Remove Computer and Electronics Remove Examples Remove Security
article thumbnail

What Counts as “Good Faith Security Research?”

Krebs on Security

Department of Justice (DOJ) recently revised its policy on charging violations of the Computer Fraud and Abuse Act (CFAA), a 1986 law that remains the primary statute by which federal prosecutors pursue cybercrime cases. ” What constitutes “good faith security research?”

Security 310
article thumbnail

NASA warns of a significant increase in cyber attacks during Coronavirus outbreak

Security Affairs

During the past few weeks, NASA’s Security Operations Center (SOC) mitigation tools have prevented success of these attempts.” NASA employees and contractors should be aware that nation-states and cyber criminals are actively using the COVID-19 pandemic to exploit and target NASA electronic devices, networks, and personal devices.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Attack of drones: airborne cybersecurity nightmare

Security Affairs

Drones currently occupy a unique legal position as they are classified as both aircraft and networked computing devices. Let’s dive into some examples of how enterprises must account for external drones entering their airspace and cyber threats to drones operated by the enterprise. Aerial trespass.

article thumbnail

Scraping the TOR for rare contents

Security Affairs

Cyber security expert Marco Ramilli explains the difficulties for scraping the ‘TOR networks’ and how to enumerate hidden-services with s crapers. For example bots pushing “interesting links” back online even after months of inactivity. I am a computer security scientist with an intensive hacking background.

article thumbnail

Free Tools: spotting APTs through Malware streams

Security Affairs

Cyber security expert and founder of Yoroi has published a new tool that could be used to spot APTs (A dvanced Persistent Threats) through Malware streams. I am a computer security scientist with an intensive hacking background. I do have a MD in computer engineering and a PhD on computer security from University of Bologna.

article thumbnail

Cyber Threats Observatory Gets Improvements

Security Affairs

A simple example. This observation perfectly fits the public mainstream information which sees many security magazines and many vendors observing such an increment as well. Mostly spread over COVID#19 malspam for example: SecurityAffairs , BankInfoSecurity , ThreatPOST , FortiNet. Let’s assume we want to investigate LokiBot.

article thumbnail

Analyzing the APT34’s Jason project

Security Affairs

Security expert Marco Ramilli has analyzed the recently leaked APT34 hacking tool tracked as Jason – Exchange Mail BF. For example it wraps up a file called Year.txt including numbers from 1900 to 2020, a file called numspecial.txt including special numbers patterns and special chars patterns, a file called num4.txt