Duncan Riley
Latest from Duncan Riley
Exabeam launches new security intelligence platform that cuts data costs
Security firm Exabeam Inc. has launched a new Security Intelligence Platform that is designed to lower the risk of cyberthreats in enterprise environments at a more affordable price than other solutions in the market. Exabeam’s new platform aims to enable the collection of more data than existing platforms by making better connections across data to ...
Former Federal Reserve employee fined for mining bitcoin at work
A former Federal Reserve employee has been fined $5,000 and placed on 12 months’ probation for mining bitcoin from a server at the central bank. Nicholas Berthaume, who previously worked as a communications analyst for the Federal Reserve’s Board of Governors, was alleged to have “installed unauthorized software on a Board server to connect to ...
Study: Common printers in enterprises are vulnerable to hacking
A new study has found that printers commonly used in enterprise environments are a security risk that can be exploited to leak information and execute code. The study, Exploiting Printer Security from Ruhr-Universität Bochum researcher Jens Müller, analyzed 20 printers and multi-function printers to find that every single printer tested had at least one exploitable security vulnerability. Testing of the ...
Hotel ransomware attack leaves guests locked out of rooms
A group of visitors to a luxury hotel in Austria found themselves locked out of their rooms following a targeted ransomware attack that disabled the resort’s central key management system. The attack that targeted the Romantik Seehotel Jaegerwirt hotel, leaving guests unable to get into their rooms, also infiltrated the hotel’s reservation and cash desk systems. Those behind the attack ...
Facebook finally shuts down its Parse mobile development platform
Facebook Inc. has officially closed its Parse mobile development platform some 12 months after announcing that it intended to do so. Parse, which was used by developers to build mobile applications for iOS, Android, Windows and other platforms, was acquired by Facebook for $85 million in 2013. At the time of the acquisition, Facebook pitched the buy as being ...
Jennifer Lawrence photo hacker sentenced to nine months in jail
The hacker behind the infamous “celebgate/fappening” hacking scandal in 2014 that resulted in erotic images of celebrities appearing online has been sentenced to nine months in prison. Edward Majerczyk, 28, of Chicago, had previously pleaded guilty to one count of unauthorized access to a private account to obtain information as part of a plea deal agreed ...
Controversial hack repository LeakedSource offline following alleged raid
Controversial online hack repository LeakedSource is offline following unconfirmed reports that the owner was raided by authorities who seized the servers running the site. The site, which had been running for a number of years, collected and collated hacked data available on the dark web. It first came to widespread prominence in 2016 when it published the ...
Washington D.C. private TV system was hacked prior to inauguration
Officials in Washington D.C. have admitted that some 70 percent of the controllers for their closed-circuit television cameras were hacked in the week prior to the inauguration of President Donald Trump. The hack saw 123 of 187 network video recorders, with each controlling up to four CCTV units, unable to record video between Jan. 12 and 15. ...
Fake Netflix app comes complete with trojan that spies on users
Security firm Zscaler Inc. has found a fake Netflix app that installs a remote-access malware onto the devices of those who install it. The app is a skinned version of the SpyNote RAT that can monitor a victim’s communications, including the ability to activate both a microphone and any built-in camera on an infected device. In ...
Serious remote code execution vulnerability discovered in WebEx browser extensions
Cisco Systems Inc.’s WebEx Browser Extension has been found to have a critical vulnerability that allows hackers to gain access to a user’s computer via a remote code execution attack. The vulnerability allows websites containing malicious scripts to open a WebEx session to the browser and “to execute arbitrary code on the affected system, which could be ...









