Cyber Security News

Bart Ransomware
Date

Bart Ransomware

Bart Ransomware is a new ransomware reported in the media only a few days ago. Proofpoint wrote a detailed technical analysis of it here. Like other ransomware, this sets the wallpaper to show the ransom message, then directs the user where they can pay the ransom to obtain the passcode to their fi

Point of Sale Skimmer Fraud
Date

Point of Sale Skimmer Fraud

A couple of years ago thieves descended in large numbers on Chile to replace debit card readers in ATM machines with their own recording device to vacuum up stolen data. This type of crime is called skimming. They also installed tiny cameras in the ATMs to record the pin as users typed those in. T

The New HoneyPot: Area 1 Security
Date

The New HoneyPot: Area 1 Security

This writer has been saying for years that security products do not work 100% of the time. So there is the need to use several different approaches to cybersecurity. Even if intrusion detection tools worked 99.99% of the time then all it would take is 9,999 tries for the probability of someone pene

JP Morgan Hackers Plead Guilty
Date

JP Morgan Hackers Plead Guilty

Lots of people who follow cybersecurity news know that hackers stole data on 83 million customers at JP Morgan in 2014. But in a development that does not happen enough, now the hackers have been caught. Lots of criminal hackers operate from places like Russian and Romanian where they are pretty mu

Hackers find Metaphor Android Exploit
Date

Hackers find Metaphor Android Exploit

There is a new exploit that has been found to attack the previously known security weakness in the Android Stagefright multimedia library. The exploit lets a hacker take over an Android device. Here we explain how it works, what versions of Android it affects, and when you can expect it to be fixed

Screen Locking Tech Support Scams
Date

Screen Locking Tech Support Scams

It’s too bad most people don’t use Ubuntu. While your mom would not understand it, maybe your sister would. Because Windows has too many security vulnerabilities. It also has more viruses, because it has more users, so it is a bigger target. Yet the weakest part of any system, Windows or not, remain

Edward Snowden, Julian Assange, and Laura Poitras
Date

Edward Snowden, Julian Assange, and Laura Poitras

Oscar winning documentary filmmaker Laura Poitras has a new film. It’s about Julian Assange, the WikiLeaks founder. She was at the Cannes Film Festival previewing it this week.    In case you do not know who Laura Poitras is, she is the documentary film maker who Edward Snowden first cont

Hackers Attack SWIFT Penetrate System 2nd Time
Date

Hackers Attack SWIFT Penetrate System 2nd Time

Hackers have for the second time stolen money from banks using the SWIFT payment system. Now we have some technical details about the first attack. Usually when hacking news breaks the technical details are not given to the public. Often law enforcement tells the victim to keep those secret. Yet th

Is the US Army Cyber Command Effective or Not?
Date

Is the US Army Cyber Command Effective or Not?

The US Military has their own cybersecurity organization. It’s called the US Cyber Command. There is one for the Navy, Army, and Air Force.  Their main goal is to protect military communications but they also have attack capabilities. They say they use the same techniques as other hackers to go

How the US Military Built Encryption and the Internet
Date

How the US Military Built Encryption and the Internet

You might not know this, but the US Military created much of the encryption technology that we use today, including TOR, the cloaking software used by Edward Snowden and others. They also created SSL and the RSA algorithm. The US Military even invented the internet, in 1969. It was called ARPANET th