139 results
tagged
cyber-security
OV-chipkaartfraude: Twee IT’ers kraakten de ov-chipkaart en werden – uiteindelijk – gepakt en veroordeeld. Maar ze legden wel de kwetsbaarheid van het systeem bloot. Voor de twee collega’s was het „een avondprojectje”.
For three years, WIRED has tracked the elite and shadowy Russian vanguard of cyberwar.
The Chinese government has been working for several years on a comprehensive Internet security/surveillance program. This program is based on the
De zomer is voorbij en er moet weer gewerkt worden. Daarom bezoek ik borrels en recepties waar mensen samenkomen in het voornemen fris aan de slag te gaan. Nog een laatste bitterbal, daarna wordt het ernst. En omdat ik schrijver ben, leggen de receptiegangers me uit hoe corruptie in hun kringen werkt, dan ben ik ook weer bijgepraat. „Jij weet het natuurlijk niet, want jij leeft in je eigen veilige…
A group of likely Chinese hackers has poisoned the software of at least six companies in just the last three years.
The TajMahal spyware includes more than 80 distinct spy tools, and went undetected for five years.
In February 2019, positive advancements were made regarding security standards in consumer Internet of Things (IoT) devices: The European Telecommunications Standards Institute (ETSI) published a standard numbered TS 103 645, more appealingly named “Cyber Security for Consumer Internet of Things”. Under this new standard, compliant products will be expected to have unique passwords, a vulnerability …
Google wants to get rid of URLs. But first, it needs to show you why.
Alex Stamos on the risks of giving his former employer and other giant platforms the power to determine what people can—and can’t—say online.
A meticulous analysis of online activity during the 2016 campaign makes a powerful case that targeted cyberattacks by hackers and trolls were decisive.
The company you hired to snoop on your kids' phones uploaded all their data to an unprotected website
New analysis from mobile security firm Lookout shows that malware authors are taking full advantage of 'Fortnite' ditching the Google Play Store.
The indictment makes a compelling case that the hack of the Democratic Party was a highly-structured, officially sanctioned Russian intelligence operation.
Access Now is urging the conference organizers to take steps immediately to ensure an inclusive, representative, and fully informed discussion.
A cybersecurity style guide
A new twist on the classic Nigerian Prince scheme has jumped from gaming communities to Twitter. And now it's spreading.
Onvermoeibaar woordvoerder van de Nederlandse digitale beveiliging Ronald Prins vertrekt als directeur bij Fox-IT. Hij houdt een pleidooi voor beveiliging van het digitale domein als openbare ruimte.
The big news in crypto today is the KRACK attack on WPA2 protected WiFi networks. Discovered by Mathy Vanhoef and Frank Piessens at KU Leuven, KRACK (Key Reinstallation Attack) leverages a vulnerab…
Reports that Russia used Kaspersky antivirus to probe US targets highlight the inherent risks of software that millions rely on for protection.
The Russian government used a popular antivirus software to secretly search computers around the world for classified U.S. government documents and top-secret information, according to current and former U.S. officials with knowledge of the matter.
Tool now owned by security firm Avast was hacked via a supply chain attack, an increasingly common method of infection
It’s now been about a week since Equifax announced the record-breaking breach that affected 143 million Americans. We still don’t know enough — but a few details have begun to com…
Autonomous vehicles have long been seen as a major security issue, but experts say they’re less vulnerable to hacks than human-controlled vehicles
Hackers behind attacks such as WannaCry might not have become hugely rich, but that doesn’t mean they are going to give up any time soon
Hiding the small movement inside the big movement
It's not easy keeping billions of devices safe from phishing attacks. Here's how Google pulls it off.
Chinese law requiring internet companies to spy on users comes into effect this week
Big tech firms say they are the only providers of large cybersecurity services – even as their products are compromised. The conflict of interest is huge
WannaCry is yet another systematic breakdown in security: the blame, though, is less with Microsoft and end users — nor the government — but rather a mismatched business model.
Mens en machine vergroeien steeds meer. Wat is menszijn nog in cyborgtijden? Dat wil de nieuwe Hollywoodfilm Ghost in the Shell verkennen. Maar de film verzaakt. Kijk dus vooral het briljante anime-origineel uit 1995.
The Pentagon is paying hackers to test its key internal systems for vulnerabilities.
Obama took cyber seriously and tried to tame it, but we’re no safer in cyberspace today than we were eight years ago, experts tell Nextgov.
This year was a busy one for security and hackers. We expect more of the same in 2017, with a few new twists.
This year (2016) I accepted as much incident response work as I could. I spent about 300 hours responding to security incidents and data…
It's going to take years to move past Mirai, the botnet that's causing havoc online.
San Francisco Municipal Railway riders got an unexpected surprise this weekend after the system’s computerized fare systems were apparently hacked. According to the San Francisco Examiner, the MUNI...
A couple years back, in 2014, Ward Cunningham wrote a piece on wiki called “Internet of Broken Things”. After dealing with the failure of a home sensor network he wrote: This is how the…
Campaign affected 22 ad networks, 113 legitimate sites
Dan Kaminsky, onderzoeker bij beveiligingsbedrijf White Ops, stelde tijdens zijn keynote op de Black Hat-conferentie dat het internet in zijn huidige staat geen garantie is. Volgens hem is het nodig om een centraal orgaan aan te wijzen dat voor stabiliteit zorgt.
After sparking a 1.4 million vehicle Chrysler recall, the security researchers offer a new lesson: It could have been---and could still be---much worse.
Peiter "Mudge" Zatko and his wife Sarah, formerly of the NSA, developed software that's already helped find flaws across 12,000 pieces of software.
There is some circumstantial evidence that the hack may have originated in Russia, but there are many questions that haven’t been resolved
Americans are right to ask for proof before accepting the idea that Russia was behind the hacking of the DNC; Edward Snowden says the NSA could provide it.
The rise of the Internet of Things threatens to make it much easier to cause real-life damage through cyberattacks.
België staat bovenaan een lijst met landen die het meest kwetsbaar zijn voor hacks. Nederland komt in de top 50 niet voor.