A man from Wisconsin was sentenced for participating in a DDoS (distributed denial-of-service) attack by hacker group Anonymous on a Kansas company. Eric J. Rosol, 38, is admitted that on Feb. 28, 2011, he took part in a denial of service ...
Tags: Ddos Attack, Fined
A new Trojan programme that targets users of online financial services has the potential to spread very quickly over the next few months, security researchers warn. The malware was first advertised on a private cybercrime forum in July, ...
Tags: Online Banking, Threatonline, financial services, security
Key traffic across the internet has been "hijacked" several times this year and deliberately routed through locations in, first, Belarus and then Iceland. The hijackings - or "network interceptions" - were targeted at specific cities and ...
Tags: Internet, traffic, hijacked, Belarus, Iceland, Renesys
Cybercriminals are increasingly using the “Blackshades” malware program whose source code was leaked three years ago, according to an analysis by Symantec. Blackshades, which Symantec identifies as “W32.Shadesrat,” ...
Tags: Symantec, Blackshades, malware
Security researchers have uncovered two unpatched vulnerabilities in Internet Explorer (IE) which have been exploited by attackers in an unusual “watering hole” campaign launched from a U.S.-based website that specialises in ...
Tags: IE, zero-day, hacker, watering hole
The website of a U.S. organisation specialising in national and international security policy was compromised with malware that targeted a previously unknown vulnerability in Internet Explorer. A nation-state looking to compromise the ...
Tags: Nation-state, attack, IE, flaw
Microsoft today said that attackers are exploiting a critical and unpatched vulnerability in Office 2007 using malformed documents to hijack Windows PCs, and that Office 2003 and Office 2010 are also vulnerable. The bug can be triggered ...
Tags: Microsoft, software, Computer Products
“Collecting more and more unstructured data will open up another whole degree of attractiveness and may well lead to attackers seeing value in a form not previously recognised by the organisation that owns the data.” So ...
Adobe, known for its Reader and Acrobat software, has confirmed that the cyber attack it recently suffered impacted 38 million users - more than 10 times the 2.9 million customers it had said were affected initially. The attack, which the ...
Tags: Adobe, software, Computer Products
Only four per cent of UK organisations have IT security functions that fully meet their needs, a new survey released by one of the "big four" international professional services firms, Ernst & Young, claims. Ernst & Young's 16th annual ...
Tags: Computer Products, software
Cyber attacks on container ships and port infrastructure will get more sophisticated as time goes on and companies should be doing more to protect their supply chain security. Maritime and IT security companies have raised their concerns ...
Ihab Moawad, Vice President, Trend Micro, Mediterranean, Middle East & Africa Trend Micro will release its finding on the greatest IT security threats to business in the MENA region at GITEX 2013, the company said Sunday. Trend Micro ...
Tags: Computer Products, software
Kaspersky has discovered 'Icefog', a hacking campaign that targets the supply chains of Western companies, a report by the security and anti-virus software solutions provider has revealed, as it warns about the growing threat of ...
Tags: Kaspersky, software, Computer Products
Adobe released security updates for Flash Player, Adobe Reader and Shockwave Player on Tuesday to address critical vulnerabilities that could allow attackers to take control of systems running vulnerable versions of those programs. The ...
Tags: Adobe, Flash Player
Cisco Systems released security patches for Secure Access Control Server (Secure ACS) for Windows to address a critical vulnerability that could allow unauthenticated attackers to remotely execute arbitrary commands and take control of the ...
Tags: Computer Product, software