cybercrime, hackers, lockbit, ransomware

Governments and Hackers Agree: The Laws of War Must Apply in Cyberspace

There are rules in war. International humanitarian law regulates what combatants can and can’t do, with the goal of protecting civilians and limiting suffering. Most of these laws were developed during the 19th and 20th centuries. But in our century, a new kind of battlefield has emerged: the domain of cyberattacks, digital campaigns, and online ...

Troy Oakes

Anonymous.

5 Simple Ways to Improve Your Business’s Cybersecurity

Unfortunate things happen when you least expect them to. Learn how to upgrade your cybersecurity by following a few simple tips. Cybersecurity has evolved from a rare occasion into a pressing issue many businesses face. As most aspects of the company get moved online, it’s essential to protect physically and virtually. Many business owners struggle ...

Mike West

cybersecurity

U.S. Intelligence Agency Issues Warning About Chinese Hackers

The National Security Agency (NSA) recently issued a warning about 25 patchable bugs that are being leveraged by Chinese hackers to infiltrate American networks. The vulnerabilities affect products that are mostly used for external web services or remote access. Chinese hacking threat “NSA is aware that National Security Systems, Defense Industrial Base, and Department of ...

Jack Roberts

A hacker.

Easy Hacker Target: Public USB Charging Stations

The Los Angeles District Attorney’s Office has issued a warning to citizens, asking them to avoid using USB charging stations at airports and other such public areas. The warning was issued on suspicion that the charging stations could be infested with malware that will eventually get on their devices. Hacking dangers “It [malware] loads itself ...

Armin Auctor

A public USB charging station.

Text Messages and Phone Records Intercepted by Chinese Hackers

A group of Chinese hackers backed by Beijing hacked into telecommunication companies, stealing textual content of “geopolitical interest,” according to a new report by cybersecurity firm, FireEye. Names of the countries, companies, and individuals subject to the hack have not been revealed. Phone hackers The hacking job was done by the infamous APT41 group through ...

Jack Roberts

The Anonymous hacker group.

Hackers Break Into Baltimore Computers, Demand Ransom

Hackers have broken into the computer networks of the Baltimore city government, encrypting critical files in the process. It will reportedly take the government several months to unlock all the files and get the systems running normally. The hackers Hackers demanded a ransom of 3 Bitcoins (US$23,300) to unlock the files for each system. For ...

Jack Roberts

Baltimore City Hall.

How Police Body Cams Can Be Hacked to Suit the Agenda of Criminals

With local governments in the U.S. planning to make police body cams mandatory, concerns about data safety and security have arisen after a cyber-security expert demonstrated how body cams can be used by hackers to fulfill their devious purposes. Footage risks Governments are mulling body cams as a means to make the police accountable for ...

Nspirement Staff