For all the apocalyptic prognostications, 2012 turned out to be a relatively uneventful year from an information security standpoint. A cyber Pearl Harbor did not happen. Stuxnet and its kin did not take out any power grids or shut down ...
Tags: apocalyptic prognostications, 2012, information security, cyber
Computerworld-Microsoft yesterday delivered two security updates that patched two vulnerabilities in Visual Studio Team Foundation Server and System Center Configuration Manager. But security experts essentially ignored the updates--with ...
Microsoft today said it will release seven security updates next week--including one rated critical for Windows 8 and Windows RT--to patch 12 vulnerabilities in Windows,Office,SharePoint Server and the company's website design software. ...
Bradley Manning, the U.S. soldier accused of leaking thousands of classified military and diplomatic documents to whistleblower site WikiLeaks, is expected to argue this week that the charges against him should be dropped because he has ...
A former Motorola employee, charged with the theft of trade secrets from the company, was sentenced by a federal court in Illinois on Wednesday to four years in federal prison, the U.S. Department of Justice said. Hanjuan Jin, 41, a ...
Tags: Motorola, employee, imprisonment, trade secrets
A new Flame and Stuxnet-related cyber-threat,dubbed Gauss,is targeting users in the Middle East,security researchers have revealed. Gauss is a complex,state-sponsored cyber-espionage toolkit with online banking Trojan functionality not ...
MI5 chief Jonathan Evans says the intelligence agency is working against"astonishing"levels of cyber-attacks on UK industry. In his first public speech in two years at London's Mansion House,Evans warned that internet"vulnerabilities"were ...
Tags: demand for II staff, employment
MI5 chief Jonathan Evans says the intelligence agency is working against"astonishing"levels of cyber-attacks on UK industry. In his first public speech in two years at London's Mansion House,Evans warned that internet"vulnerabilities"were ...
Tags: MI5, intelligence agency
An increase in hacktivism and a greater prevalence of Advanced Evasion Techniques will form part of the backdrop of IT security in 2013, according to Stonesoft With 2013 just around the corner, it is time for IT security experts to reflect ...
Tags: Stonesoft, cyber threats, Evasion Techniques, IT security
Symantec had spotted another odd piece of malware that appears to be targeting Iran and is designed to meddle with SQL databases. The company discovered the malware, called W32.Narilam, on Nov. 15 but on Friday published a more detailed ...
Tags: Symantec, odd piece, malware, SQL databases
French security firm Intego discovered a new Mac Trojan horse this week that is being used to target specific individuals. The Trojan, dubbed "Crisis" by Intego -- a Mac-only antivirus developer -- and called "Morcut" by Sophos, is ...
Tags: Intego, Mac, Trojan horse, Hacking Toolkit
Malware attacks seem to be evolving. The traditional viruses, Trojan horses, botnets and phishing attacks are still a threat, but the next generation malware takes insidious to a whole new level. Thankfully, theres a silver lining as well. ...
Tags: Malware, attacks, traditional viruses, Trojan horses, botnets
A US congressional committee has reported that Chinese telecommunications equipment providers Huawei and ZTE pose a security threat to the US, following a year-long investigation. A draft of the report from the House Intelligence ...
Tags: US, security, Huawei, ZTE, investigation
The government has today released documents detailing what it sees as highlights in the UK Cyber Security strategy it put into place last year, and its plans for the future. It has also detailed how much money is expected to be spent in ...
Tags: UK, cyber, security, government
Hackers using a Remote Access Trojan (RAT) named Mirage have been engaged in a systematic cyber espionage campaign against a Canadian energy company, a large oil firm in the Philippines and several other entities since at least this April, ...
Tags: Hackers, RAT, Mirage, systematic cyber espionage, energy company