64
64
Jul 21, 2018
07/18
by
CSPAN2
tv
eye 64
favorite 0
quote 0
malware infiltrated the ukrainian accounting softwarehe system and manipulated the way that the company pushed updates so instead of giving your normal software up to date that we all click yes to one or computer downloaded malware instead it according to the administration statement that was the single most destructive and costly cyber attack in history. we also saw the dhs and fbi this year issued technical alert so that defenders could protect against russian activity in our critical infrastructure system. this describes russian cyber actors efforts to infiltrate and conduct intrusions into different sect jars of our critical infrastructure including energy, water and manufacturing. so the aggression is widespread. it is against multiple sectors. it is against multiple types of networks and so i think that calls to attention that you hurt the dni give as i said it wasn't just aimed at the government. it was really aimed at all of us because it really does require not only a hole of government but a whole hole of country effort to be aware of what we are facing. >> i want to get back
malware infiltrated the ukrainian accounting softwarehe system and manipulated the way that the company pushed updates so instead of giving your normal software up to date that we all click yes to one or computer downloaded malware instead it according to the administration statement that was the single most destructive and costly cyber attack in history. we also saw the dhs and fbi this year issued technical alert so that defenders could protect against russian activity in our critical...
28
28
tv
eye 28
favorite 0
quote 0
malware ty's ing phishing rogue out domain infringement and social in person ation these cyber hackers will consumers and businesses access personal data and sensitive information cyber security firm check point software's two thousand and eighteen media report of cyber attack trends detected an increasing number of attacks targeting cloud infrastructures criminals turning to the cloud to exploit its vast computational power and. multiply their profits the report details the cyber threat landscape breaking down top model where categories which include crypto miners ransomware banking and mobile the researchers found that the first half of the year the number of organizations impacted by crypto mining malware doubled to forty two percent compared with twenty point five percent from the second half of two thousand and seventeen the research found that the top three common malware variants in the first half of the year were all crypto miners according to the report many of the attacks were because of the organizations for security practices but others like crypto mining are leveraging clo
malware ty's ing phishing rogue out domain infringement and social in person ation these cyber hackers will consumers and businesses access personal data and sensitive information cyber security firm check point software's two thousand and eighteen media report of cyber attack trends detected an increasing number of attacks targeting cloud infrastructures criminals turning to the cloud to exploit its vast computational power and. multiply their profits the report details the cyber threat...
33
33
tv
eye 33
favorite 0
quote 0
research found that the top three common malware variants in the first half of the year were all crypto miners according to the report many of the attacks were because of the organizations for security practices but others like crypto mining are leveraging cloud infrastructure which leads to much greater profits for quote threat actors lying heroines checkpoints threat intelligence group manager noted that attacks on cloud infrastructure and crypto mining are the latest generation of cyber attacks which the company calls gen vi and companies need to adopt multi-layered cyber security strategies that prevent these attacks from taking a hold of their networks and their data reporting in new york at each other's r.t. . for a brief pause but hang here because when we return we're joined by tom talked with the c.e.o. of could nice's limited to discuss a new crypto currency and monetary system we're back in a flash. what we've got to do is identify the threats that we have it's crazy. let it be an arms race. period dramatic developments only mostly and. i don't see how that strategy will be s
research found that the top three common malware variants in the first half of the year were all crypto miners according to the report many of the attacks were because of the organizations for security practices but others like crypto mining are leveraging cloud infrastructure which leads to much greater profits for quote threat actors lying heroines checkpoints threat intelligence group manager noted that attacks on cloud infrastructure and crypto mining are the latest generation of cyber...
34
34
Jul 7, 2018
07/18
by
BLOOMBERG
tv
eye 34
favorite 0
quote 0
they sent some of the malware to these guys in spain, the lead detectives in spain on this. when they got that, that gave them the lead that eventually led to the arrest of the alleged mastermind. jason: you just heard about a big digital heist, a centerpiece of the heist issue. last week, we heard about the brexit short. this week, the cover is a little different in the u.s. than asia. >> for domestic and asia, we decided to do something about the heist special. there's a lot of great stories, but none of them worked for the cover so we went more general. we heist the cover. carol: you had some fun. that's exactly what you see. you see the the european cover off to the side. chris: you can see the two of them split off. carol: that's a lot of fun. jason: how did you come up with it? chris: we came up with the stolen cover first. it was actually joel's idea. once we had an idea the european cover would be the other image, it worked really nicely. carol: it's really bold and brave because there's not a lot on that cover. a lot of white space. chris: i think that's what made i
they sent some of the malware to these guys in spain, the lead detectives in spain on this. when they got that, that gave them the lead that eventually led to the arrest of the alleged mastermind. jason: you just heard about a big digital heist, a centerpiece of the heist issue. last week, we heard about the brexit short. this week, the cover is a little different in the u.s. than asia. >> for domestic and asia, we decided to do something about the heist special. there's a lot of great...
