Decrypters Released for OpenToYou, DeriaLock, and PHP Ransomware

Decryption tools are now available for three ransomware families that have been discovered during the past few weeks, allowing victims to recover files without paying a dime.

Dubbed DeriaLock and PHP Ransomware, two of the new malware families were found by Check Point, a security firm that recently became part of the No More Ransom (NMR) project.

Decryption tools are now available for three ransomware families that have been discovered during the past few weeks, allowing victims to recover files without paying a dime.

Continue reading “Decrypters Released for OpenToYou, DeriaLock, and PHP Ransomware”

Computer Weekly Buyer’s Guide features list 2017

Computer Weekly Buyer’s Guides map the IT buying cycle of our readership onto relevant editorial that will inform and educate readers and help them in making the right buying decision.

Computer Weekly Buyer’s Guides map the IT buying cycle of our readership onto relevant editorial that will inform and educate readers and help them in making the right buying decision.

Continue reading “Computer Weekly Buyer’s Guide features list 2017”

IRS Escalates Hunt For Bitcoin UsersIn Coinbase Summons Case

The Internal Revenue Service is fighting to obtain vast amounts of data on Bitcoin and other digital currency transactions. But what the IRS will get–and when–remains unclear. In November, a federal court authorized the IRS to serve a John Doe Summons on Coinbase, Inc.

The Internal Revenue Service is fighting to obtain vast amounts of data on Bitcoin and other digital currency transactions. But what the IRS will get–and when–remains unclear. In November, a federal court authorized the IRS to serve a John Doe Summons on Coinbase, Inc., a digital currency transaction hub. The IRS wants information on the site’s users and their transactions. But some Coinbase users, led by Mr. Jeffrey K. Berns, then moved to intervene in the IRS’s case to enforce the summons. Their argument is that the IRS request was not properly calibrated and threatened their privacy.

Continue reading “IRS Escalates Hunt For Bitcoin UsersIn Coinbase Summons Case”

Government Subcontractor Leaks Military Healthcare Worker Data

A security researcher claims to have discovered a large volume of data inadvertently leaked online by a subcontractor that provides healthcare services and professionals to the United States government.

Potomac Healthcare Solutions provides services to the U.S.

A security researcher claims to have discovered a large volume of data inadvertently leaked online by a subcontractor that provides healthcare services and professionals to the United States government.

Continue reading “Government Subcontractor Leaks Military Healthcare Worker Data”

U.S. Gov’s “GRIZZLY STEPPE” Report Fails to Achieve Purpose: Experts

The recently released Joint Analysis Report (JAR) published by the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) to detail tools used by Russian hackers in cyber attacks against the United States election didn’t deliver on its promise, security experts argue.

The recently released Joint Analysis Report (JAR) published by the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) to detail tools used by Russian hackers in cyber attacks against the United States election didn’t deliver on its promise, security experts argue.

Continue reading “U.S. Gov’s “GRIZZLY STEPPE” Report Fails to Achieve Purpose: Experts”

How The Washington Post’s Defense Of Its Russian Hacking Story Unraveled Through Web Archiving

The control room of a power plant in Nebraska. (AP Photo/Josh Funk)

As the Washington Post’s story of Russian hackers burrowed deep within the US electrical grid, ready to plunge the nation into darkness at the flip of a switch unraveled into the story of a single non-grid-connected laptop with a piece of malware on it, the Post has faced fierce criticism over how it fact checked and verified the details of its story.

The control room of a power plant in Nebraska. (AP Photo/Josh Funk)

Continue reading “How The Washington Post’s Defense Of Its Russian Hacking Story Unraveled Through Web Archiving”

Travel Booking Systems Expose User Data: Researchers

The lack of proper security mechanisms in travel booking systems exposes passengers’ personal information and allows fraudsters to steal tickets and loyalty bonuses, researchers have warned.

Last week, at the 33rd Chaos Communication Congress in Hamburg, Germany, Karsten Nohl and Nemanja Nikodijevic of Security Research Labs detailed the vulnerabilities affecting major travel booking systems and demonstrated how easily they can be exploited.

The lack of proper security mechanisms in travel booking systems exposes passengers’ personal information and allows fraudsters to steal tickets and loyalty bonuses, researchers have warned.

Continue reading “Travel Booking Systems Expose User Data: Researchers”

Hardware Bitcoin Wallet KeepKey Informs Users of Breach

KeepKey, a hardware wallet designed for the secure storage of bitcoin and other virtual currency, informed users on Saturday that the company’s systems had been targeted by a hacker on Christmas Day.

KeepKey, a hardware wallet designed for the secure storage of bitcoin and other virtual currency, informed users on Saturday that the company’s systems had been targeted by a hacker on Christmas Day.

Continue reading “Hardware Bitcoin Wallet KeepKey Informs Users of Breach”