If US intelligence agencies ban the computers of a Chinese company from classified networks should companies also avoid the same products? What if the vendor is one of the world’s largest PC makers? Those questions are not academic. ...
Tags: China-Based Lenovo
A variety of network-controlled home automation devices lack basic security controls, making it possible for attackers to access their sensitive functions, often from the Internet, according to researchers from security firm Trustwave. ...
Tags: Computer Products, softwre
Cass Johnson, President of the National Council of Textile Organizations (NCTO), released the following statement in meeting between President Barack Obama and President Truong Tan Sang of Vietnam. “Within the context of the ...
The Chinese cyber-spies behind the widely publicised espionage campaign against?The New York Times?have added Dropbox and WordPress to their bag of spear-phishing tricks. The gang, known in security circles as the DNSCalc gang, has been ...
Tags: Computer Products, software
HP would put up a fight for its customers' data if the US authorities came calling to access it, according to HP's privacy officer EMEA, Daniel Pradelles. The US Patriot Act enables authorities in the US to seize data if they believe it ...
An ongoing cyberespionage campaign compromised over 350 high-profile victims from more than 40 countries over the past eight years, including political activists, research centers, governmental institutions, embassies, military contractors ...
Security researchers have identified multiple samples of the recently discovered "KitM" spyware for Mac OS X, including one dating back to December 2012 and targeting German-speaking users. KitM (Kumar in the Mac), also known as HackBack, ...
Tags: OS X Spyware, Mac, Computer Products
Previously unknown Mac OS X spyware, signed with a valid Apple Developer ID, has turned up on the laptop of an activist from Angola at a human rights conference in Norway. Security researcher and privacy activist Jacob Appelbaum found the ...
Tags: Computer Products, software
AutoIt, a scripting language for automating Windows interface interactions, is increasingly being used by malware developers thanks to its flexibility and low learning curve, according to security researchers from Trend Micro and ...
Researchers following a cyber espionage campaign apparently bent on stealing drone-related technology secrets have found additional malware related to the targeted attacks. FireEye researchers have been tracking so-called "Operation ...
Tags: Malware, Cyber Attacks, Computer Products
The U.S. House of Representatives moved closer Wednesday toward the passage of the Cyber Intelligence Sharing and Protection Act (CISPA), despite concerns that the cyberthreat information-sharing bill will allow Web-based companies to share ...
Tags: Computer Products, CISPA
Researchers from security vendor FireEye have uncovered a new APT (advanced persistent threat) that uses multiple detection evasion techniques, including the monitoring of mouse clicks, to determine active human interaction with the ...
Tags: Computer Products, software
Researchers from security vendor FireEye have uncovered a new advanced persistent threat (APT) that uses multiple detection evasion techniques, including the monitoring of mouse clicks, to determine active human interaction with the ...
Tags: Computer Products, software
A piece of malicious software spotted by Trend Micro uses the note-taking service Evernote as a place to pick up new instructions. The malware is a backdoor, or a kind of software that allows an attacker to execute various actions on a ...
Tags: Computer Products, softare
Haiti became the 31st country to join the TAAT alliance which is seeking strong and fair textile rules in the TPP agreement. Gregor Avril, the Executive Director of the Association of Industries of Haiti said, “We stand with our ...
Tags: fair textile, textile rules, textile