37
37
Jul 8, 2018
07/18
by
BLOOMBERG
tv
eye 37
favorite 0
quote 0
and set up a malware lap basically all of the malware that cops around the world were finding and thoughtaybe link case -- you have these tech guys and his office filled with computers. they would dissect the code and look for commonalities with other pieces of code they're finding around the world. then they could distribute their findings to police officers. they sent some of that malware to these guys in spain. that leaves led to the arrest of the alleged mastermind. this is the centerpiece of the highest issue. heist issue. >> we decided to do something about the heist special. there were a lot of great stores for the package. carol: you see that european cover and it is up to the side. >> you can see the two of them split off. we came up with the idea of the stolen cover first. it was joe's idea. we had the feeling that the european cover would work for the nice. carol: it is really bold and brave. there isn't a lot on the cover. we were tweaking it and adding things and nudging it a little bit. the more you leave this undisturbed space, the better it got. nice little trick. these gu
and set up a malware lap basically all of the malware that cops around the world were finding and thoughtaybe link case -- you have these tech guys and his office filled with computers. they would dissect the code and look for commonalities with other pieces of code they're finding around the world. then they could distribute their findings to police officers. they sent some of that malware to these guys in spain. that leaves led to the arrest of the alleged mastermind. this is the centerpiece...
42
42
Jul 14, 2018
07/18
by
BLOOMBERG
tv
eye 42
favorite 0
quote 0
in the crypto jacking malware. that is infecting users not only pcs but mobile devices as well. it basically uses the cycles on your device. to mine for cryptocurrency. it is using your device and your capability to generate cryptocurrency which is how that is made. >> does that mean the bad guys will have more resources to fund bigger operations? >> the back as our market-driven. they will go up to the highest probability of getting a return on their investment. they are finding that by infecting browsers mobile devices etc., they can mine cryptocurrency and cash out on the other end relatively effectively and with little risk on their end as well. >> using mobile threats are on the rise. what do consumers and businesses need to be most worried about? >> you have to make sure you think about what are my risks with my mobile device? who are my users that are using mobile? what information do they have access to? what systems didn't connect to? where do i have potential risk and how do i mitigate that? there are a l
in the crypto jacking malware. that is infecting users not only pcs but mobile devices as well. it basically uses the cycles on your device. to mine for cryptocurrency. it is using your device and your capability to generate cryptocurrency which is how that is made. >> does that mean the bad guys will have more resources to fund bigger operations? >> the back as our market-driven. they will go up to the highest probability of getting a return on their investment. they are finding...
24
24
Jul 21, 2018
07/18
by
CSPAN2
tv
eye 24
favorite 0
quote 0
may of last year where north koreans and private actors used malware to break computers worldwide and basically took advantage of a known vulnerability to do that. but we are very much in a support role. our aim in addition to integrating information is the federal cybercommunity the intelligence community and responders to help information move through the cybercommunity and that's what we did here and through our work with dhs in the first days when it was heading over the weekend when most attacks do we were aware of information dhs put through their great partnership through the private sector. with a network service providers working on mitigating the attacks to shut it down they were also learning information how that form. think about a medical infection it is important to know how it got started so you know how to stop it. but in this case the private sector companies were learning how water christ spread to gather data that shows the early infection points and dhs had that and we ask could be sure that with the intelligence community? they went back to the private sector part
may of last year where north koreans and private actors used malware to break computers worldwide and basically took advantage of a known vulnerability to do that. but we are very much in a support role. our aim in addition to integrating information is the federal cybercommunity the intelligence community and responders to help information move through the cybercommunity and that's what we did here and through our work with dhs in the first days when it was heading over the weekend when most...
161
161
Jul 14, 2018
07/18
by
CNNW
tv
eye 161
favorite 0
quote 0
malware can be assigned to your computer or put on to your computer just that same way through an e-mail ways as well. they can hack in. and what the malware does is in a more automated way it just is scanning your computer constantly, taking information like your contacts, your documents, your passwords. it can even grab screen shots. and, again, transporting all of that right back to russian agents. those are the two key ways electronically that this information was being hacked, and that's what the investigators are going after. >> tom foreman there, breaking it all down for us. joining us now is david kennedy. he's a cybersecurity consultant. what's known as an ethical hacker, a white hat. he joins me now. david, one thing that has struck me about the russian hack, from the very beginning, and i've been covering this for more than two years, is a lot of the tools that russia used are pretty blunt in technological terms. spear-phishing, you know, it's not some complicated secret nas tool. it relies on one person, like john podesta, the hillary clinton campaign chairman, clicking on th
malware can be assigned to your computer or put on to your computer just that same way through an e-mail ways as well. they can hack in. and what the malware does is in a more automated way it just is scanning your computer constantly, taking information like your contacts, your documents, your passwords. it can even grab screen shots. and, again, transporting all of that right back to russian agents. those are the two key ways electronically that this information was being hacked, and that's...
