Security News

FBI: $1.45 Billion in Losses to Internet Crime Reported in 2016 (Security Week)
2017-06-26 19:19

The FBI has published its Internet Crime Report 2016 based on information received by the Internet Crime Complaint Center (IC3). It shows that 298,728 complaints were received by the IC3 during...

Internet crime: The continuing rise of the BEC scam (Help Net Security)
2017-06-23 15:07

Through its website, the FBI’s Internet Crime Complaint Center (IC3) accepts complaints about Internet-facilitated criminal activity, and forwards them to the appropriate law enforcement agencies...

FBI: Reported Internet-Enabled Crime Losses Hit $1.3 Billion (InfoRiskToday)
2017-06-23 14:18

Rising Attacks: CEO Fraud, Ransomware, Tech-Support Fraud, ExtortionThe FBI says reported losses due to internet crime last year totaled $1.3 billion, based on nearly 300,000 complaints logged...

Internet-Enabled Drill Demonstrates IoT Security Done Right (Threatpost)
2017-06-20 19:03

Researchers find flaws in an internet-connected drill, but say minimal, hard-to-find bugs indicate there is hope for IoT security.

Endpoint Security and the Internet of Things (Security Week)
2017-06-13 03:24

In 2016, the Mirai Botnet hijacked over half a million DVRs and IP cameras, redirecting traffic from these endpoints to some of the internet’s largest brands and taking many services offline. To...

Safety and Security and the Internet of Things (Schneier on Security)
2017-06-08 12:15

Ross Anderson blogged about his new paper on security and safety concerns about the Internet of Things. (See also this short video.) It's very much along the lines of what I've been writing....

Internet cameras have hard-coded password that can’t be changed (ArsTechnica)
2017-06-07 22:10

Cameras with multiple brand names are wide open to remote hacking.

Internet cameras expose private video feeds and remote controls (ArsTechnica)
2017-06-07 22:10

Cameras with multiple brand names are wide open to remote hacking.

Threat Modeling the Internet of Things Part 2: Three Steps to Pizza (Security Week)
2017-06-07 17:16

Part 1 of this series posited that the Internet of Things (IoT) needs a more rigorous security application than it currently has, lest we end up building another patchy, vulnerability-ridden...