YOU ARE AT:TagsHackers

BROWSING: hackers

CISA: Chinese hackers are positioned in US infrastructure IT systems

U.S. federal agencies warned this week that a state-sponsored Chinese hacking group is positioned in critical infrastructure IT networks, including communications IT systems, and that they believe the hackers have had a presence in some IT networks for as long as five years. The Cybersecurity...

Samsung confirms ransomware attack

Samsung is the latest high-tech business to be victimized by ransomware group Lapsus$, which recently hit Nvidia.

Software AG, StarHub and the ‘blueprint’ for carrier-led industrial private 5G

Software AG remains set on its strategy to make mobile operators the go-to agents for private 5G in ‘vertical’ spectrum, and particularly in the Industry 4.0 space where it retains a developing crossover customer base in telecoms and industry. While most of the market...

IBM X-Force Red, Threatcare warn about smart city vulnerabilities

The team of researches have tested smart city systems from Libelium, Echelon and Battelle   A team of researchers from Threatcare and IBM X-Force Red have joined forces to test several smart city devices, with the specific goal of finding vulnerabilities in smart city systems. Earlier this...

Stages of a cyber attack

Virtual networks: a bullseye for hackers Virtualization of networks are on the rise as are cyber attacks. According to a report by FireEye and Mandiant, approximately 97% of organizations have had at least one hacker bypass there defense architecture. Moreover, network security devices like next...

IBM debuts universal encryption mainframe to combat hackers

IBM Corp. debuted Monday the encryption capabilities of its new z14 mainframe, otherwise known as IBM Z, which is focused on combating the growing threat of data breaches. The number of data breaches within the U.S. is on the rise. IBM purports universal encryption --...

How to secure smart cities from cyber vulnerabilities

Smart cities are paraded as technological utopias where everything, from traffic management to air quality control, is automated. Although the booming internet of things (IoT) offers a wealth of applications to improve city services, its success is not guaranteed. One of the great worries...

Looking beyond fingerprint sensors: ways to enhance smartphone security

The Motorola Atrix 4G was the first smartphone with a fingerprint scanner for quicker, more secure log in authentication. But the security feature's widespread use came about when Apple introduced it in its iPhone 5s back in 2013. Since then, Snapdragon-powered Android phones have...

Looking beyond fingerprint sensors: ways to enhance smartphone security

The Motorola Atrix 4G was the first smartphone with a fingerprint scanner for quicker, more secure login authentication. But the security feature's widespread use came about when Apple introduced it in its iPhone 5s back in 2013. Since then, Snapdragon-powered Android phones have made...

Connected cars: Hacks, crashes and purpose-built cities

It’s been a busy few days in the world of connected cars on many fronts. There’s been a live-hack, the crash of an autonomous car resulting in injuries and the discovery of a city that exists solely for the purpose of connected car testing. Let’s...

Hackers plan to remotely hijack connected car

DARPA researchers plan to demo vulnerability of connected car at conferences WASHINGTON – Cybersecurity researchers Charlie Miller and Chris Valasek, funded by the federal government, announced they will publicly hack a connected car or truck. The duo received a 2013 grant from the Defense Advance Projects...