Remove 12
Remove 2009 Remove Government Remove IT Remove Passwords
article thumbnail

China-linked APT10 Target Taiwan’s financial trading industry

Security Affairs

The group (also known as Cicada, Stone Panda , MenuPass group, Bronze Riverside, and Cloud Hopper ) has been active at least since 2009, in April 2017 experts from PwC UK and BAE Systems uncovered a widespread hacking campaign, tracked as Operation Cloud Hopper , targeting managed service providers (MSPs) in multiple countries worldwide.

article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

This week, in our last podcast of the year, we revisit some of the biggest information security stories from the past 12 months. Hello and welcome to the final IT Governance podcast of 2018. that the crooks were only able to mine a paltry $24 – which Coinhive refused to pay out anyway. In March, it transpired that a further 2.4

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Zeus Botnet Suspect “Tank” Arrested in Geneva

Krebs on Security

The JabberZeus crew’s name is derived from the malware they used, which was configured to send them a Jabber instant message each time a new victim entered a one-time password code into a phishing page mimicking their bank. The late son of former Ukrainian President Victor Yanukovych ( Victor Yanukovych Jr.

Phishing 274
article thumbnail

Encryption: How It Works, Types, and the Quantum Future

eSecurity Planet

Through public and commercial development of advanced encryption methods, organizations from sensitive government agencies to enterprise companies can ensure protected communications between personnel, devices, and global offices. For users familiar with password management and the value of complex passwords, this makes sense.

article thumbnail

Inside ‘Evil Corp,’ a $100M Cybercrime Menace

Krebs on Security

Yakubets , who the government says went by the nicknames “ aqua ,” and “ aquamo ,” among others. From 2009 to the present, Aqua’s primary role in the conspiracy was recruiting and managing a continuous supply of unwitting or complicit accomplices to help Evil Corp. Image: FBI. Our client — XYZ Corp.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Krebs wrote for The Washington Post between 1995 and 2009 before launching his current blog KrebsOnSecurity.com. Normally account take overs are due to insecure passwords or recovery options, this is definitely something different. — Dave Kennedy (@HackingDave) July 15, 2020. Eugene Kaspersky | @e_kaspersky.

article thumbnail

Predictions 2017 – How’d I Do This Year?

John Battelle's Searchblog

As I wrote nearly 12 months ago , 2017 felt particularly unpredictable. Every year, I make predictions, and every year, I score myself. As it turns out, my musings were often on target. Except when they weren’t… I’ve played with all manners of scoring over the years, but this year I’m going with a straight zero to ten rating.

Privacy 55