Hacking

SHA-1 Collision Spells the End for Old Algorithm
Hacking, Privacy

SHA-1 Collision Spells the End for Old Algorithm

Engineers at Google have created the first SHA-1 collision, an achievement that should lay to rest any remaining doubts about the practical security of the hash function. Cryptographers and security researchers have been warning about weaknesses in SHA-1 for several years, saying that modern computing power would soon put a […]

Security Lessons From Snowden
Hacking, Privacy

Security Lessons From Snowden

SAN FRANCISCO–Working in the security field offers ample opportunity to learn from your mistakes, and perhaps no organization has had to go through that process more publicly and painfully than the National Security Agency. The failures that led to Edward Snowden walking out the door with a massive cache of […]

Security Teams Are Becoming Cyber Espionage Investigators
Hacking

Security Teams Are Becoming Cyber Espionage Investigators

SAN FRANCISCO–As cyber espionage has moved from the government sector into the corporate world, enterprise security professionals have found themselves needing to become investigators to deal with the threat. But without real expertise and experience with investigations, even the best security teams can miss serious compromises in their environments. “Cybersecurity professionals don’t […]

‘When Computers Start Killing People, There Are Going to Be Consequences’
Device Security, Hacking

‘When Computers Start Killing People, There Are Going to Be Consequences’

SAN FRANCISCO–The massive, rapidly expanding network of insecure IoT devices is becoming so large and unwieldy that it will inevitably attract attention from government regulators in the near future. And that’s actually a positive development, security experts say. “As everything becomes a computer, computer security becomes everything security. The beachhead […]

Macro-Enabled Malware Targets macOS
Hacking

Macro-Enabled Malware Targets macOS

A new piece of malware that targets macOS appears to be the first one that includes one of the favorite tricks of Windows malware authors: the use of macros. The malware, discovered recently by researchers, is delivered through the use of a rigged Microsoft Word document that is disguised as […]

FBI Targets Extensive Cybercrime Ring
Hacking

FBI Targets Extensive Cybercrime Ring

A Brooklyn man has pleaded guilty to charges as part of an FBI investigation into a banking malware and money mule scheme that has been running since 2015 and cost victims more than $1 million. The plea from Vyacheslav Khaimov was for his role in the scam, which the FBI alleges […]