129
129
Jul 4, 2018
07/18
by
MSNBCW
tv
eye 129
favorite 0
quote 0
one of every 130 e-mails today contains malware with 167 million malware attacks every 24 hours. 4,000somware attacks every day, 30 million fraudulent log-in attacks just targeting microsoft. every tech giant is under similar attack. password fraud, phishing e-mails, denial of service. sophisticated automated programs that today are often run by hostile governments -- russia, china, north korea among them. it looks like the entire u.s. is under attack. >> where there are more individuals, financial gain, that's where you see the concentration. >> reporter: that's julia white, vice president microsoft cloud security. >> those attacks that happen every day, our customers don't see them because we stopped them. >> reporter: ours were the first cameras allowed inside the microsoft forensics lab where they take apart infected software looking for suspect clues and the cyber defense operations center which monitors malware attacks around the clock. they are protecting everything stored on the cloud here from family photos to corporate financial information to sensitive government data. that
one of every 130 e-mails today contains malware with 167 million malware attacks every 24 hours. 4,000somware attacks every day, 30 million fraudulent log-in attacks just targeting microsoft. every tech giant is under similar attack. password fraud, phishing e-mails, denial of service. sophisticated automated programs that today are often run by hostile governments -- russia, china, north korea among them. it looks like the entire u.s. is under attack. >> where there are more individuals,...
95
95
Jul 14, 2018
07/18
by
CNNW
tv
eye 95
favorite 0
quote 0
link or in other ways as with pel they can hack in what the malware does is in a more automated way. it's scanning computer constantly taking passwords was be and screen shots now and then. documents. and transporting all that right back to russian agents. those are the two key ways electronically that this information was being hacked. and that's what the investigators are going after. >> thanks to tom foreman. we are talking to one of the victims of that russian spearphishing. form campaign manager john podesta is with us next. d, i get rewarded wherever i go. going out for a bite. rewarded! going new places. rewarded! learn more at theexplorercard.com when you're crafting ♪ performance, no measure is too extreme. the luxus high performance line. experience amazing at your lexus dealer. you shouldn't be rushed into booking a hotel. with expedia's add-on advantage, booking a flight unlocks discounts on select hotels until the day you leave for your trip. add-on advantage. only when you book with expedia. add-on advantage. i'm a small business, but i have... big dreams... and big pla
link or in other ways as with pel they can hack in what the malware does is in a more automated way. it's scanning computer constantly taking passwords was be and screen shots now and then. documents. and transporting all that right back to russian agents. those are the two key ways electronically that this information was being hacked. and that's what the investigators are going after. >> thanks to tom foreman. we are talking to one of the victims of that russian spearphishing. form...
32
32
tv
eye 32
favorite 0
quote 0
malware ty's ing phishing rogue out domain infringement and social in person ation these cyber hackers will consumers and businesses access personal data and sensitive information cyber security firm checkpoint software is two thousand and eighteen media report of cyber attack trends detected an increasing number of attacks targeting cloud infrastructures criminals turn into the cloud to exploit its vast computational power and multiply their profits the report details the cyber threat landscape breaking down.
malware ty's ing phishing rogue out domain infringement and social in person ation these cyber hackers will consumers and businesses access personal data and sensitive information cyber security firm checkpoint software is two thousand and eighteen media report of cyber attack trends detected an increasing number of attacks targeting cloud infrastructures criminals turn into the cloud to exploit its vast computational power and multiply their profits the report details the cyber threat...
35
35
Jul 7, 2018
07/18
by
BBCNEWS
tv
eye 35
favorite 0
quote 0
with malware after downloading cheap software to try and improve their game. the best it is of the film. somebody at sony pictures is in hot water after uploading the entire movie to youtube instead of just after uploading the entire movie to youtube instead ofjust the trailer. researchers at harvard have developed a robotic cockroach that can work what might walk on land and water and even go for a dive. the amulet or a micro robot applies a voltage to the water in order to break the surface tension, allowing it to go free swim. from walking on water to flying through the air with the greatest of ease. we have seen disney's stunt robot before but it has had an upgrade and now has a humid looking body. the autonomous self—correcting aerial robot to make adjustments in the air to make sure it nails it is death—defying leaps again and again. finally, the next time you are trapped on a desert island want to make a romantic declaration in the sand, why not get a robot to do it? this little robot makes strides in the sand, acting like a beach printer. may not be th
with malware after downloading cheap software to try and improve their game. the best it is of the film. somebody at sony pictures is in hot water after uploading the entire movie to youtube instead of just after uploading the entire movie to youtube instead ofjust the trailer. researchers at harvard have developed a robotic cockroach that can work what might walk on land and water and even go for a dive. the amulet or a micro robot applies a voltage to the water in order to break the surface...
48
48
Jul 21, 2018
07/18
by
CSPAN3
tv
eye 48
favorite 0
quote 0
like evidence this, we've often used malware. so the problem is, how do you regulate it? it, i think regulate s to ban like minded countries who are also victims of such as germany and the u.k.. to say, we need to come up with new approaches. that is a leadership role. an abdication role is to say, you are doing this, i don't like it, i will not let you investigate the united states. promised to end on time. i would like to thank you all for coming here this morning. it has been an interesting discussion. [applause] >> as part of the 50 city capital tour, this weekend on c-span on book tv and american history tv, we will feature stops across alaska, showing you the states natural beauty and delve into the history and literary culture. history,n lectures in san diego state university professor teaches a class on the vietnam war, looking at the conflict, beginning with u.s. escalation in 1965, to the fall of saigon 10 years later. here is a preview. >> as far as johnson and his team are concerned, it is important to do something ab
like evidence this, we've often used malware. so the problem is, how do you regulate it? it, i think regulate s to ban like minded countries who are also victims of such as germany and the u.k.. to say, we need to come up with new approaches. that is a leadership role. an abdication role is to say, you are doing this, i don't like it, i will not let you investigate the united states. promised to end on time. i would like to thank you all for coming here this morning. it has been an interesting...
