Cyber Security News

Stolen Healthcare Data For Sale on the Deep Web
Date

Stolen Healthcare Data For Sale on the Deep Web

The Deep Web is that part of the internet where hackers sell exploit kits and stolen data. Such sites are often hard to find. Many require an invitation from someone else to join. Some, like AlphaBay, hide behind the Tor network. TrendLabs Security reports that data stolen from US hospitals is show

Security Hazards for Manufacturers using ICS Protocols
Date

Security Hazards for Manufacturers using ICS Protocols

The massive DDOS attack on the Akamai CDN (content distribution network) that last year took down Netflix, Amazon, and others because of compromised IP cameras that were using a default password shined the spotlight on IoT security. In particular, there is the concern about attacks on heavy industri

More Vulnerabilities found in Adobe Flash
Date

More Vulnerabilities found in Adobe Flash

As we have said before, it seems hardly a week goes by without an announcement of another security weakness found in Adobe Flash. This week we discuss two. HTML5 was supposed to replace Adobe Flash. The goal was to have a standard that browser designers could use to process video without having to

Metasploit Penetration Testing Software
Date

Metasploit Penetration Testing Software

Metasploit is a tool that white hat hackers use to do penetration testing. No doubt criminals use it too. What Metasploit does is take exploits gathered by thousands of contributors and package them into scripts and a command line and web interface so that security admins and analysts can test if a

Microsoft Security Bulletins and Advisories
Date

Microsoft Security Bulletins and Advisories

Microsoft publishes security bulletins and advisories here. Those warn of vulnerabilities in Microsoft products.  You can sign up for updates via RSS or email here. They say: “To improve security protections for customers, Microsoft provides vulnerability information to major security software

Americans Release Technical Details of Russian Hacking
Date

Americans Release Technical Details of Russian Hacking

The Department of Homeland Security and FBI Have released technical details of the hacking of the Democrat Party and Clinton Campaign that they first described in this document in October. As President Obama promised, the government has released proof that this hacking came from Russian intelligence

Phishing Attack tied to DNS Record Update
Date

Phishing Attack tied to DNS Record Update

It seems hackers also go after people who are supposed to be educated about the dangers of phishing: tech professionals. Last week I updated the DNS records for my personal email domain. So I was easily tricked when a few hours later I got this email that looks very much like it came from Google su

Chinese Planted Spyware on Massive number of Android Phones
Date

Chinese Planted Spyware on Massive number of Android Phones

The The New York Times, under the scary headline “Secret Backdoor in Some U.S. Phones Sent Data to China, Analysts Say,” reported that Kryptowire security researchers reported that a Chinese firm Shanghai Adups Technology Co. Ltd has planted software on hundreds of thousands of Android devices and i

Windows 2016 Server New Security Features
Date

Windows 2016 Server New Security Features

What are some of the new security features in Windows 2016? Windows 2016 is the soon-to-be released version of Windows server software. The Server version of Windows is the software designed to power business, engineering, and other applications. It is not for desktop users. Prior to Windows 2016 t