The Democratic Party suffered another hack, according to two reports Friday, heightening concerns Russia might be trying to influence the US presidential election.

The Democratic Congressional Campaign Committee, a group that raises funds for the party's candidates for the House of Representatives, confirmed its computers had been breached, according to Reuters. It's unclear what data, if any, was taken.

The attack might be related to a breach of the Democratic National Committee's computer network, which was revealed earlier this month. The code used in the DCCC attack resembled that used by a Russian government-linked hacking group suspected in the DNC breach, according to Reuters.

The FBI is addressing both hacks in a single investigation, The Washington Post reported.

The Kremlin has denied involvement in both attacks, Reuters said.

Neither the DCCC nor the Russian Embassy immediately responded to a request for comment, and the FBI didn't immediately provide comment.

The DCCC attack, which took place between roughly June 19 and June 27, may have been designed to get hackers access to donors' computers, Reuters reported.

On Wednesday, Republican presidential nominee Donald Trump took heat for seeming to encourage Russia to crack into US systems. Democratic nominee Hillary Clinton's campaign manager has accused Russian hackers of releasing DNC emails to WikiLeaks to help Trump win the upcoming election. Trump's campaign didn't immediately respond to an email seeking comment.



Cybersecurity experts are leading a new program to develop new data analysis methods better to protect the nation’s power grid. The goal of this project is to develop technologies and methodologies to protect the grid from advanced cyber and threats by developing the means to distinguish between power grid failures caused by cyber attacks and failures caused by other means, including natural disasters, “normal” equipment failures, and even physical attacks.

Cybersecurity experts Jamie Van Randwyk of Lawrence Livermore National Laboratory(LLNL) and Sean Peisert of Lawrence Berkeley National Laboratory(Berkeley Lab) are leading a new program to develop new data analysis methods better to protect the nation’s power grid.

The project, “Threat Detection and Response with Data Analytics,” i  part of a $220 million, three-year Grid Modernization Initiative launched in January 2016 by the Department of Energy to support research and development in power grid modernization.




Wearable devices can give away your passwords, according to new research.

In the paper "Friend or Foe?: Your Wearable Devices Reveal Your Personal PIN" scientists from the Stevens Institute of Technology and Binghamton University combined data from embedded sensors in wearable technologies, such as smartwatches and fitness trackers, along with a computer algorithm to crack private PINs and passwords with 80-percent accuracy on the first try and more than 90-percent accuracy after three tries.

Yan Wang, assistant professor of computer science within the Thomas J. Watson School of Engineering and Applied Science at Binghamton University is a co-author of the study along with the lead researcher, his advisor Yingying Chen, from the Stevens Institute of Technology.

"Wearable devices can be exploited," said Wang. "Attackers can reproduce the trajectories of the user’s hand then recover secret key entries to ATM cash machines, electronic door locks and keypad-controlled enterprise servers."

"This was surprising, even to those of us already working in this area," says the lead researcher Chen, a multiple time National Science Foundation (NSF) awardee. "It may be easier than we think for criminals to obtain secret information from our wearables by using the right techniques.




Security experts from ESET security firm have spotted an espionage toolkit dubbed SBDH that was used by threat actors in hacking operations targeting government organizations in Europe.

The research observed infections in many countries, including the Czech Republic, Hungary, Poland and Slovakia, and Ukraine.

The SBDH toolkit was designed to steal sensitive data from victim’s machines, experts from ESET have already detected other sample of the toolkit over the past year, hackers exploited it in attacks against government and public institutions.

Threat actors targeted organizations focused that specialize in economic growth and cooperation.

“Over the course of the last year, ESET has detected and analyzed several instances of malware used for targeted espionage – dubbed SBDH toolkit. Using powerful filters, various methods of communication with its operators and an interesting persistence technique, it aims to exfiltrate selected files from governmental and public institutions, which are mostly focused on economic growth and cooperation in Central and Eastern Europe.” reported ESET in a blog post.