Tag: cyberattacks

Poland: Back to the Past

Poland: Back to the past. This article is about the information security landscape of Poland, including its history, current state, and the information security requirements for IT professionals. The article is being published on the website of the Polish Ministry of the Interior and Foreign Affairs, the Polish Institute of Internal Affairs, Polish Parliament in…

Read More

Honeywell Smart Sensor Hub Plus Is Targeted

Published in a number of mainstream news sources including The Huffington Post, CNET, TechRadar, The Information, The Daily Beast, and Wall Street Journal. Hackers are now taking advantage of IoT devices to target smart homes. An analysis of data that’s been collected by a home security firm indicates an outbreak of ad-based malware attacks that…

Read More

School Leaders ‘Warn’ About COVID-19 Hotspots

School leaders ‘warn’ COVID hotspots | Antivirus & Malware. As the COVID-19 pandemic has impacted millions of people around the globe, school leaders, parents, and teachers have been warning about the potential for new outbreaks or the spread of existing ones. But in a recent article published by the New York Times, they warn that…

Read More

Senators, Staff and Other Advocates Issue a Letter urging Senate Leadership to Invest in Lab Infrastructure

A collection of Senators, staff and other advocates have issued a letter urging Senate leadership to invest in the security of lab infrastructure to provide the “expert’s ability to detect and contain cyber threats. ” The letter was signed by more than a dozen senators, including Senate Majority Leader Harry Reid, Senate Rules Committee Chairman…

Read More

Ford Co-Pilot360 Driver Assistance System

Automotive companies have invested hundreds of millions of dollars in new technologies and new platforms to compete better against their competitors. The new Ford Co-Pilot360 is the latest example. The idea is simple: When an automobile is in motion, all the sensors and software in the vehicle record sensor data to generate an event log,…

Read More

Financial Malware Attack in UAE

This short article presents brief information about the financial malware attack, which affected UAE’s financial sector, starting from September 2019. The attacker was responsible for launching the attack against several financial providers but the aim was to obtain personal data of the victims and to use that data against them. This attack demonstrates UAE’s vulnerability…

Read More

The Threat Models of the Information Security Market

[Editor’s note: I originally authored this piece in October 2016 and it was reviewed by several prominent security analyst firms. I have recently revised, resubmitted, and republished this piece due to the current interest it has garnered. It has also been reviewed by several other security analysts, and I have received positive feedback. For more…

Read More

US accuses China of Hacking Microsoft

US accuses China of hacking Microsoft. The US government has accused China of “unmasking” U. intellectual property by stealing the personal information of millions of people through hacking attacks launched in retaliation for the September 11, 2001 attacks. The government’s accusation, made to the Committee on Foreign Investment in the United States (CFIUS), also claims…

Read More

Network Security and Security News – The New Zealand Government’s Links Between Chinese Government-Sponsors and Malicious Cyber Activity

Network Security and Security News is not responsible for the information presented on this page. We strongly recommend that you use common sense and verify information for yourself. It is important to note that any and all postings, comments, etc. by New Zealanders on this webpage are solely their responsibility, as they stand and reflect…

Read More

IoT Malware Attacks – An Overview

In this paper, we point out that IoT malware is developing new and advanced attacks against computer networks. IoT malware is often used by its authors for espionage, for instance to obtain the credentials of a remote organization where the malware has been installed and then to access its network in order to send information…

Read More