Report: IoT devices attacked their own network

A university IT system was brought to a near-standstill by a cyberattack from inside its own firewall, when connected devices on its internal network became infected with malware, and overloaded its DNS server.

financial news

Turkish hacker gets 8 years in $55M ATM milking scheme

by Shaun Waterman • 2 weeks ago

The sentence, which also included a requirement that Ercan Findikoglu pay back the $55 million, was announced by Robert Capers, U.S. attorney for the Eastern District of New York.

New malware works only in memory, leaves no trace

by Shaun Waterman • 2 weeks ago

Kaspersky researchers found the malware, which has been attacking banks and telecom companies, but leaves no trace on the hard drive.

While startups cashed in, total cybersecurity venture funding fell in 2016

by Chris Bing • 2 weeks ago

Venture capital firms invested roughly $3.1 billion into a record 279 cybersecurity startups last year, according to research published by CB Insights, Thursday. That figure represents a $600 million drop from 2015 to 2016. From an industry stand point, 2016 also saw a decrease in exits — otherwise known as business events in which a company is either sold or acquired. In short, investors make their money on exits.

Network size is no predictor of cyberattack readiness, penetration tests show

by Shaun Waterman • 3 weeks ago

Small companies were just as vulnerable as large ones in penetration testing performed by Rapid7 white-hat hackers.

‘Samuel Gold’ admits to hacking U.S. banks as part of cybercrime ring

by Chris Bing • 3 weeks ago

A Brooklyn, New York man plead guilty in federal court Friday of helping operate an international cybercrime ring that targeted U.S. banks and persons, court documents show.

Accountants join pushback on feds’ cyber rules for banks

by Shaun Waterman • 1 month ago

Three professional associations for bean-counters argue that any regulation should only set high-level principles or flexible frameworks — not specific or prescriptive rules which might be duplicative and could become quickly outdated as hacker threats evolve.