Private companies and public services are recovering from the impact of Friday’s international cyber attack. The malware was found to exploit a vulnerability identified by the US National Security Agency (NSA), provoking debate over who is responsible for the attack. “WannaCry”, the bug responsible for the chaos, is a type of ransomware. Ransomware blocks access to data and demands a ransom to restore access. WannaCry has been demanding payments of $300 to $600 dollars in bitcoin to restore access to encrypted files, threatening to double the ransom after three days and delete the files after seven days. E&T news reported … Continue reading #Wannacry #ransomware #cyberattack – an annotated infographic
Britain is building a cyber-offensive strike force to stop jihadi hackers and hostile powers mounting deadly attacks on the UK’s critical infrastructure, e.g. hospitals, power networks and air traffic control systems. Click on the graphic for an expanded view. Continue reading British secret service agencies ready #cybersecurity strike force against extremist hackers – an annotated infographic
By Jade Fell “The separation between the cyber and the physical worlds was disappearing. Cyberbullying was just bullying, and cyberwar was just war – the true age of cyber began when we started removing it as a descriptor.” ― Matthew Mather In April 2009 Chinese military hackers intercepted the Pentagon’s cyber security systems and gained access to huge amounts of information on the US Defense Department’s costliest weapons programme ever, plans for the United States military’s most sophisticated fighter jet yet – the $327 billion Joint Strike Fighter Project. Known as the F-35, the jet was the most complex military … Continue reading Book Review: @War: The Rise of Cyber Warfare – Shane Harris
Making History inside the Doughnut by Vitali Vitaliev I am happy to report that yesterday, on the 8th of October 2015, a bit of history was made inside the legendary Doughnut building in Cheltenham – the HQ of GCHQ –forgive my unintended pun. For those who do not know, I have to explain that GCHQ stands for Government Communications Headquarters (hence the pun) and that it is, alongside MI5 and MI6, one of the three UK Intelligence and Security Agencies. Due to its nature, this serious organisation is bound to be secretive and not easily accessible. Nevertheless, yesterday – for … Continue reading Making History inside the Doughnut
In the week that the Edward Snowden documentary “Citizenfour” won the Best Documentary award at the Oscars, it should come as no surprise to hear that the U.S. National Security Agency – the NSA to its friends – has been hiding spyware deep within computer hard drives made by top manufacturers, giving the agency the means to eavesdrop on the majority of the world’s computers. That this revelation should come from researchers in Russia, looking to further hurt the NSA’s surveillance abilities, should also come as no surprise. Click on the graphic for an expanded view. Continue reading #NSA accused of hiding #spyware deep within computer hard drives – an annotated infographic
Congratulations are due to E&T assistant features editor Aasha Bodhani, who last night won the Best Overall Feature Article of the Year award at the BT Security Journalism Awards 2013. Her winning article was “Ethical hacking: bad in a good way“, which discussed the question of how as more and more organisations are targeted in cyber-attacks, they must get to know their enemy if they are to protect vital networks. Enter the professional, ethical hacker. Aasha is now the proud owner of a very heavy laser-etched glass globe, with matching display plinth, presented in a blue silk-lined box. It’s a … Continue reading E&T writer wins Best Overall Feature Article of the Year at BT Security Journalism Awards 2013. Woo hoo!
On this night of ghastly ghouls and malodorous spirits, we share with you this Hallowe’en themed hacking, ID theft and device infection infographic. Make sure you’re not haunted by this personal security nightmare. Click on the graphic for an expanded view. Continue reading Woooooo!! Halloween hacking horror stories – a spookily annotated infographic