Nate Couture, Chief Technology Officer of NuHarbor Security and Scott Mosher, Chief Operating Officer, Tuesday, in Burlington.(Photo: KEVIN HURLEY for the FREE PRESS) Justin Fimlaid kept Keurig Green Mountain’s cyber secrets from 2009 to 2013. Then, Fimlaid founded his own firm, NuHarbor Security in Burlington, partly because he was so dissatisfied with the help he tried […]

by

Bank robbery and medical information theft have moved to the Internet, so it is disappointing but not surprising that criminal invasions of personal privacy have followed suit. British pop star Adele just fell victim to a targeted breach of her private pregnancy photos, echoing the theft of hundreds of sensitive celebrity photos in 2014, including […]

by

style=”” class=” js no-touch history csstransforms csstransforms3d csstransitions video” lang=”en”<!– <!– <Attribute name="Caption" value=" After hackers breached a New York dam cyber security system, the TVA ensures its taking a variety of security measures to ensure this doesnt happen in East Tennessee. “/> –>

by

For the first time ever, the U.S. has indicted cyber criminals who can be traced to a foreign government. In this case, Iran. WASHINGTON, March 24, 2016 —Attorney General Loretta Lynch announced that seven cyber-terrorists employed by Iranian based computer firms which have been traced back to the Iranian government have been indicted on computer […]

by

The first nationstate warfare took place between soldiers on the ground, and then ships at sea. In the 20th Century, the battles moved into the skies. On Thursday, the Justice Department claimed Iran had attacked U.S. infrastructure online, by infiltrating the computerized controls of a small dam 25 miles north of New York City, heralding […]

by

Cyber security experts and senior professionals from across the North West gathered at MediaCityUK today to discuss one of the fastest growing problems for businesses. Over a hundred delegates attended the conference to hear insight and advice from PwC experts covering legal, forensics, business risk and threat intelligence. Speakers included Charlie McMurdie, former Detective Superintendent […]

by

If you want to stop people reading your secret messages, use a code to conceal the meaning. From ancient times to the present day, security, codes and puzzles have been intertwined, as have the people who have tried to crack those codes to read messages they were never meant to see. During World War Two, […]

by

Symantec has issued the unsettling reminder that the code-signing certificates organizations use to secure their files and software might not be as safe as their IT teams think. Source: Symantec Unfortunately, hackers can take advantage of these code-signing certificates to attempt to steal sensitive corporate data. And as Symantec’s blog revealed, this is exactly what […]

by

Pakistan-Linked Hackers Successfully Conduct Third Cyber-Espionage Campaign Against Indian Military within a Month Operation C-Major is the name of the latest cyber-espionage campaign implemented by Pakistan-linked hackers. Trend Micro reports that the campaign targeted Indian military employees via a spear-phishing mechanism with which spyware was distributed to the victims. As per the security firm’s analysis, […]

by

NEWS ANALYSIS: An Israeli security research company Cytegic claims there are predictable cycles of cyber-attacks just before and after major terrorist atrocity, such as the March 22 bombings in Brussels. The links between cyber-warfare and terrorism are well-established. Terrorist organizations such as ISIS have been attacking targets they perceive as unfriendly nearly since their inception. […]

by