An increasing number of vulnerability researchers will focus their attention on industrial control systems(ICS)in the year to come,but so will cyberattackers,security experts believe. Control systems are made up of supervisory software ...
Tags: SCADA security, ICS, critical infrastructure, control systems
The Iranian government appears to have blocked access to Google's search engine and Gmail webmail service from inside Iran, according to Internet users there. A security researcher going by the Twitter handle of @0xal reported late Sunday ...
Tags: Iran, Blocks Access, Gmail, Google
A new Trojan horse tries to covers its tracks by crippling the victim's computer after stealing data, a security researcher said today. Dubbed "Shamoon" by most antivirus companies, the malware has been used in targeted attacks aimed at ...
Tags: Trojan horse, tracks, victim's computer, shamoon malware, Windows PCs
Researchers from security vendor Damballa have identified malicious Internet traffic that they believe is generated by a new and elusive variant of the sophisticated TDL4 malware. The new threat, which has been assigned the generic name ...
Tags: TDL4 malware, Internet traffic, elusive variant, Fortune 500 Companies
Future warfare could be fought by soldiers using bullets and bombs as well as people hunched over laptops according to experts in cyber conflict. The analysis comes in response to a recent article, titled “U.S. Admits to Cyber ...
Tags: cyber war, cybercrime, Future warfare
CoDeSys, a piece of software running on industrial control systems (ICS) from over 200 vendors contains a vulnerability that allows potential attackers to execute sensitive commands on the vulnerable devices without the need for ...
Tags: Digital Bond, Flaw, patch, vulnerability, control systems
A cyber security think tank has published a manual studying how international law applies to conflicts in cyberspace, where the laws of conventional warfare are more difficult to apply. The manual comes from experts working with the ...
Tags: cyber attacks, cyber security, cyber warfare, cyberspace, nternational law
The U.S. Air Force is openly soliciting technologies that would improve its capability of launching cyberattacks and gathering intelligence during cyberwarfare operations. "The Air Force Life Cycle Management Center invites concept papers ...
Tags: U.S., Air Force, soliciting technologies, cyberwarfare capabilities
The Iranian government appears to have blocked access to Google’s search engine and Gmail webmail service from inside Iran, according to Internet users there. A security researcher going by the Twitter handle of @0xal reported that ...
Tags: Blocked, cyber attack, Gmail, Google, Security
Years ago the typical hacking scenario involved a lone attacker and maybe some buddies working late at night on Mountain Dew, looking for public-facing IP addresses. When they found one, they enumerated the advertising services (Web server, ...
Kaspersky Lab today appealed for help from top-notch cryptographers to help it break the encryption of a still-mysterious warhead delivered by the Gauss cyber-surveillance malware. "We are asking anyone interested in cryptology and ...
Tags: Kaspersky, cryptographers, encryption, malware
The ‘Shamoon’ malware that nixed the hard drives of 30,000 Saudi oil industry PCs in August was more of a ‘quick and dirty’ job by talented amateurs than a skilfully crafted professional cyberweapon, an analysis has ...
Tags: amatuers, cybercrime, cybercriminals, cyberwar, highlightedpost, Kaspersky
Symantec has spotted another odd piece of malware that appears to be targeting Iran and is designed to meddle with SQL databases. The company discovered the malware, called W32.Narilam, on Nov. 15 but on Friday published a more detailed ...
Tags: highlightedpost, iran, malware, Middle East, Symantec
The creators of the Flame and Stuxnet malware cooperated at least once during the early stages of development, security researchers have found. A link between the two suggests a connection between Flame and US involvement. At the ...
A computer worm that propagates by exploiting a 2010 Windows vulnerability is responsible for some of the recent incidents involving network printers suddenly printing useless data,according to security researchers from Symantec. Many ...
Tags: rogue printouts, Security Researchers, computer worm, Trojan program