106
106
Jul 13, 2018
07/18
by
CNNW
tv
eye 106
favorite 0
quote 0
in this case what malware with a do is sit on your computer and start automatically collecting all sorts of information. addresses that you were using all the time to send information to, your contact list, your passwords when you signed in. it could grab screen shots when you wrote things. then it could spread out through your network, imitating you and collecting even more information. in that case you would be talking about a version that would be some sort of an automatic system or doxing. all of this, again, would link back to the kremlin. these are the two key ways we heard about today, either tricking people into sending their information through a spear phishing attack, it's called that because you target a specific group and sometimes specific individuals as opposed to everyone, but the other one is a malware attack launched in this fashion, jake. >> tom foreman. this just in, republican senator john mccain is weighing in on the indictment today and what it might mean for the upcoming trump/putin summit. he wrote in a statement, quote, president trump must be willing to confront
in this case what malware with a do is sit on your computer and start automatically collecting all sorts of information. addresses that you were using all the time to send information to, your contact list, your passwords when you signed in. it could grab screen shots when you wrote things. then it could spread out through your network, imitating you and collecting even more information. in that case you would be talking about a version that would be some sort of an automatic system or doxing....
29
29
Jul 29, 2018
07/18
by
CSPAN3
tv
eye 29
favorite 0
quote 0
like evidence of malware have often used in a war situation. so the problem is, how do you regulate it? the way you regulate it, i think is to ban like minded countries who are also victims of it, such as germany and the u.k., and to say we need to come up with new approaches, okay? that's a leadership role. another role is to say, you're doing this, i don't like it, i'm not going to let you invest in the united states. >> it's 11:00. so we promised to end on time and i would like to thank you all for coming here this morning. it's been an interesting discussion. we're here and available to chat with you after. [applause] [captioning performed by the national captioning institute, which is responsible for its caption content and accuracy. visit ncicap.org] announcer: american history tv on c-span3 is in prime time next week, starting at 8:00 p.m. eastern on monday night, ronald reagan and the cold war with highlights of the president's 1987 trip to west berlin. tuesday night, oral histories interviews with former women members of congress. on w
like evidence of malware have often used in a war situation. so the problem is, how do you regulate it? the way you regulate it, i think is to ban like minded countries who are also victims of it, such as germany and the u.k., and to say we need to come up with new approaches, okay? that's a leadership role. another role is to say, you're doing this, i don't like it, i'm not going to let you invest in the united states. >> it's 11:00. so we promised to end on time and i would like to...
69
69
Jul 20, 2018
07/18
by
CSPAN3
tv
eye 69
favorite 0
quote 0
in which north korean cyberactors used malware to brick computers worldwide, hold them for ransom. and used basically took advantage of a known vulnerability in order to do that. i mentioned c-tic size and the difference in our role between nctcs, we're very much in a support role. our aim in addition to integrating information is kind of bridging the seams across the federal cybercommunity, the intelligence community, network defenders, incident responders, law enforcement and helping information move across those various parts of our cybercommunity. and that's very much what we did here. i mentioned we're multiagency through our work with dhs, in those first days when wanna cry was hitting over a weekend. like most attacks seem to do. we were aware of information that dhs had gleaned through their great partnerships with the private sector. so as the network service providers were working on mitigating the attack, trying to shut it down, they were also learning information about how it had first formed. think about a medical type of infection, where it's very important to know ho
in which north korean cyberactors used malware to brick computers worldwide, hold them for ransom. and used basically took advantage of a known vulnerability in order to do that. i mentioned c-tic size and the difference in our role between nctcs, we're very much in a support role. our aim in addition to integrating information is kind of bridging the seams across the federal cybercommunity, the intelligence community, network defenders, incident responders, law enforcement and helping...
253
253
Jul 24, 2018
07/18
by
CNNW
tv
eye 253
favorite 0
quote 1
the hackers first gained access to small energy related companies, planting malware that allowed themo move to larger networks. once again the suppliers, the russians collected information on the facilities control systems, attempting to acquire the ability to turn those systems off. >> they're identified targets, positioning malware so they could pull the trigger when they wanted to but they're also sending the united states a message. we are in position to cause harm if we wanted to do it. and so, you the u.s. should be a little more careful. >> reporter: a spokesperson cautions while companies were targeted, the access was limited and would not have had impact on the larger grid if taken offline. the russians targeted other crucial sectors of nuclear power, waefrt, aviation and manufacturing. experts see the intrusions as a possible precursor of an attack that could in the event of all-out war devastate the u.s. homeland. director of the nsa and commander of u.s. cyber command said russia presents a clear and present danger. >> adversaries continue to penetrate and try to penetrate
the hackers first gained access to small energy related companies, planting malware that allowed themo move to larger networks. once again the suppliers, the russians collected information on the facilities control systems, attempting to acquire the ability to turn those systems off. >> they're identified targets, positioning malware so they could pull the trigger when they wanted to but they're also sending the united states a message. we are in position to cause harm if we wanted to do...
