Chinese researchers turned hard drives into covert listening devices

Chinese researchers turned hard drives into covert listening devices

WHY THIS MATTERS IN BRIEF There are many ways people can spy on you, and now they can listen in on your conversations by monitoring your hard drives vibrations.   Everything can be hacked in order to spy on “stuff” it seems, whether it’s hacking ultra secure air gapped systems,...

Read more
Hackers use data science to evade state of the art AI cybersecurity systems

Hackers use data science to evade state of the art AI cybersecurity systems

WHY THIS MATTERS IN BRIEF By figuring out what data sets cybersecurity are training their AI’s on hackers have found a way to create malware that can’t be detected.   Walking around the exhibition floor at this week’s massive Black Hat cybersecurity conference in Las Vegas many people were struck...

Read more
Blackhat hackers discover a way to turn satellites into “microwave weapons”

Blackhat hackers discover a way to turn satellites into “microwave weapons”

WHY THIS MATTERS IN BRIEF Satellites are ubiquitous and a newly discovered exploit could let hackers turn them into high frequency weapons that fry electronics on the ground.   As I discussed in a recent keynote on the future of cybersecurity, even air gaps, thought to be the ultimate in...

Read more
Simple pixel hack cripples state of the art AI medical imaging systems

Simple pixel hack cripples state of the art AI medical imaging systems

WHY THIS MATTERS IN BRIEF As AI becomes increasingly pervasive in healthcare companies need to be aware that a new simple attack on their AI imaging and diagnostic systems could cause untold chaos, and even result in deaths.   Recently we’ve seen how a duelling AI that adjusted a pixel or...

Read more
Hackers use 51 percent attack to commandeer three cryptocurrencies, steal millions

Hackers use 51 percent attack to commandeer three cryptocurrencies, steal millions

WHY THIS MATTERS IN BRIEF 51 percent attacks are rare, but as criminals continue to gain access to more computing power smaller cryptocurrency networks are in increasing danger of being comandeered.   This week not one but three cryptocurrencies, Bitcoin Gold, Verge Coin, and Monacoin, were hit with a rarely seen cyber...

Read more
Deadly new “Cyber RAT” turns any factory, power plant or oil rig into a bomb

Deadly new “Cyber RAT” turns any factory, power plant or oil rig into a bomb

WHY THIS MATTERS IN BRIEF One thing about the future is certain, all of our digital and physical systems are going to come under increasing attack, and it’ll be a war without end.   Hacks that can jump between and steal data from ultra-secure air gapped systems, fileless malware that...

Read more
Hackers use electromagnetic attack to steal data from air gapped systems

Hackers use electromagnetic attack to steal data from air gapped systems

WHY THIS MATTERS IN BRIEF Faraday cages are supposed to be the ultimate in stopping air gapped computer systems from being attacked and their data exfiltrated, but hackers in Israel have just proved that’s no longer the case.   Two common methods of physical cybersecurity, air gapping and Faraday cages,...

Read more
Hackers use infra red CCTV cameras to steal data from air gapped systems

Hackers use infra red CCTV cameras to steal data from air gapped systems

WHY THIS MATTERS IN BRIEF Air gapped computer systems that often hold highly sensitive data are generally thought to be secure, but more hackers are testing that theory than ever before.   Even the cleverest malware is stranded unless it can communicate with the people who sent it. This can...

Read more
World’s first GPS Spoofing attack puts 20 ships 32km inland at an airport

World’s first GPS Spoofing attack puts 20 ships 32km inland at an airport

WHY THIS MATTERS IN BRIEF New technology keeps lowering the bar for criminals and nation states that want to cause mischief and harm, and now the makers of autonomous vehicles have something new to worry about.   Recently there have been reports of satellite navigation problems in the Black Sea...

Read more
World first as researchers hack a computer using modified DNA

World first as researchers hack a computer using modified DNA

WHY THIS MATTERS IN BRIEF As we increasingly become masters of manipulating the makeup of life criminals will find new, innovative ways, to breach computer systems and cause havoc.   We are increasingly becoming masters of manipulating the building blocks of life, whether it’s creating new “alien” life forms that...

Read more
Hackers have found a new way to hack Samsung’s iris security system

Hackers have found a new way to hack Samsung’s iris security system

WHY THIS MATTERS IN BRIEF Biometric security systems are awesome, until they’re hacked, and increasingly companies and individuals are finding that their latest and greatest biometric security systems are easier to hack than the password systems they replaced   Criminals know you love taking selfies, and they love your selfies...

Read more
Terrorists are using ‘Photo morph’ fraud to circumvent border security

Terrorists are using ‘Photo morph’ fraud to circumvent border security

WHY THIS MATTERS IN BRIEF As companies race to create new biometric security systems, criminals are busy finding new ways to beat them and the Photo Morph is the latest example.   Biometric systems, like the ones being rolled out in the airports in Australia,  were supposed to be the...

Read more
Researchers hack classified air gapped systems using drones and LED’s

Researchers hack classified air gapped systems using drones and LED’s

WHY THIS MATTERS IN BRIEF Air gapped systems are used to hold and protect top secret data, and they’re becoming increasingly vulnerable to hacks.   Air gapped computer systems have always held a special fascination for hackers – firstly because of the challenge that surrounds being able to hack a...

Read more
A fifth of the Dark Web just got shut down

A fifth of the Dark Web just got shut down

WHY THIS MATTERS IN BRIEF The Dark Web is home to criminals and political activists, and a hacker who went after the former just showed how vulnerable it is.   Last weekend over 10,000 dark web sites were taken down in an attack that aimed to take down sites hosting child...

Read more
Never seen before fileless malware infects hundreds of global banks

Never seen before fileless malware infects hundreds of global banks

WHY THIS MATTERS IN BRIEF A new form of never seen before malware has been discovered and it’s getting more common, unlike previous forms of malware that rely on files to do their dirty work this one lives in computer memory – and that’s a problem.   Just a couple...

Read more
Two world firsts as researchers hack an unhackable quantum network

Two world firsts as researchers hack an unhackable quantum network

WHY THIS MATTERS IN BRIEF A team of Canadian researchers have achieved a world first and hacked a quantum network, then they accomplished another world first and discovered how to identify hacks.   As we saw during the recent 2016 US election, protecting traditional computer systems and electoral systems, which...

Read more
Hackers can copy your fingerprints directly from photos

Hackers can copy your fingerprints directly from photos

WHY THIS MATTERS IN BRIEF Unlike passwords you can’t change your biometric ID’s, and hackers are finding new ways to lift them and use them for their own nefarious objectives.   Thanks Donald. Can I call you Donald? Now pass me your phone and don’t worry – I’ll take good...

Read more
Researchers listen in to crack 4096-bit encryption

Researchers listen in to crack 4096-bit encryption

WHY THIS MATTERS IN BRIEF Researchers have used sound to break the worlds’ toughest encryption standard.   Security researchers have successfully broken one of the most secure encryption algorithms, 4096-bit RSA, by listening — yes, with a microphone — to a computer as it decrypts some encrypted data. The attack is...

Read more