Security News
Robert Lee, founder & CEO of Dragos, Inc., speaks with Dan Patterson about which countries pose a threat to US industrial infrastructures.
The founder and CEO of Dragos speaks with Dan Patterson about the US hacking other countries and its policies when responding to cybersecurity threats. Dan Patterson, CNET and CBS News Senior Producer, spoke with cybersecurity company Dragos, Inc., Founder and CEO Robert Lee about the role the US plays in hacking other countries as well as the policies for cyberattacks in the US that result in loss of life.
Dan Patterson speaks with cybersecurity expert Robert Lee about how Russia, Iran, China, and North Korea pose a threat to US industrial infrastructures. Robert Lee: The [countries] we've seen over the years would be Russia, Iran, China, North Korea-the normal players.
NSO Group - sued by Facebook for developing Pegasus spyware that targeted WhatsApp users - this week claimed Facebook tried to license the very same surveillance software to snoop on its own social-media addicts. The Israeli spyware maker's CEO Shalev Hulio alleged in a statement [PDF] to a US federal district court that in 2017 he was approached by Facebook reps who wanted to use NSO's Pegasus technology in Facebook's controversial Onavo Protect app to track mobile users.
Many U.S. government Web sites now carry a message prominently at the top of their home pages meant to help visitors better distinguish between official U.S. government properties and phishing pages. Here's a sobering statistic: According to PhishLabs, by the end of 2019 roughly three-quarters of all phishing sites were using SSL certificates.
Ransomware attacks are still happening, and more employees need to be trained on how to prevent them. TechRepublic's Karen Roby spoke with Rahul Kashyap, president and CEO of Awake Security, about the prevalence of ransomware and how to prevent it.
Ransomware attacks are still happening, and more employees need to be trained on how to prevent them.
DDoS attacks come in different sizes and types and it's not been revealed which methods were used beyond the fact the attacks lasted for hours. These days, DDoS attacks are not the potent weapon they once were, primarily because large websites are protected by a newer generation of defences trained on a number of large attacks, hijacking a widening range of protocols.
US Health and Human Services targeted by DDoS scum at just the time it's needed to be up and running
In an impeccable instance of horrible timing, the US government's Department of Health and Human Services says it fended off a cyberattack by online scumbags. The attack - presumably not a load of citizens hitting Uncle Sam's web servers looking for information - did not, we're told, have had any serious impact on operations, but with American's desperate for information about the coronavirus pandemic, the attempted takedown came at the worst possible time.
The U.S Department of Health and Human Services was the victim of a cyberattack on Sunday as the federal government attempts to deal with the coronavirus crisis, according to a report from Bloomberg. "The U.S. Health & Human Services fell victim to a Distributed Denial of Service attack yesterday when several endpoints controlled by a nation-state attacked their networks," Stephen Boyce, principal consultant at risk management and digital forensics firm Crypsis Group, said.