IOActive Logo
  • BLOGS
  • contact us
  • SERVICES
    • FULL STACK SECURITY ASSESSMENTS
    • SECURE DEVELOPMENT LIFECYCLE
    • RED TEAM AND PURPLE TEAM SERVICES
    • AI/ML SECURITY SERVICES
    • SUPPLY CHAIN INTEGRITY
    • ADVISORY SERVICES
    • TRAINING
    • OCP SAFE
  • INDUSTRIES
    • CRITICAL INFRASTRUCTURE
    • ENERGY
    • FINANCIAL SERVICES
    • HEALTHCARE
    • MANUFACTURING
    • MEDIA & ENTERTAINMENT
    • RETAIL & CONSUMER PRODUCTS
    • TECHNOLOGY
    • TELECOMMUNICATIONS
    • TRANSPORTATION
      • AVIATION
      • MARITIME
      • RAIL
      • VEHICLE
  • RESOURCES
    • BLOGS
    • RESEARCH
    • DISCLOSURES
    • LIBRARY
    • TOOLS
  • CAREERS
  • WHO WE ARE
    • TEAM
    • EVENTS
    • PRESS
    • PHILANTHROPY
    • CORPORATE OVERVIEW
IOActive Logo
  • SERVICES
    • FULL STACK SECURITY ASSESSMENTS
    • SECURE DEVELOPMENT LIFECYCLE
    • RED TEAM AND PURPLE TEAM SERVICES
    • AI/ML SECURITY SERVICES
    • SUPPLY CHAIN INTEGRITY
    • ADVISORY SERVICES
    • TRAINING
    • OCP SAFE
  • INDUSTRIES
    • CRITICAL INFRASTRUCTURE
    • ENERGY
    • FINANCIAL SERVICES
    • HEALTHCARE
    • MANUFACTURING
    • MEDIA & ENTERTAINMENT
    • RETAIL & CONSUMER PRODUCTS
    • TECHNOLOGY
    • TELECOMMUNICATIONS
    • TRANSPORTATION
      • AVIATION
      • MARITIME
      • RAIL
      • VEHICLE
  • RESOURCES
    • BLOGS
    • RESEARCH
    • DISCLOSURES
    • LIBRARY
    • TOOLS
  • CAREERS
  • WHO WE ARE
    • TEAM
    • EVENTS
    • PRESS
    • PHILANTHROPY
    • CORPORATE OVERVIEW

Article Categories: ARTICLE

ARTICLE | April 18, 2018

Cities Are Facing A Deluge Of Cyberattacks, And The Worst Is Yet To Come

Forbes Technology Council – Three years ago, Cesar Cerrudo published a whitepaper titled, “An Emerging US (and World) Threat: Cities Wide Open to Cyber Attacks.” It turns out that some of the cyberattacks and threats he described came to fruition, and this just seems to be the tip of the iceberg. Soon, everyone living in a city may suffer the consequences of cyberattacks in some capacity.

ARTICLE | April 16, 2018

Should you be worried about mobile banking app security?

Bankrate – Your mobile banking app may help you avoid overdrawing your checking account or spending too much money. But if you’re unsure of how secure it is, you’re not alone. Reports suggest that many people still have security-related concerns when using digital banking channels.

ARTICLE | April 13, 2018

Can the Law Stop Ransomware?

U.S. News & World Report – Lawmakers across the U.S. have made even the possession of malware illegal – whether that will deter attacks, however, is a different story. Stunning ransomware attacks like those that recently hobbled Atlanta and Baltimore have thus far defied a legislative solution, with lawmakers in only a handful of states having criminalized the activity and experts skeptical that harsher laws would even make a difference. (more…)

ARTICLE | April 6, 2018

New Strain of ATM Jackpotting Malware Discovered

SecurityWeek – A new type of ATM jackpotting malware has been discovered. Dubbed ATMJackpot, the malware appears to be still under development, and to have originated in Hong Kong. There are no current details of any deployment or use.

 

ARTICLE | April 5, 2018

Several U.S. Gas Pipeline Firms Affected by Cyberattack

Security Week – Several natural gas pipeline operators in the United States have been affected by a cyberattack that hit a third-party communications system, but the incident does not appear to have impacted operational technology. Energy Transfer Partners was the first pipeline company to report problems with its Electronic Data Interchange (EDI) system due to a cyberattack that targeted Energy Services Group, specifically the company’s Latitude Technologies unit.

ARTICLE |

Artificial intelligence researchers boycott South Korean university amid fears it is developing killer robots

The Independent – Leading artificial intelligence researchers have boycotted South Korea’s top university after it teamed up with a defence company to develop “killer robots” for military use.

ARTICLE | April 4, 2018

Pipeline Attacks highlight Third Party Threat to Critical Infrastructure

The Security Ledger – Recent Attacks on the third-party data system of several U.S. pipeline companies highlight the persistent need for better ways to secure industrial control systems (ICSs), particularly when third-party software is in use, security experts said.

 

ARTICLE |

Four Gas Pipeline Firms Hit in Attack on Their EDI Service Provider

Dark Reading – Attack a warning on vulnerabilities in energy networks, security analysts say. Several cybersecurity experts this week cautioned against underestimating the seriousness of a cyberattack on an EDI service provider that disrupted data communication services at four major US interstate gas pipeline companies in the last few days.

 

ARTICLE | March 31, 2018

Security Experts Weigh In On Massive Data Breach Of 150 Million MyFitnessPal Accounts

Forbes – Another day, another data breach. Actually, all data breaches aren’t created equally. I should say, another massive data breach. Under Armour shared that on March 25 it discovered unauthorized access that exposed or compromised 150 million MyFitnessPal accounts.

 

ARTICLE | March 30, 2018

Why Are Cities So Vulnerable to Cyber Attack?

CityLab – Cybersecurity expert Cesar Cerrudo predicted ransomware attacks like the one that paralyzed Atlanta’s city government. City leaders everywhere should understand this threat, he says—and how it could have been a lot worse. For more than a week, one of America’s largest cities has been caught in a “hostage situation.”

Posts pagination

Previous page Page 1 … Page 31 Page 32 Page 33 Page 34 Next page
IOActive Logo
  • NEWSLETTER SIGN UP

  • COPYRIGHT AND AI WARNING 

  • ©2025 IOActive Inc. All Rights Reserved. This website, including all material, images, and data contained herein, are protected by copyright. All rights are reserved. Content may not be used, copied, reproduced, transmitted, or otherwise exploited in any manner, including without limitation, to train generative artificial intelligence (AI) technologies, without IOActive’s prior written consent. Without limiting IOActive’s exclusive rights under copyright laws, IOActive reserves all rights to license uses of this work for generative AI training and development of machine learning language models.

    • SERVICES
      • Full Stack Security Assessments
      • Secure Development Lifecycle
      • AI/ML Security Services
      • Red and Purple Team Services
      • Supply Chain Integrity
      • Advisory Services
      • Training
      • OCP SAFE
    • RESOURCES
      • Blogs
      • Research
      • Disclosures
      • Library
      • Tools
    • INDUSTRIES
      • Critical Infrastructure
      • Energy
      • Financial Services
      • Healthcare
      • Manufacturing
      • Media & Entertainment
      • Retail & Consumer Products
      • Technology
      • Telecommunications
      • Transportation
    • WHO WE ARE
      • Team
      • Philanthropy
      • Press
      • Events
      • Corporate Overview
    • CAREERS
    • CONTACT US
    ©2025 IOActive Inc. All Rights Reserved.
    • Privacy Policy
    • Cookie Policy
    • Terms of Use
    • Disclosure Policy