article thumbnail

U.S. blames China for Microsoft exploit, lists a Washington university among separate hack targets

GeekWire

As part of a multi-year effort to infiltrate computer systems, the indictment says the hackers in 2016 and 2017 sent targeted malicious emails, known as spear phishing attacks, to researchers and labs at institutions including University G, using email accounts the hackers had previously compromised.

Microsoft 123
article thumbnail

IBM on the state of network security: Abysmal

Network World

At least if you look at the results from the IBM Security’s 2017 IBM X-Force Threat Intelligence Index released today which contains myriad depressing nuggets such as: The number of records compromised grew a historic 566% in 2016 from 600 million to more than 4 billion -- more than the combined total from the two previous years.

IBM 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 10 Data Breaches of All Time

SecureWorld News

What was compromised: b ank account numbers, bank statements, mortgage and tax records, social security numbers, wire transaction receipts, and driver license images. Equifax data breach (2017). What was compromised: Social Security numbers, birth dates, addresses, and in some cases driver license numbers and credit card information.

Data 118
article thumbnail

Top 10 Data Breaches of All Time

SecureWorld News

What was compromised: b ank account numbers, bank statements, mortgage and tax records, social security numbers, wire transaction receipts, and drivers license images. Equifax data breach (2017). Summary: In 2017, an application vulnerability in one of their websites lead to the breach. Records affected: 885 million.

Data 98
article thumbnail

The Hacker Mind Podcast: Fuzzing Message Brokers

ForAllSecure

As a developer you can go to GitHub, see the license agreements, and then add the code to your next build. And after I was done, so that all happened, and I was able to reproduce this 2017 bug and mosquito. Vamosi: The idea behind Open Source is great. Why code something that has already been coded?

article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

And Lamb later found evidence that the election-related files he found were all deleted from the server on March 2, 2017. They just take a picture of a license or they take a selfie of themselves, or how does that actually work? Very strange, right? That didn’t keep him quiet. In this case Voatz owns the entire system.

System 52
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

And Lamb later found evidence that the election-related files he found were all deleted from the server on March 2, 2017. They just take a picture of a license or they take a selfie of themselves, or how does that actually work? Very strange, right? That didn’t keep him quiet. In this case Voatz owns the entire system.

System 52