Kim Dotcom faces extradition to the US
A New Zealand court ruled on Monday that internet entrepreneur Kim Dotcom could be extradited to the United States to face charges relating to his Megaupload website, which was shut down in 2012 following an FBI-ordered raid on his Auckland mansion. The Auckland High Court upheld the decision by a lower court in 2015 on […] more…How Google fought back against a crippling IoT-powered botnet and won
In September, KrebsOnSecurity—arguably the Internet’s most intrepid source of security news—was on the receiving end of some of the biggest distributed denial-of-service attacks ever recorded. The site soon went dark after Akamai said it would no longer provide the site with free protection, and no other DDoS mitigation services came forward to volunteer their services. […] more…EyePyramid and a Lesson on the Perils of Attribution
In the past weeks, information-stealing malware EyePyramid made headlines after it was used to steal 87GB of sensitive data from government offices, private companies and public organizations. More than 100 email domains and 18,000 email accounts were targeted, including those of high-profile victims in Italy, the U.S., Japan and Europe. The natural assumption for many […] more…Critical flaw lets hackers take control of Samsung SmartCam cameras
The popular Samsung SmartCam security cameras contain a critical remote code execution vulnerability that could allow hackers to gain root access and take full control of them. The vulnerability was discovered by researchers from the hacking collective the Exploiteers (formerly GTVHacker), who have found vulnerabilities in the Samsung SmartCam devices in the past. The flaw […] more…Resolved: Wireless authentication problems
Between 5:18 PM and 6:48 PM this evening wireless users in the buildings listed below would have been unable to authenticate onto the psu network. OVPIT identified and resolved an issue with a radius authentication server responsible for authentication for wireless networks for the buildings listed. For more information, please reference INC0441811. Arboretum Computer FarmServ […] more…Businesses as Ransomware’s Goldmine: How Cerber Encrypts Database Files
Possibly to maximize the earning potential of Cerber’s developers and their affiliates, the ransomware incorporated a routine with heavier impact to businesses: encrypting database files. These repositories of organized data enable businesses to store, retrieve, sort, analyze, and manage pertinent information. When utilized effectively they help maintain the organization’s efficiency, so holding these mission-critical files […] more…App Store Flooded with Phony Retail Apps to Kick Off Holiday Season
The holiday season has officially kicked off, which means a number of things for many of us: seasonal cheer, quality time with loved ones, and admittedly for many, lots and lots of shopping. And these days, many of holiday retail sales are happening online. Unfortunately, that also means now more than ever, there’s more holiday-related […] more…Teaching Kids to Rise Above the Twitter Trolls
The social media platform Twitter has been making the headlines every day lately and not for good reasons. The popular 140-character driven network is under fire for its increasingly troll-heavy content and its failure to regulate abusive tweeters. From celebrities shutting down accounts to politicians and special interest groups daily (and very publically) engaged in […] more…How to Secure the Future of the Internet of Things
The world of security for the Internet of Things just became more complex. IoT devices are no longer a potential threat to their owners; now they pose a significant threat to everything connected to the Internet. The old IoT security problem For the past year, the cybersecurity and IoT communities have been at odds regarding […] more…Journalists must fork over $200 for Wi-Fi at presidential debate
News organizations attending Monday evening’s presidential debate must pay $200 for a “Secure Wireless Internet Connection” at Hofstra University in New York state. The debate is set to begin at 9pm Eastern. While profiteering during a high-profile occasion such as this is not unheard of—$15 for a patch cable?—what’s worse is that event staff at […] more…Resolved: Wireless Authentication Degradation
From 9:49 until 10:30 some users may have experienced issues connecting to the wireless environment. The cause was one of the authentication servers, RADIUS, had stopped responding to requests. It was restarted at 10:30 and things have been working normally since. ITS is looking into why the server stopped responding. The areas that may have […] more…Can Internet of Things be the New Frontier for Cyber Extortion?
The Internet of Things (IoT)—the network of devices embedded with capabilities to collect and exchange information—has long been attracting the attention of cybercriminals as it continues to gain momentum in terms of its adoption. Gartner has estimated that more than 20.8 billion IoT devices will be in use by 2020; IoT will be leveraged by […] more…The Jeep hackers return to ditch a car going 60 mph
The new attack can spin a steering wheel 90 degrees and get you into a ditch, or worse, at any speed more…Fiat Chrysler launches Detroit’s first bug bounty program for car hackers
It’s the first of the big three US auto makers to grab the steering wheel on this whole find-vulnerabilities, steer-a-car-into-a-ditch endeavor. more…Got privacy? If you use Twitter or a smartphone, maybe not so much
The notion of online privacy has been greatly diminished in recent years, and just this week two new studies confirm what to many minds is already a dismal picture. First, a study reported on Monday by Stanford University found that smartphone metadata — information about calls and text messages, such as time and length — can […] more…Badlock, another ‘major’ security bug that puts profits before patches
Some have accused the developer of profiteering by publicly revealing a vulnerability that amounts to effectively fixing their own code. more…More information
- Telecom New Zealand admits YahooXtra email accounts were hacked
- Sony’s Hirai praises staff in hack, hails freedom of speech
- Microsoft Internet Explorer CVE-2014-4137 Remote Memory Corruption Vulnerability
- Electronic Theses and Dissertations (eTD), Honor Theses (eHT), and ScholarSphere Service Interruption 7/21/2016
- Cisco Systems Joins Microsoft, IBM in Vatican Pledge to Ensure Ethical Use and Development of AI
- Router Reloads Scheduled
- FTC settles suit with company behind Bieber fan site over kids’ data collection
- Number Nine! Chrome fixes another 2022 zero-day, Edge patched too
- Productivity and the risks of ‘quiet quitting’
- Snapchat, Yahoo, Mavericks and T-shirts – 60 Sec Security [VIDEO]