Cyber Security Insight

Skimer, originally surfacing in 2009, is back and stronger than ever. For those who are unfamiliar, Skimer gives hackers complete access to an ATM without needing to install any kind of physical hardware. At one point, that was the only way a fraudster could steal...

Hacked hospital equipment: the immediate assumption is that it's a reference to the computers that store medical data, and not the machines controlling the amount of anesthesia given to a patient. In this increasingly interconnected world, where remote surgeries are fairly commonplace, the latter option is becoming...

If any one of your account passwords had been stolen, would you be able to put a price on it? Plenty of stolen passwords, with and without usernames attached, are up for grabs across the Internet. The most recent treasure trove comes from a years-old...

Though the big tax season push is officially on hiatus until next year, that doesn't stop the occurrence of malicious attacks aimed at retrieving sensitive tax data throughout the year. The most recent victims in this type of targeted attack are ADP and US Bank - two major...

Google Play Store users confronted an unfortunate surprise when illegitimate banking applications were outed on the popular site. A cyber security risk doesn't faze mobile device owners as they download an application from the online store of their choice (Apple, Google, and others) without a second thought. The...

Cyberespionage group Platinum is utilizing an obscure Windows feature called hotpatching to better hide malware from security monitoring. The attacks are prevalent throughout South and Southeast Asia, in particular Indonesia, China, and Malaysia. Platinum has been operational since 2009 and tends to lean toward spear phishing...

MIT's Computer Science and Artificial Intelligence Laboratory unveiled its latest creation - AI^2 (read: AI squared), a machine that will hopefully be a powerful addition to those in the cyber security industry. The reason this particular artificial intelligence is so significant has to do with its strengths -...

According to TechCrunch, Sony announced recently that two factor authentication will be available on its PlayStation network (though, to be clear, a timeline has not been released), creating a greater security presence for users around the world. The corporation was most recently in the news for a security...

QuickTime has two vulnerabilities that are easy targets for remote attackers to overrun your Windows network, according to reports from Trend Micro and the Department of Homeland Security. Trend Micro discovered both problems and reported the issue last week. There are two pressing reasons for uninstalling QuickTime on your...

A zero day exploit normally takes the following form: attack occurs on a network or networks and chaos ensues. However, a rather unique use of a zero day exploit is gaining ground, begging the question of whether it will be used in similar instances in...