Hacker

A hacker tried selling stolen military drone documents for $200

Researchers at the cybersecurity firm Recorded Future recently released a report about one of its more interesting findings. 

While scouring the hacker forums on the dark web, the firm’s analysts discovered someone selling MQ-9 Reaper drone documents — maintenance books, training guides, and a list of airmen assigned to the military drone. The hacker was looking for $150-200 for the documentation. 

Three tips to protect yourself from Malvertising

As if advertising wasn't intrusive enough, 'Malvertising' the malicious form of online advertising, used to spread malware, is on the rise.

Malware, 'malicious-software' infiltrates victims computers or wireless devices to extract or attack the data held within. Standard types of malware include: Viruses, Worms; Trojan Horses; Adware; Spyware and Ransomware among a stream of others. Malvertising, the fusion of "Malware" and "Advertising" are ads that try to do the same thing. 

What we can identify from the Atlanta Cyber-attack.

The computer network of the City of Atlanta was hit by a ransomware attack which paralyzed a substantial percentage of the city’s data. The hackers demanded $50,000 to unlock the system. 

The Atlanta attack forced many city departments and organizations to go offline for several days, meaning that residents were unable to pay bills or fines and police were unable to electronically file paperwork – breathe deep, tickets were issued by hand. 

Time to Panic? Potential Wi-Fi Security Breach Uncovered

This means that traffic shared over countless wireless networks globally will become an easy target for hackers and other malicious users looking to obtain sensitive information.

Biggest Internet Security Threat Ever?

Details of the latest vulnerability discovered in the WPA2 protocol have until this point not been shared with the public. The breach was discovered by the group of researchers who developed KRACK, pointedly spelled with a K and an acronym for Key Reinstallation Attacks.