Cyber Security Insight

Picking up from the previous post, Kevin Roose of Fusion experienced the effects of pentesting on his own network in order to pinpoint vulnerabilities. After going through the rigorous process of having two equally skilled cyber security professionals hack into his network and disrupt it as much as...

PenTesting, or Penetration Testing, is the next big thing in the pursuit of impenetrable cyber security protection. Ironically, it involves a company's network being maliciously attacked by "hackers" - aka a hired cyber security company - in order to discover vulnerable endpoints. Kevin Roose, a writer at Fusion,...

In a rare turn of events, the creators of the ransomware TeslaCrypt actually turned over the very key that unlocks their malicious program. An analyst at ESET happened to notice that TeslaCrypt was slowly shutting down over the past few weeks. On a whim, he requested that...

Myspace, though mostly forgotten, is not gone - while it has been rendered obsolete by Facebook and other social media behemoths, its user account data still lives and thrives to this day. Unfortunately that also means these accounts are just as vulnerable to cyber attacks...

Skimer, originally surfacing in 2009, is back and stronger than ever. For those who are unfamiliar, Skimer gives hackers complete access to an ATM without needing to install any kind of physical hardware. At one point, that was the only way a fraudster could steal...

Hacked hospital equipment: the immediate assumption is that it's a reference to the computers that store medical data, and not the machines controlling the amount of anesthesia given to a patient. In this increasingly interconnected world, where remote surgeries are fairly commonplace, the latter option is becoming...

If any one of your account passwords had been stolen, would you be able to put a price on it? Plenty of stolen passwords, with and without usernames attached, are up for grabs across the Internet. The most recent treasure trove comes from a years-old...

Though the big tax season push is officially on hiatus until next year, that doesn't stop the occurrence of malicious attacks aimed at retrieving sensitive tax data throughout the year. The most recent victims in this type of targeted attack are ADP and US Bank - two major...

Google Play Store users confronted an unfortunate surprise when illegitimate banking applications were outed on the popular site. A cyber security risk doesn't faze mobile device owners as they download an application from the online store of their choice (Apple, Google, and others) without a second thought. The...

Cyberespionage group Platinum is utilizing an obscure Windows feature called hotpatching to better hide malware from security monitoring. The attacks are prevalent throughout South and Southeast Asia, in particular Indonesia, China, and Malaysia. Platinum has been operational since 2009 and tends to lean toward spear phishing...