the scale of IoT infections - needed to launch attacks of such severity - and the circumstances perpetuating it are the bigger problems.
This year, the annual Black Hat Europe conference decamps from Amsterdam to London. What's in store? Everything from mobile ransomware and quantum-resistant crypto to "ego markets" and how to turn Belkin IoT devices into launch pads for DDoS attacks.
In a sign that investigators are paying more attention to disrupting stresser/booter services, script-kiddie-friendly Hack Forums recently announced that it will be shutting down its related Server Stress Testing forum.
We were promised flying cars. Instead, we get malware-infected CCTVs serving as remote launch pads for digital attacks that help criminals earn cryptocurrency by crashing large parts of the internet. But new defenses offer promise for blunting such attacks.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.