125
125
Jul 2, 2018
07/18
by
KNTV
tv
eye 125
favorite 0
quote 0
four steps to prevent malware. one, set a pass code. he said it's shocking how many people don't.wo, turn on auto update because bad guys exploit bugs in old software. three, only install apps from the official store, never from links. four, consider buying security software for your phone. >> that's exactly what we do. >> reporter: lookout and other services offer realtime scans that warn you as soon as you click something shady like a bot. >> we jump in front and say, hey, you shouldn't follow this link. we think it's bad. >> reporter: here's the big unknown. right now hackers can corrupt your phone to manipulate ticket prices, steal gift cards, post spam, and attack corporate servers. so what will they hijack your phone to do next? >> they keep changing and keep hiding and keep trying to appear more human-like in order to avoid detection. >> that was chris chmura reporting. we've created a short video about bots specifically for social media. you can share it with your family, your friends, and your followers. you can look for a link on our web page. if you want to see that vid
four steps to prevent malware. one, set a pass code. he said it's shocking how many people don't.wo, turn on auto update because bad guys exploit bugs in old software. three, only install apps from the official store, never from links. four, consider buying security software for your phone. >> that's exactly what we do. >> reporter: lookout and other services offer realtime scans that warn you as soon as you click something shady like a bot. >> we jump in front and say, hey,...
105
105
Jul 4, 2018
07/18
by
MSNBCW
tv
eye 105
favorite 0
quote 0
scale of the global cyber war is to big it's hard to fathom. 1 out of every 00 131 e-mails contains malwared that's just targeting microsoft's cloud and platforms. every tech giant is under similar attack. password fraud, phishing e-mails, sophisticated automated programs that are often run by hostile governments, russia, china and north korea among them. >> where there's more individuals and financial gain, that's where aur oh going to see the concentration. >> that's julia white, vice president mike soft cloud security. they take apart infect the software looking for suspect clues, and the cyber defense operation center, which monitors malware attacks round the clock. it's here they are protecting everything stored on the cloud. that requires using artificial intelligence to spot abnormal internet traffic. if you send an ooemt from chicago and 20 minutes later from tokyo, it should get flagged. . use the cloud, this is the kind of caprotectability. >> the best way is for good hackers to find the vulnerabilities first. >> we are doing something fairly noisy. >> that's the red team's job. a
scale of the global cyber war is to big it's hard to fathom. 1 out of every 00 131 e-mails contains malwared that's just targeting microsoft's cloud and platforms. every tech giant is under similar attack. password fraud, phishing e-mails, sophisticated automated programs that are often run by hostile governments, russia, china and north korea among them. >> where there's more individuals and financial gain, that's where aur oh going to see the concentration. >> that's julia white,...
24
24
Jul 21, 2018
07/18
by
CSPAN2
tv
eye 24
favorite 0
quote 0
bit -- a hybrid threat but things on the rater we are still concerned about and then to reposition malware but that is a huge attentional issue there are so many different things dedicated things with organized groups are trying to target us if we not try to determine that is a huge issue. we may not do that during peacetime but that is a problem and that worries me even more that is the integrityne it is one thing of denial of service it is another as my friend from estonia says if they change my blood type then i get a transfusion than i die. or the financial data with the stock for the military system there is a range of differente threats. i don't like using these terms because when you don't see that people dressed again taking threats for what they are the very strong about agoing after them and that requires organization. >> and that isn'to signaling interest or devotion to that topic are we prepared for the scary described like our lights being shut off without our knowledge or our water infected are the blood types change the stock market crashed?re are people in the trenches stop
bit -- a hybrid threat but things on the rater we are still concerned about and then to reposition malware but that is a huge attentional issue there are so many different things dedicated things with organized groups are trying to target us if we not try to determine that is a huge issue. we may not do that during peacetime but that is a problem and that worries me even more that is the integrityne it is one thing of denial of service it is another as my friend from estonia says if they change...
88
88
Jul 13, 2018
07/18
by
CNNW
tv
eye 88
favorite 0
quote 0
one unit was running the malware.ent here -- our government has the names of this malware. so it's clear we have very good capabilities and that the fbi and our intelligence folks have been looking at this for quite some time because some of this is even in the intelligence report. so this is not new. it's just a question of whether or not they had enough and were ready at a point to bring charges. it is a significant, significant move by the department of justice, by the national security division to bring these kinds of charges for many reasons. certainly when you are charging senior-level people of the russian government, that is a massive, massive move. >> this is a game changer from monday. it is. i understand we had the ira indictment. so there's been a fact pattern here. but this happening just days before -- jake, you earlier brought up what president trump said this morning in the press conference about no perry mason moment do i expect. it's not like putin's all the sudden going to say, gee, i did it, and co
one unit was running the malware.ent here -- our government has the names of this malware. so it's clear we have very good capabilities and that the fbi and our intelligence folks have been looking at this for quite some time because some of this is even in the intelligence report. so this is not new. it's just a question of whether or not they had enough and were ready at a point to bring charges. it is a significant, significant move by the department of justice, by the national security...
