Cybercriminals, whose attacks cost organizations millions of dollars a year, do extensive research on their targets. They gather organizational and personal information before deciding which vulnerabilities to exploit.
SurfWatch Labs, a security consultancy, has released a report on research resources cybercriminals use. The purpose of the report is to provide organizations a tool to prevent cyber attacks. The report includes an overview of information resources cybercriminals use to target the victims. Knowing about these resources can help organizations defend against cyber attacks.
The majority of threat awareness training is [...]
A classified incident where Iranian hackers infiltrated a dam less than 20 miles from New York City two years ago underscores a major threat to the U.S. power grid, factories, pipelines, bridges and dams, according to a front-page story in today’s Wall Street Journal. The story notes the incident occurred amidst concerns that the Iranians had attacked U.S. banks.
The dam breach came a few years after U.S. spies damaged an Iranian nuclear facility using a computer worm.
Unlike a conventional war, a cyber attack can be hard to track. In the case of the New York dam, investigators first thought the intended target was a dam in Oregon.
Leon Panetta, then-U.S. Defense [...]
Logging onto a terminal in 2015, it’s easy to forget what the Internet actually is: a massive, massive macro version of your home network. If you’ve got a phone and a computer connected to the web, that’s technically three devices, counting the router.
Now multiply that by many billions of times, and you’ve got the number of addresses that the Censys project is aiming to track, though not for arbitrary reasons. Rather, Censys is scanning the known web for security vulnerabilities, at least the obvious kinds that system administrators should know about.
The infrastructure for Censys, which is a University of Michigan project, is being provided by [...]