#College Pals From #China Became Among Most Prolific #Hackers Ever, U.S. Says | #TpromoCom #Hacker #CyberSecurity | Justice Department accuses pair of hacking Covid-19 research, military secrets and dissidents
They were former classmates who studied computer technologies at an electrical engineering college in southwestern China’s Sichuan province. But instead of a conventional post-college career path, Li Xiaoyu and Dong Jiazhi embarked on a global hacking spree that became one of the most prolific ever tracked by the FBI, according to Justice Department officials and an indictment unsealed Tuesday.
#FBI Arrests #Hacker Who Stole #Data from Tech Company | #TpromoCom #Espionage #Gov | A nightmare scenario for many organizations recently became one Atlanta-based tech company’s reality. But the steps the company took before and after their sensitive data was stolen by a hacker in 2018 helped the FBI identify and arrest the culprit.
Christian Kight used his computer programming skills to hack into various businesses for money while on parole for previous crimes. Kight downloaded scripts from hacker forums and used them to attack company networks.
In the case of the Atlanta company, Kight spent a few weeks hacking into the company’s network, using various tactics to hide his identity. He then downloaded the data to his own computer and deleted it from the company’s systems.
#Security Practitioners do recognize #COVID19 as an active biological #health threat. Use specific protocols for technology, equipment and layered manpower. All of which can be found on #ISIO. Be assured of our highest considerations. https://bit.ly/30OAyoo
#WHO, coronavirus testing lab hit by #hackers as opportunistic attacks ramp up | #TpromoCom #COVID19 | The World Health Organization has reportedly seen attempted cyberattacks double since the onset of the COVID-19 crisis, and a vaccine testing facility has also been targeted with ransomware.
According to Reuters, WHO has seen a marked increase in attempted cyberattacks – with one of the most recent reportedly perpetrated by a hacker group called DarkHotel. The unsuccessful attack spoofed a webpage to look like a login portal for agency employees in an attempt to steal passwords.
To read the remainder of this news story, click here.
#Security Integrators and #Alarm Dealers looking for new sources of #RMR | #Verdafero #Energy | Verdafero of San Jose is a 3rd party service provider, offering Cloud-based utility monitoring to commercial and industrial clients through companies like yours. If you’re looking for a new source of RMR, look no further–here it is: https://bit.ly/3adrBa1
Distributed denial-of-service (#DDoS) Attack #Trends Reveal Stronger Shift to #IoT, #Mobile | #TpromoCom | Attackers are capitalizing on the rise of misconfigured Internet-connected devices running the WS-Discovery protocol, and mobile carriers are hosting distributed denial-of-service weapons.
DDoS attacks remain a popular attack vector but have undergone changes as cybercriminals shift their strategies. Today’s attackers are turning to mobile and Internet of Things (IoT) technologies to diversify and strengthen their DDoS campaigns, research shows.
To read the remainder of this article, click here.
Risk of heightened cyber crime on “as a service” models | #TpromoCom #Cyber #CyberSecurity #CyberCrime | Cipulse 2020, is the annual threat landscape report from Cyberint a provider of threat intelligence-led detection.
It reveals the growing e-crime economy, the increasing prevalence of attacks in the financial services, retail, and government sectors, and in-depth analyses of adversarial tactics, techniques, and procedures (TTPs) used against the different regions and industries.
According to the Cyberint the financial industry is the most targeted industry worldwide, accounting for more than one third of all targeted attacks, and the retail industry is the third most targeted worldwide, behind manufacturing in the Americas and government targets in APAC and EMEA.
Banking trojans top the most prevalent malware families observed during 2019, and the volume of attacks is increasing due to the sale of “As a Service” platforms allowing less sophisticated attackers access to more complex tools for as low as several US dollars a month.
To read the remainder of this news article, click here.
National #CyberSecurity Awareness Month | #ESC_LLC #CyberCrime | During October, the Division of Financial Institution will be sharing cybersecurity information and resources to help individuals and organizations protect their money and recognize risks.
he Ohio Department of Commerce and National Cyber Security Alliance are urging Ohioans to be safer online during National Cyber Security Awareness Month.
The 2019 theme, “OWN IT. SECURE IT. PROTECT IT.” is to emphasize online safety and the importance of cybersecurity practices at home, on the go and in the workplace.
To read this informative news article, click here.
Video: Couple says Nest home security system hack turned into worst nightmare ever | #TpromoCom #Nest #Security #DIY | A Nest security system at a couple’s house in Wisconsin was anything but secure, causing a nightmare for the homeowners after it was hacked. Google says otherwise.
MILWAUKEE – It seems the system worked fine until last week when Samantha Lamont said she returned home from work Tuesday and discovered the temperature inside her home was 90 degrees. She told WITI-TV she thought it was a glitch and reset the thermostat, but what followed was anything but a glitch.
“My heart was racing,” she said. “I felt so violated.”
The hacker reset the couple’s thermostat to 90 degrees and even spoke to them through their kitchen camera before playing vulgar music, they said.
To read the remainder of this most interesting story, click here.
Cisco ‘Knowingly’ Sold Hackable Video Surveillance System to U.S. Government | #TpromoCom #Hacker #VideoSurveillance #Legal | Cisco Systems has agreed to pay $8.6 million to settle a lawsuit that accused the company of knowingly selling video surveillance system containing severe security vulnerabilities to the U.S. federal and state government agencies.
The lawsuit began eight years ago, in the year 2011, when Cisco subcontractor turned whistleblower, James Glenn, accused Cisco of continue selling a video surveillance technology to federal agencies even after knowing that the software was vulnerable to multiple security flaws.
According to the court documents seen by The Hacker News, Glenn and one of his colleagues discovered multiple vulnerabilities in Cisco Video Surveillance Manager (VSM) suite in September 2008 and tried to report them to the company in October 2008. (click here)
Editor’s Note:For many years, I sought to warn security dealers of the risks of using specific brands recently named by the U.S. Government as being off limits to all federal applications. At the time, as the administrator with the CCTV Security Technicians Forum on Facebook, many members suggested that this only pertains to government use, which is correct, so they were going to continue selling those specific brands. My message to all dealers now as it was then, is that in the end analysis, if a CCTV system you sold and installed is hacked, and you knowingly sold it to the client, you could possibly be susceptible to legal action on the part of the client. –Al Colombo