Tag Archive for: seen.

Alleged NSA data dump contain hacking tools rarely seen

A stolen cache of files that may belong to the National Security Agency contains genuine hacking tools that not only work, but show a level of sophistication rarely seen, according to security researchers.

That includes malware that can infect a device’s firmware and persist, even if the operating system is reinstalled.  

“It’s terrifying because it demonstrates a serious level of expertise and technical ability,” said Brendan Dolan-Gavitt, an assistant professor at New York University’s school of engineering.

He’s been among the researchers going over the sample files from the cache, after an anonymous group called the Shadow Brokers posted them online.

To read this article in full or to leave a comment, please click here

Network World Security

Hackers of Apple, Facebook seen as independent group seeking money

SAN FRANCISCO (Reuters) – A hacking group best known for breaking into top-tier technology companies Apple Inc, Facebook Inc and Twitter Inc more than two years ago is now believed to be one of a handful of highly skilled independent gangs pursuing …
mac hacker – read more

China seen issuing eIDs soon to improve internet security – EJ Insight


EJ Insight

China seen issuing eIDs soon to improve internet security
EJ Insight
A promotional booth set up by China's Ministry of Public Security as it gears up to launch eID cards. Photos: www.cac.gov.cn, eid.cn. HomeWorldGreater China. Jun 10, 2015 3:02pm. China seen issuing eIDs soon to improve internet security. Chinese …

“internet security” – read more

Sharp rise seen in attacks using stolen credentials

Organizations are seeing a sharp increase in attacks using stolen account credentials, with crooks using new techniques to beat fraud detection systems, according to Gartner.

Gartner clients have reported a “significant rise” over the last two months in the use of stolen credentials to access accounts, wrote fraud expert Avivah Litan in a blog post Thursday.

The hackers are trying to access systems related to credit cards and financial data, digital currency, travel rewards and high-end fashion — “anything and everything that has monetary or resale value,” Litan wrote.

To read this article in full or to leave a comment, please click here

Network World Security