article thumbnail

Google dorks were the root cause of a catastrophic compromise of CIA’s communications

Security Affairs

Google queries allowed Iran Government to dismantle the CIA communication network used by its agents and kill dozens of tens of spies. The alleged hack of the communications network used by CIA agents allowed Iranian intelligence to identify and kill at least 30 spies. According to Yahoo ! ” reported Yahoo News.

article thumbnail

GUEST ESSAY: Where we stand on mitigating software risks associated with fly-by-wire jetliners

The Last Watchdog

Back in 2015, a security researcher decided to make that very point when he claimed to have hacked a plane , accessed the thrust system, and made it fly higher than intended. In 2019, a cybersecurity firm demonstrated security risks that could allow an attacker to disrupt engine readings and altitude on an aircraft.

Risk 264
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Unsexy Threat to Election Security

Krebs on Security

Much has been written about the need to further secure our elections, from ensuring the integrity of voting machines to combating fake news. “Such a scenario could cause great confusion and erode public confidence in our elections, even if the vote itself is actually secure,” the report continues.

Security 185
article thumbnail

The Myth of Consumer-Grade Security

Schneier on Security

They affect national security. They're critical to national security as well as personal security. Today, the predominant encryption algorithm for commercial applications -- Advanced Encryption Standard (AES) -- is approved by the National Security Agency (NSA) to secure information up to the level of Top Secret.

Military 103
article thumbnail

Ask Fitis, the Bear: Real Crooks Sign Their Malware

Krebs on Security

Megatraffer explained that malware purveyors need a certificate because many antivirus products will be far more interested in unsigned software, and because signed files downloaded from the Internet don’t tend to get blocked by security features built into modern web browsers. “Why do I need a certificate? Image: Archive.org.

article thumbnail

RSAC insights: Malware is now spreading via weaponized files circulating in data lakes, file shares

The Last Watchdog

The zero trust approach to enterprise security is well on its way to mainstream adoption. Lots of innovation has come down the pike with respect to imbuing zero trust into two pillars of security operations: connectivity and authentication. This is a very good thing. Related: Covid 19 ruses used in email attacks. Exploiting fresh gaps.

article thumbnail

Meet Ika & Sal: The Bulletproof Hosting Duo from Hell

Krebs on Security

Icamis and Sal were in daily communications with these botmasters, via the Spamdot forum and private messages. For years, security experts — and indeed, many top cybercriminals in the Spamit affiliate program — have expressed the belief that Sal and Icamis were likely the same person using two different identities.