Security News

Wi-Fi networks in hotels typically favor guest convenience over strong security practices, says the FBI. As the coronavirus pandemic and lockdown have forced a shift to remote work, many people are working not just from home but from public locations. In a new warning about hotel Wi-Fi, the FBI provides several tips on how to protect yourself when using such a public network.

DDoS attacks would either slow down election-related public-facing websites or render them inaccessible, thus preventing voters from staying updated with voting information or from accessing voting results. "The public should be aware that if foreign actors or cyber criminals were able to successfully conduct DDoS attacks against election infrastructure, the underlying data and internal systems would remain uncompromised, and anyone eligible to vote would still be able to cast a ballot," the FBI and CISA note.

The FBI and Cybersecurity and Infrastructure Security Agency released a warning on Monday alerting the public about the potential for widespread disinformation campaigns designed to cast doubt about the legitimacy of the coming elections in November. The FBI and CISA have no information suggesting any cyberattack on US election infrastructure has prevented an election from occurring, compromised the accuracy of voter registration information, prevented a registered voter from casting a ballot, or compromised the integrity of any ballots cast."

Threat actors are expected to spread false information regarding hacked voter information and voting systems, the Federal Bureau of Investigation and the Cybersecurity and Infrastructure Security Agency say in an alert. At the time, the agencies noted that disinformation campaigns might leverage websites, social media, and other venues to disseminate false information about voter suppression, cyber-attacks on election infrastructure, fraud, and other issues.

Bad actors could create or change websites and social media content to discredit this year's electoral process, cautions the FBI and CISA. The 2020 presidential election promises to be a rough and divisive one. A new message from the Federal Bureau of Investigations and the Cybersecurity and Infrastructure Security Agency warns voters of the likelihood that foreign actors and cybercriminals will try to propagate fake news about the election results to discredit the process and weaken confidence in the US political system.

Threat actors are expected to launch disinformation campaigns targeting the results of the 2020 elections in the United States, the Federal Bureau of Investigation and the Cybersecurity and Infrastructure Security Agency said in an alert this week. Spreading disinformation on the results of the elections represents a threat to the credibility of the electoral process, meant to undermine confidence in the democratic institutions in the United States, the alert reads.

A nine-month international operation spearheaded by the FBI has led to the arrest of 179 people across the world for selling drugs on the dark web. Operation DisrupTor, announced on Tuesday, also resulted in the seizure of $6.5m in cash and cryptocurrency as well as a 500kg haul of illegal drugs and 63 guns.

The United States government today announced charges against 5 alleged members of a Chinese state-sponsored hacking group and 2 Malaysian hackers that are responsible for hacking more than 100 companies throughout the world. The later indicted three Chinese hackers are associated with a network security company Chengdu 404 Network Technology, operated as a front by the People's Republic of China.

The FBI is worried that Ring doorbell owners can use footage collected from their smart devices to keep tabs on police, newly uncovered documents show. The FBI document outlines how Ring surveillance footage could present new "Challenges" for law enforcement.

The Cybersecurity and Infrastructure Security Agency and the Federal Bureau of Investigation have issued an alert to warn of a voice phishing campaign targeting the employees of multiple organizations. According to the two agencies, the attackers used social media, recruiter and marketing tools, open-source research, and publicly available background check services to harvest information on employees at the targeted organizations, including their names, addresses, and phone numbers, along with information on their position and duration at the company.