Doug Olenick

 Send a message to Doug Olenick
Recent articles by Doug Olenick
Mirai botnet army could have been larger and more destructive 

Mirai botnet army could have been larger and more destructive

The massive Mirai distributed denial of service (DDoS) attack that took down Dyn DNS last fall knocking out dozens of high-profile websites could have been much worse if the malicious actors had done a bit more research.
WannaCry: A month later 

WannaCry: A month later

With one month of hindsight, and a lot of research, under the industry's belt, analysts are still in the process of building a complete picture of the WannaCry ransomware attack that took the world by storm, but some points are firmed up.
Twitter updates privacy policy, including how it handles data sharing 

Twitter updates privacy policy, including how it handles data sharing

Twitter has issued an update to its privacy policy making changes in how it handles web data, data sharing and how Twitter uses collected data to personalise content provided across all of a member's devices.
Pickpockets and hackers, the latest cyber-crime marriage 

Pickpockets and hackers, the latest cyber-crime marriage

A Trend Micro researcher may have stumbled across a new alliance in place between petty criminals and their more sophisticated cyber cousins that could prove mutually beneficial.
New social media site Mastodon potential cyber-security tar pit  

New social media site Mastodon potential cyber-security tar pit

This social network takes a decentralised approach.
Star Trek-themed Captain 'Kirk' ransomware with Spock decryptor spotted 

Star Trek-themed Captain 'Kirk' ransomware with Spock decryptor spotted

Beam us up, Scotty!
Trend Micro details new Internet of Things DDoS threat  

Trend Micro details new Internet of Things DDoS threat

Trend Micro is reporting a new threat to Linux-based Internet of Things devices that is specifically able to exploit a specific vulnerability in surveillance cameras made by AVTech.
Ransomware, IoT combo lead SANS list of dangerous attack techniques 

Ransomware, IoT combo lead SANS list of dangerous attack techniques

The development of crypto ransomware and IoT devices as a threat platform is among the top infosec problems discussed during the Seven Most Dangerous Attack Techniques panel at RSA 2017.
Firefox zero day impacts Tor 

Firefox zero day impacts Tor

A Tor executive has confirmed that a zero-day vulnerability impacting Tor and Firefox has been spotted being used to execute malicious code, but it has been reported to Mozilla, according to ARS Technica.
ESET releases Crysis ransomware decryptor tool   

ESET releases Crysis ransomware decryptor tool

ESET security researchers have created and released a free decryption tool to help combat Crysis ransomware.
This is PoisonTap - Kamkar tool can hack locked PCs 

This is PoisonTap - Kamkar tool can hack locked PCs

Security researcher Samy Kamkar rolled out a hacking tool dubbed PoisonTap that can crack into a locked computer fully exposing the device to a myriad of potential hacking problems.
Locky ransomware distributors reduced to potty talk 

Locky ransomware distributors reduced to potty talk

After a two week break that saw few Locky ransomware attacks, the Cisco Talos research team discovered a new variety that sports not only a scatologically named extension for the encrypted files but another reference that insults Linux.
Mirai DDoS attacks not caused by state actors: FlashPoint 

Mirai DDoS attacks not caused by state actors: FlashPoint

The Mirai DDoS attack that took down a slew of prominent websites last Friday was most likely initiated by users from hackforums[.]net and not a nation-state or cyber-criminal organisation, according to FlashPoint.
Ransomware's busy week with new varieties and updates being debuted 

Ransomware's busy week with new varieties and updates being debuted

With the massive Yahoo! data breach grabbing the cyber-security headlines of late, it might be easy to forget criminals are still busy pushing ransomware with two new varieties being recently introduced and a one older type being revamped.
Help wanted: Copy editors to clean up French phishing emails 

Help wanted: Copy editors to clean up French phishing emails

A ad spotted on the French dark web may be an indicator that cyber-criminals are tired of having their phishing scams spoiled due to poor spelling and grammar.
Dropbox recommending some users update account credentials 

Dropbox recommending some users update account credentials

Dropbox is recommending to some users update the login credentials for their account because a group of member emails and passwords may have been compromised.
Black Hat Las Vegas: MasterCard workers go "phishing" for malware 

Black Hat Las Vegas: MasterCard workers go "phishing" for malware

At Black Hat, MasterCard CSO Ron Green touted his company's latest effort to fight malware.
200 million Yahoo user credentials for sale on dark web 

200 million Yahoo user credentials for sale on dark web

Yahoo and the company's users may be facing a data breach of epic proportions if a hacker who claims to be hawking 200 million Yahoo account credentials is proven true.
New banking malware stops customers from cancelling payment cards 

New banking malware stops customers from cancelling payment cards

Symantec has spotted a new banking malware that stops a victim from cancelling a compromised payment card by blocking calls from the infected device to the bank's customer service department.
LizardStresser botnets using webcams, IoT gadgets to launch DDoS attacks 

LizardStresser botnets using webcams, IoT gadgets to launch DDoS attacks

Lizard Squad's LizardStresser botnet rising in popularity as hackers and cyber-criminals increasingly look to it as a way of assimilating IoT devices for later DDoS attacks.

Latest Comments

From our Partners

PC & Tech Authority Downloads