380
380
tv
eye 380
favorite 0
quote 0
on o of every 130 e-mails today contains malware. hours. 4,000 rsomware attacks every day, 30,000 fraudulent login attempts, that's just targeti microsoft's clouds and platforms. every giantnder attack t phishing e-mails, denial of service, sophisticatedms automad pr that today are often run by hostile governments, russia, ndchina, north korea among them. >> it looks like the entire u.s. is under attack. >> where there's more in viduals, financial gain to be had, that's where you see the concent'ation. >> t julia white, vice president microsoft cloud security. >> there's attacks that happen every single day. our customers don'the see because we stopped them. >> ours were the first cameras allowednside microsoft forensic lab where they take apart software looking for clues and cyber operation center which monitors malware attacks around clock. it's here they are protecting everything stored on the cloud from familyhotos to corporate financial information to sensitive government data.eq that ruires using artificial intelligce to spot a
on o of every 130 e-mails today contains malware. hours. 4,000 rsomware attacks every day, 30,000 fraudulent login attempts, that's just targeti microsoft's clouds and platforms. every giantnder attack t phishing e-mails, denial of service, sophisticatedms automad pr that today are often run by hostile governments, russia, ndchina, north korea among them. >> it looks like the entire u.s. is under attack. >> where there's more in viduals, financial gain to be had, that's where you...
57
57
Jul 14, 2018
07/18
by
KPIX
tv
eye 57
favorite 0
quote 0
they are accused of implanting malware and stealing information. there accused of taking that information and trying to influence voters opinions. >> first they use spearfishing, which involves sending misleading email messages. second, the defendants hacked into computer networks and installed malicious software. that then allowed them to spy on users. >> reporter: rosenstein said the indictment does not reflect partisan politics. >> it is important for us to avoid thinking politically as republicans or democrats, and instead to think patriotically as americans. >> president trump was briefed before leaving for his european trip, which includes a summit with vladimir putin. earlier friday, president trump said that the ongoing russia probe is complicating his relationship with russia, but he did found to address the meddling. >> i will absolutely bring that up. i don't think that you will have any -- g, i did it you got me. there will not be a perry mason here. >> democrats say he should not meet with putin alone. >> i want to make sure that other
they are accused of implanting malware and stealing information. there accused of taking that information and trying to influence voters opinions. >> first they use spearfishing, which involves sending misleading email messages. second, the defendants hacked into computer networks and installed malicious software. that then allowed them to spy on users. >> reporter: rosenstein said the indictment does not reflect partisan politics. >> it is important for us to avoid thinking...
175
175
Jul 29, 2018
07/18
by
KGO
tv
eye 175
favorite 0
quote 0
this is malware that destroys systems.there's real reason to be concerned about the soundness of the russian effort to attack our elect. >> it's almost like we can't get the public's attention about this. i keep wanting to talk about it each sunday or whenever we possibly can because it's hard to understand, it's confusing. the bottom line and we just have a couple of seconds here, how concerned should we be and what can we do? >> we should be very concerned, again, about the long-term goal here which is to undermine our democracy and the fact that the russians are bringing every aspect of cyber capabilities to the table from offensive cyber operations to the influence campaign that they've taken on. the probe into our electric grid is absolutely preparing the battlefield for the possibility of conflict with the united states, so we ought to think about it, elevate the conversation and actually rise above the fray and focus on what we need to do as a country. >> okay, i hope we can do that. thanks to both of you. >>> up ne
this is malware that destroys systems.there's real reason to be concerned about the soundness of the russian effort to attack our elect. >> it's almost like we can't get the public's attention about this. i keep wanting to talk about it each sunday or whenever we possibly can because it's hard to understand, it's confusing. the bottom line and we just have a couple of seconds here, how concerned should we be and what can we do? >> we should be very concerned, again, about the...
34
34
tv
eye 34
favorite 0
quote 0
media company released it buzz feed the document claimed the entrepreneur's firms used viruses and malware to infiltrate the systems of the democratic national committee and also claims that goober have worked for the russian intelligence services he value mentally denies all accusations. go live as washington our correspondent there samir a can joins me said mirah what does this ruling mean. well fusion g.p.s. will now have to answer questions regarding its role in compiling the still dossier the trump russia dossier the very dossier that made headlines worldwide for its unverified salacious allegations about donald trump before his inauguration lawyers will be able to ask a fusion g.p.s. representatives about its clients how they verify their claims and why they hired christopher steele and they'll also be able to find out the nature of the firm's interactions with government officials and media outlets the russian entrepreneurs lawyer who filed these claims against buzz feed and still called it a fichter e. this ruling gave us everything that we had hoped for after a year of trying ever
media company released it buzz feed the document claimed the entrepreneur's firms used viruses and malware to infiltrate the systems of the democratic national committee and also claims that goober have worked for the russian intelligence services he value mentally denies all accusations. go live as washington our correspondent there samir a can joins me said mirah what does this ruling mean. well fusion g.p.s. will now have to answer questions regarding its role in compiling the still dossier...
