Content

File: cybercrime

The FDA has released new guidance on information security practices for medical devices. Many hospital’s information security staff are left to battle medical device vendors on their poor (or often non-existent) practices in maintaining software security patches and updates, and can refuse to support the device if these patches are applied by the hospital IT […]

Tagged: » » »

 » Read the rest

Gmail accounts being compromised by hackers and spammers happens all too often. If it hasn’t happened to you directly, you have undoubtedly received bogus emails from your contacts that were taken over by hackers, peddling work-from-home offers or often just a lonely unassuming (but malicious) link. If you or a friend are ever in this […]

Tagged: » » » » »

 » Read the rest

2011-10-27 :: Joshua Spencer // cybercrime
US Government Satellites Hacked

On the heels of the news that US Predator drones control stations were infected with malicious code, comes news that hackers managed to successfully penetrate US government defenses and gain operational control of two satellites, the Nandsat 7 and Terra AM-1. No major conclusions can be drawn from the limited information, but the upcoming report […]

 » Read the rest

On the surface it appears that the brains behind the London Olympics are taking information security considerations seriously for the 2012 games. They have hired 100 pen testers to simulate a range of attacks on the 2012 Olympic games such as various DDoS and virus attacks, in order to ensure that they are protected from […]

 » Read the rest

With the news of the USAF predator drone virus infection comes growing public concerns that the military is failing to provide adequate information security protections from  malicious attackers. Hopefully, an air gap is being implemented which prevented this infection from sending its payload “home”, wherever that may be. Unfortunately, knowing the scale of the US […]

 » Read the rest

Looks like this decade has alot to live up to. Have an opinion? Let me know in the comments. Story from wired.com: “It was the decade of the mega-heist, when stolen credit card magstripe tracks became the pork bellies of a new underground marketplace, Eastern European hackers turned malware writing into an art, and a […]

 » Read the rest