ThreatPost – The city of Johannesburg, South Africa, is refusing to pay a ransom of four Bitcoins to a hacker group who accessed the city’s network and stole sensitive data, threatening to release it if the ransom wasn’t paid. It’s the second time in several months that the city has been hit with a cyberattack demanding ransom. In July, a ransomware attack on Johannesburg’s City Power, which is owned by the city itself, left some residents without electricity for days.
Business Insider – Deepfakes are sophisticated video forgeries in which AI tools can replace people’s faces in a video. For the most part, deepfakes are malicious, often used to fabricate videos like revenge porn. The technology — which is already free and easy to use — is only getting better. Matt Rahman, COO of the computer security company IOActive, said he is especially interested in the dangers of deepfakes. “In a few years, you won’t be able to tell what’s fake,” he said, because such video will be indistinguishable from reality.
RSA Conference Blog – Much as the Human Element has influenced the curriculum and content you will see at RSA Conference 2020, (ISC)2 Security Congress also has an entire track dedicated to the Human Factor. The topics on this track range from diversity and inclusion to hiring and retaining talent. According to Jennifer Steffens, CEO at IOActive, diversity is hugely important when trying to solve complex problems in security. In answering the question of why diversity matters, Steffens said it “brings together disparate people who have diversity of thought, different perspectives, different…
Software Testing News – After spending years building up a reputation for highly regarded cybersecurity firms such as McAfee and CISCO, Brook Schoenfield decided to use his experience to write a book called Securing Systems: Applied Security Architecture and Threat Models.’ This gained him even more traction in his sector and he now works at IOActive as a Master Security Architect where he spends his days building robust, self-sustaining security architecture programs.
FT – The rollout of fifth-generation mobile networks — which offer the potential for download speeds of up to 10 times faster than today’s — will change how we communicate, work and stream video. However, the faster speeds are also likely to present an opportunity for hackers to target more devices and launch bigger cyber attacks, experts say.