154
154
Jul 20, 2018
07/18
by
KQED
tv
eye 154
favorite 0
quote 0
there are tutorials many times on how to u the malware. >> you can be a criminal in , nigeria, braz innd london and all you have to do is afind the right too services and you can be up and running very quickly. it's almostg pd play. >> if major corporations have their entire crown jewel stolen, a law firm wouldn't be anyone that i would be surprised at. >> matt o'neal is a super asory speciant with the secret service. >> if you were a business operating in theyonited states have to have a defensive posture and assume that somebody access into get your systems. >> for nightly business report i'mndrea day. >> before we go, let's take a final day on the day on wall street. a handful of earnings reports pushed then dow d 134 points and the nasdaq lost 29 and the s&p gave back 11, but we'll see what those microsoft earnings toni mt do to thekets tomorrow. that's nbr for tonight. i'm bill griffith. thanks for watching. have a good evening. we'll see you tomorrow. >> this is "bbc world news america." >> funding of this presentation is made possible by the freeman foundation, kovler foundation
there are tutorials many times on how to u the malware. >> you can be a criminal in , nigeria, braz innd london and all you have to do is afind the right too services and you can be up and running very quickly. it's almostg pd play. >> if major corporations have their entire crown jewel stolen, a law firm wouldn't be anyone that i would be surprised at. >> matt o'neal is a super asory speciant with the secret service. >> if you were a business operating in theyonited...
37
37
tv
eye 37
favorite 0
quote 0
computers around the world that have been hacked into and just used to send out this kind of fishing with malware and so i got one today it was from chase bank but it came from some professor at the university of texas who had been hacked so it's a very easy thing to see when it's done that way now some of them will actually have email addresses that look very very similar to what are the legitimate ones but very often you'll find it's the bot net and yeah it doesn't match so it ain't working lately when we think rip off we think online about phone scams are they still alive and all too well. oh yeah they're huge and you know robo calls people are still falling for robo calls they're answering them they're providing personal information and the thing with phone scams and they particularly seem to hit the elderly they are more willing to pick up they're more trusting and actually there's a scientific basis for that there's a part of our brain as we age that deals with skepticism that makes us more you know more trusting but the thing with the phone call is these scammers can fool they can trick yo
computers around the world that have been hacked into and just used to send out this kind of fishing with malware and so i got one today it was from chase bank but it came from some professor at the university of texas who had been hacked so it's a very easy thing to see when it's done that way now some of them will actually have email addresses that look very very similar to what are the legitimate ones but very often you'll find it's the bot net and yeah it doesn't match so it ain't working...
93
93
Jul 28, 2018
07/18
by
CSPAN
tv
eye 93
favorite 0
quote 0
chairman pai, it's been two we learned about the vpn filter, russian link malware that can be used to steal information and block network traffic. thousands or more routers have been compromised yet consumers either know it or they've been left wondering if their router to taketed and how action. these are routers lended from isp's. isp's have athat responsibility to inform routers about no one vulnerabilities? chairman pai: we want to ensure that consumers get the need.ation they isp's havey: do the responsibility? chairman pai: i would hope they consumers.m is the f.c.c. doing anything to help consumers update their routers? chairman pai: i have to be a little bit circumspect on this issue. comment on things that have classification but we'd be happy to work with you. mcnerny: is the f.c.c. doing anything to protect customers from issues with routers? chairman pai: we do monitor equipment.hreats to rep mcnerney: commissioner rosenworcel, do you think the in protectingole consumers from cybersecurity threats? com. rosenworcel: yes, i also equipment authorization process is of note. t
chairman pai, it's been two we learned about the vpn filter, russian link malware that can be used to steal information and block network traffic. thousands or more routers have been compromised yet consumers either know it or they've been left wondering if their router to taketed and how action. these are routers lended from isp's. isp's have athat responsibility to inform routers about no one vulnerabilities? chairman pai: we want to ensure that consumers get the need.ation they isp's havey:...
29
29
Jul 27, 2018
07/18
by
CSPAN2
tv
eye 29
favorite 0
quote 0
the dhs, fbi when at about pre-position of malware on electrical grid. that's a huge potential issue. exposure because the internet of things. there are so many different things where we know dedicated nationstates and other organized groups are trying to target us. if we're not sending the message, not trying to deter them, that's huge-ish and they'll come back and get stronger and they might not do it during peacetime but if a conflict they will take our system to and that's a problem. one thing that worries me even more than all of that is the integrity of information. it's one thing if there's an attack and they can't get to my website for couple of hours because the call another thing as my friend the former president of estonia has said, if someone breaks into my hospital, changes but blood type and the next time i get a transfusion and i die, or they affect the financial data and the stock markets so you can't close. or you affect military systems. there's a range of different threats. i don't like using these terms that people use cyber 9/11 and
the dhs, fbi when at about pre-position of malware on electrical grid. that's a huge potential issue. exposure because the internet of things. there are so many different things where we know dedicated nationstates and other organized groups are trying to target us. if we're not sending the message, not trying to deter them, that's huge-ish and they'll come back and get stronger and they might not do it during peacetime but if a conflict they will take our system to and that's a problem. one...
