Cyber Security News

Recent Massive DDoS Attack caused by IoT Devices
Date

Recent Massive DDoS Attack caused by IoT Devices

Last week we wrote about a massive DDoS attack on DYN.com that cut off access to Netflix, Amazon, and many other sites for users in large parts of the USA. Now we know that this was caused by IoT devices. IoT (The Internet of Things) is a technology that is rolling out quickly. What this does is co

Pegasus Spyware Targets iOS
Date

Pegasus Spyware Targets iOS

An activist in the Middle East in August of this year noticed odd text messages coming to his phone. It turns out that those were instructions coming from the command and control center for Pegasus Spyware telling the Spyware what actions to take. The activist alerted Citizen Lab who contacted the

Hacking Self Driving Cars
Date

Hacking Self Driving Cars

Recently the American government issued guidelines for driverless vehicles. This creates national standards so that car manufacturers do not have to figure out how to follow 50 different laws in 50 different states. Analysts have said these rules seek to make this market grow without imposing a heav

The Myth of Password Complexity
Date

The Myth of Password Complexity

The newspapers have finally reported what thinking people have already figured out for themselves. What we have been told for decades about setting password policies is based on illogical thinking. The Fallacy of the Complicated PasswordIf you have set up Active Directory, LDAP, or any application

Cryptography and Ransomware
Date

Cryptography and Ransomware

Ransomware is based on the idea that the victim cannot decrypt their encrypted files with a key because it would be impossible to guess the value of the key. The hacker who has encrypted a file like this will sell the victim this key. So you could say that they have held their file hostage and are

Hackers Steal Facebook User Access Tokens from Epic Games
Date

Hackers Steal Facebook User Access Tokens from Epic Games

Hackers this week stole 800,000 user tokens from Epic Games. Much of that was Facebook data.   When you go to a website that lets you login with your Google or Facebook credentials, that site exchanges data with Google or Facebook. Those social media sites issues some kind of token, which you