Computerworld - An elite hacker group targeting defense industry sub-contractors has an inexhaustible supply of zero-days, or vulnerabilities that have yet to be publicized, much less patched, Symantec said today. In a blog post, the ...
Tags: Elite hacker gang, zero day bugs, Google, hackers, zero day
A new Flame and Stuxnet-related cyber-threat,dubbed Gauss,is targeting users in the Middle East,security researchers have revealed. Gauss is a complex,state-sponsored cyber-espionage toolkit with online banking Trojan functionality not ...
Symantec had spotted another odd piece of malware that appears to be targeting Iran and is designed to meddle with SQL databases. The company discovered the malware, called W32.Narilam, on Nov. 15 but on Friday published a more detailed ...
Tags: Symantec, odd piece, malware, SQL databases
Malware attacks seem to be evolving. The traditional viruses, Trojan horses, botnets and phishing attacks are still a threat, but the next generation malware takes insidious to a whole new level. Thankfully, theres a silver lining as well. ...
Tags: Malware, attacks, traditional viruses, Trojan horses, botnets
Enterprise IT security professionals faced increasingly sophisticated, stealthy and dynamic threats in 2012, but numerous surveys revealed that knowledge and understanding of the latest attack techniques are lacking in many organisations. ...
Tags: IT security, user security awareness, IT industry, cyber
US intelligence officials say there is growing evidence Iran was behind recent cyber attacks that disabled computers across the Saudi oil industry. These attacks contributed to a warning last week from Defense Secretary Leon Panetta that ...
Tags: Iran, cyber attacks, oil industry, disabled computers
This is the third in a series of interviews with C-level executives responsible for cyber security and privacy in business and government, who also happen to be thought leaders. (Remember, as I mentioned previously, "C-level executive" and ...
Tags: interviews, cyber security, privacy, business, government, web security
CoDeSys, a piece of software running on industrial control systems (ICS) from over 200 vendors contains a vulnerability that allows potential attackers to execute sensitive commands on the vulnerable devices without the need for ...
Tags: CoDeSys, software, ICS, vulnerability
Computerworld - Two security organizations have released online tools that let Windows users check for possible infections by Gauss, the newly-revealed cyber surveillance malware thought to have been built by one or more governments. ...
Tags: security organization, online tools, Windows, cyber surveillance
If members of the U.S. military and their families have seen major changes in their lives because of the Internet and related technologies, then they should expect even more upheaval, a group of tech experts said Thursday. The Internet ...
Tags: U.S.military, Internet, related technologies, smartphone
Russian security firm Kaspersky Lab is developing a secure operating system for industrial control systems, its chairman and CEO Eugene Kaspersky said on Tuesday. "Quite a few rumors about this project have appeared already on the ...
Microsoft will "draw a line in the sand" come April 2014 when Windows XP exits support, security researchers said today, even if millions of customers are still running the aged OS and a zero-day bug threatens the Windows ecosystem. Or ...
Tags: Microsoft, Windows XP, OS, Windows ecosystem
International oil company Saudi Aramco claims to be over a cyber attack on 15 August and maintains that oil production was not disrupted. The company said around 30,000 workstation computers that were hit by a virus attack are back ...
Tags: International oil company, Saudi Aramco, cyber attack, oil production
A sophisticated cyber surveillance tool that monitors financial transactions with Middle Eastern banks was probably built by or under the auspices of a government, security researchers said today. Early Thursday, Moscow-based Kaspersky ...
Tags: cyber, financial transactions, Middle Eastern, banks, security
Normally if you find a rogue outlet strip, or a user happens to bring his or her own surge protector to use you might not think much of it. Thanks to a new device called the Power Pwn, though, it might soon be cause for concern. A company ...
Tags: outlet strip, surge protector, Power Pwn, hacking tool