103
103
Jul 31, 2018
07/18
by
FOXNEWSW
tv
eye 103
favorite 0
quote 0
what the government is worried about is some sort of malware attack.y follow this noise, people start getting nervous about how to use these systems but poll workers keep that under control. >> you can't vote changing but democracy undermining. >> the issues have been whether foreign nationals have seen voters databases and they have in illinois and arizona dating back to 2016. and that undermines security but there is a question whether voters will go to the polls if there are security issues. rob: i am sure we will be checking back with you a lot. >> 17 after the hour, the tsa under fire over a secret surveillance program we told you about yesterday. how the agency is responding to critics this morning. millions of illegal immigrants in the us and one democrat has plans to solve the crisis. give them amnesty. growing backlash to that. ♪ are you ready to take your wifi to the next level? then you need xfinity xfi. a more powerful way to stay connected. it gives you super fast speeds for all your devices, provides the most wifi coverage for your home,
what the government is worried about is some sort of malware attack.y follow this noise, people start getting nervous about how to use these systems but poll workers keep that under control. >> you can't vote changing but democracy undermining. >> the issues have been whether foreign nationals have seen voters databases and they have in illinois and arizona dating back to 2016. and that undermines security but there is a question whether voters will go to the polls if there are...
53
53
Jul 26, 2018
07/18
by
BLOOMBERG
tv
eye 53
favorite 0
quote 0
malware is a lot more robust on -- it is a lot more robust on mobile. and works very well.mily: quickly, david kirkpatrick, is this something you see taking on more broadly among u.s. and global users? david k.: i think the thing gaining a lot of interest in the tech industry. there is this idea that users should be paid for their data instead of having it taken from them and used to target advertising. there is an extraordinary explosion on people working on systems that might allow people to somehow monetize their own data rather than have facebook do it for them. i do not think it is inconceivable that facebook could do that as well. emily: david kirkpatrick and david gorodyansky, thank you both. coming up, a question that has been asked for years. is facebook finally running out of new users? we will discuss. this is bloomberg. ♪ emily: this is bloomberg technology. i am emily chang in san francisco. things don't seem as good as they once were for facebook. for the first time, facebook missed estimates on revenue. zuckerberg document gdp our laws. -- talked about gdp ou
malware is a lot more robust on -- it is a lot more robust on mobile. and works very well.mily: quickly, david kirkpatrick, is this something you see taking on more broadly among u.s. and global users? david k.: i think the thing gaining a lot of interest in the tech industry. there is this idea that users should be paid for their data instead of having it taken from them and used to target advertising. there is an extraordinary explosion on people working on systems that might allow people to...
109
109
Jul 24, 2018
07/18
by
MSNBCW
tv
eye 109
favorite 0
quote 0
they could have malware, and impact ones and twos. >> this it is an a symmetric threat. they have power. >> iran? >> iran. north korea and iran both really sharpen their capabilities. and that is exactly right. lessening of activity after the nuclear commitment. >> they can start emptying our bank accounts. >> we have seen north korea. >> thank you. great reporting. up next, key congressional seat in ohio has been held by republicans and now, it is being called a toss up. coming here in a minute. this is "hardball" where the action is. the chili pepper sweat-out. not cool. freezing away fat cells with coolsculpting? now that's cool! coolsculpting safely freezes and removes fat cells with little or no downtime. and no surgery. results and patient experience may vary. some common side effects include temporary numbness, discomfort,and swelling. ask your doctor if coolsculpting is right for you and visit coolsculpting.com today for your chance to win a free treatment. dinner date...meeting his parents dinner date. why did i want a crest 3d white smile? so i used crest. cres
they could have malware, and impact ones and twos. >> this it is an a symmetric threat. they have power. >> iran? >> iran. north korea and iran both really sharpen their capabilities. and that is exactly right. lessening of activity after the nuclear commitment. >> they can start emptying our bank accounts. >> we have seen north korea. >> thank you. great reporting. up next, key congressional seat in ohio has been held by republicans and now, it is being...
42
42
Jul 14, 2018
07/18
by
BLOOMBERG
tv
eye 42
favorite 0
quote 0
disabling it with the flood of messages, distributed denial of service attack, or with good old-fashioned malware one. shedding off services to hospitals, transportation networks. shutting down real service, shutting down port services. >> a number of countries are known to have active cyber warfare programs, but -- >> russia decided to really go on the offense and be noisy, making it known that they have these capabilities and are ready to use them. >> like causing two large-scale power outages in ukraine, were manipulating social media to sway election. >> the thing we have to learn more about is not the cyber warfare, but the information operations. that's what happened in 2016 in the u.s. >> attacks including information operations were sent by the thousands since 2006, and those are just the attacks we know about. >> i think there's a lot that happened with the general public is not aware of. we have no idea. ♪ >> and that was just one of the many quick takes you can find on the bloomberg. you can also find them at bloomberg.com, along with all the latest business news and analysis 24 hours
disabling it with the flood of messages, distributed denial of service attack, or with good old-fashioned malware one. shedding off services to hospitals, transportation networks. shutting down real service, shutting down port services. >> a number of countries are known to have active cyber warfare programs, but -- >> russia decided to really go on the offense and be noisy, making it known that they have these capabilities and are ready to use them. >> like causing two...