PINDROP BLOG

Category: Hacking

February 16, 2017
Security Lessons From Snowden
SAN FRANCISCO–Working in the security field offers ample opportunity to learn from your mistakes, and perhaps no organization has had to go through that process more publicly and painfully than the National Security Agency. The failures that led to Edward Snowden walking out the door with a massive cache of NSA data four years ago…
Read More →
February 15, 2017
Security Teams Are Becoming Cyber Espionage Investigators
SAN FRANCISCO–As cyber espionage has moved from the government sector into the corporate world, enterprise security professionals have found themselves needing to become investigators to deal with the threat. But without real expertise and experience with investigations, even the best security teams can miss serious compromises in their environments. “Cybersecurity professionals don’t have experience dealing with traditional…
Read More →
February 14, 2017
‘When Computers Start Killing People, There Are Going to Be Consequences’
SAN FRANCISCO–The massive, rapidly expanding network of insecure IoT devices is becoming so large and unwieldy that it will inevitably attract attention from government regulators in the near future. And that’s actually a positive development, security experts say. “As everything becomes a computer, computer security becomes everything security. The beachhead of all of this is…
Read More →
February 14, 2017
Microsoft President: We Need to Create a Digital Geneva Convention
By Brian Donohue SAN FRANCISCO—In a keynote address at the 2017 RSA Conference, Microsoft President Brad Smith called for the creation of “a trusted and neutral digital Switzerland” in an effort to combat the influx of state-sponsored actors and attacks. Alternatively calling his plan a “Digital Geneva Convention,” Smith leaned heavily on the familiar war…
Read More →
February 13, 2017
Ransomware Gangs Have Become the High-Seas Pirates of the Internet
SAN FRANCISCO–As bad as the ransomware problem is right now–and it’s plenty bad–we’re likely only at the beginning of what could become a crisis, experts say. “Lots of people are being infected and lots of people are paying. The bottom line its it’s getting worse and it’s going to continue to do so,” Jeremiah Grossman,…
Read More →
February 9, 2017
Macro-Enabled Malware Targets macOS
A new piece of malware that targets macOS appears to be the first one that includes one of the favorite tricks of Windows malware authors: the use of macros. The malware, discovered recently by researchers, is delivered through the use of a rigged Microsoft Word document that is disguised as an analysis of America’s allies’…
Read More →
February 6, 2017
FBI Targets Extensive Cybercrime Ring
A Brooklyn man has pleaded guilty to charges as part of an FBI investigation into a banking malware and money mule scheme that has been running since 2015 and cost victims more than $1 million. The plea from Vyacheslav Khaimov was for his role in the scam, which the FBI alleges involved attackers infecting victims’ machines…
Read More →
February 3, 2017
Details Emerge of Severe WordPress Content Injection Flaw
WordPress has revealed the details of a critical privilege escalation vulnerability that the company fixed in a security release last week. The bug was part of a major upgrade for WordPress, but the details of the flaw hadn’t come out until now because the company was working with hosting providers and security firms to put…
Read More →
February 1, 2017
Mirai, Google, and the Future of DDoS
OAKLAND–When the Mirai botnet burst onto the scene last year, it did so in style, with two of the largest DDoS attacks on record. One of the initial targets of its wrath was the site run by reporter Brian Krebs, and the attack set off a chain reaction that not only took the site offline…
Read More →
January 31, 2017
Inside the Fight Against Bulletproof Hosting Providers
OAKLAND–For years, bulletproof hosting providers have been the bane of the Internet. They serve as havens for malware, cybercrime operations, and child exploitation rings, while dodging law enforcement by moving their operations early and often. But security researchers and cybercrime investigators are beginning to make some headway in the fight against these operators, through cooperation…
Read More →