Categories » Incident Response

The FBI, Sony and the Attribution Problem, Part 1- Why?

The recent attack on Sony has publicly paraded one of the predominant problems in incident response. While the immediate issue in incident response is of course the remediation of compromised systems and bringing these systems and IT services back online, it … Continue reading

Obama Talks Cybersecurity, but Federal IT System Breaches Increasing

Security incidents on federal IT systems have increased more than 1,000 percent. Continue reading

US (Sort of) Points to “Smoking Gun” Linking North Korea to Sony Hack

NSA’s “Early warning” implants on N. Korean systems used in attribution, NY Times reports. Continue reading

Hacker Lexicon: What Is a Breach Notification?

Hacker Lexicon: What Is a Breach Notification?

TL;DR: Breach Notification refers to the notification that businesses, government agencies and other entities are required by law in most states to do when certain personally identifiable information is obtained, or believed to have been obtained by an unauthorized party. Breach Notification refers to the notification that businesses, government agencies and other entities are required […]

The post Hacker Lexicon: What Is a Breach Notification? appeared first on WIRED.



Continue reading

Real or Not, Purported Hack on US Military is a Coup for Islamic Extremists

In an age when anyone can take credit for hacks, truth is a notable casualty. Continue reading

Sony: ‘No Playbook’ for Hack Attack

The firm says it was a “canary in the coalmine” after being hacked and was reacting to the situation as it unfolded. Continue reading

A Cyberattack Has Caused Confirmed Physical Damage for the Second Time Ever

The attack marks only the second confirmed incident in which a wholly digital hack created physical destruction of equipment. The post A Cyberattack Has Caused Confirmed Physical Damage for the Second Time Ever appeared first on WIRED. Continue reading

Sony Got Hacked Hard: What We Know and Don’t Know So Far

Sony Got Hacked Hard: What We Know and Don’t Know So Far

A week into the Sony hack, however, there is a lot of rampant speculation but few solid facts. Here’s a look at what we do and don’t know about what’s turning out to be the biggest hack of the year.

The post Sony Got Hacked Hard: What We Know and Don’t Know So Far appeared first on WIRED.



Continue reading

Bits Special Section: Betting on Security Start-Ups in an Age of Data Breaches

Entrepreneurs are addressing the need for tighter corporate security, but skewed valuations are making it more difficult to determine which companies are a safe bet. Continue reading

Sony Films Are Pirated, and Hackers Leak Studio Salaries

The breach exposed two things the movie industry loathes — the piracy of films and details about executive compensation — and sent a ripple of dread across Hollywood.
Continue reading

Police Make Computer Hijack Arrests

Fifteen people have been arrested, including four in the UK, in connection with the hijacking of computers. Continue reading

How Splitting a Computer Into Multiple Realities Can Protect You From Hackers

How Splitting a Computer Into Multiple Realities Can Protect You From Hackers

Jelle Martens Eight years ago, Polish hacker Joanna Rutkowska was experimenting with rootkits—tough-to-detect spyware that infects the deepest level of a computer’s operating system—when she came up with a devious notion: What if, instead of putting spyware inside a victim’s computer, you put the victim’s computer inside the spyware? At the time, a technology known […]

The post How Splitting a Computer Into Multiple Realities Can Protect You From Hackers appeared first on WIRED.



Continue reading

FBI’s Most Wanted Cybercriminal Used His Cat’s Name as a Password

From the department of face-palming opsec blunders. Continue reading

Banks Reluctant To Use ‘White Hat’ Hackers To Spot Security Flaws

High tech firms have been offering bounties to security researchers to find holes and bugs in their software, but these reward programs haven’t drawn much interest from major banks. Continue reading

This System Will Self Destruct: Crimeware Gets Powerful New Functions

Refurbished BlackEnergy does Windows and Linux—even Cisco routers. Continue reading

RemoteIE gives free access to Internet Explorer VMs without the VM

Service uses Azure RemoteApp to run the browser in the cloud. Continue reading

WW2 Technology ‘Plan B’ for GPS

World War Two tech to back up GPS Continue reading

When Disaster Strikes, Facebook Lets Friends Know You’re OK

Facebook’s newest tool, known as Safety Check, aims to allow people to quickly alert friends and family that they are safe after a natural disaster. Continue reading

Should Spy-planes Fight US Crime?

Hi-res surveillance system causes US controversy Continue reading

Self-Destructing SSDs Will Nuke Themselves If You Text Them a Code Word- 30 September 2014

30 September 2014- Gizmodo Self-Destructing SSDs Will Nuke Themselves If You Text Them a Code Word