U.S. companies should be allowed to take aggressive countermeasures against hackers seeking to steal their intellectual property, contends the private Commission on the Theft of American Intellectual Property. The 100-page report, ...
Tags: IP, US, Computer Products
Security researchers have identified multiple samples of the recently discovered "KitM" spyware for Mac OS X, including one dating back to December 2012 and targeting German-speaking users. KitM (Kumar in the Mac), also known as HackBack, ...
Tags: OS X Spyware, Mac, Computer Products
Bit9?has teamed with FireEye and Palo Alto Networks, which each have?sandboxing?technologies, in order to share information related to zero-day attack code. FireEye and Palo Alto Networks, with its next-generation firewall, each have ...
Tags: Computer Products, software
A recent intrusion on the computer network of Norwegian telecommunications company Telenor was the result of a large cyberespionage operation of Indian origin that for the past few years has targeted business, government and political ...
Tags: Computer Products, software
Previously unknown Mac OS X spyware, signed with a valid Apple Developer ID, has turned up on the laptop of an activist from Angola at a human rights conference in Norway. Security researcher and privacy activist Jacob Appelbaum found the ...
Tags: Computer Products, software
Security researchers from Trend Micro have uncovered an active cyberespionage operation that so far has compromised computers belonging to government ministries, technology companies, media outlets, academic research institutions and ...
Tags: Computer Products, software
The computer virus seems to be making a subtle comeback. The term virus is frequently used as a catch-all for malicious software, but actually describes a very specific type of program that infects files and replicates, noticeable ...
Tags: Computer Products, software
Security researchers from Trend Micro have uncovered an active cyber-espionage operation that so far has compromised computers belonging to government ministries, technology companies, media outlets, academic research institutions and ...
A cottage industry is growing up around virtual padlocks that consumers can place on cloud services so that the vendors themselves can't get to the information -- even if the government requests access. And in recent years there have been ...
Tags: Cloud Data, Computer Products
Cyber-crime incidents that are reported by the press are "just a snapshot" of what is actually happening, according to the government spy agency GCHQ's director Sir Iain Lobban. In an article entitled "Countering the cyber threat to ...
Tags: Cyber-Crime, Computer Products
Security researchers from Damballa have found a new variant of the Pushdo malware that's better at hiding its malicious network traffic and is more resilient to coordinated takedown efforts. The Pushdo Trojan program dates back to early ...
Tags: Pushdo Botnet, Takedown Attempts
The Android threat landscape is growing in both size and complexity with cybercriminals adopting new distribution methods and building Android-focused malware services, according to a report from Finnish security vendor F-Secure. The ...
Tags: Android, Computer Products
Security researchers from Russian cybercrime investigations firm Group-IB have uncovered a cyberfraud operation that uses specialized financial malware to target the customers of several major Australian banks. Over 150,000 computers, ...
While moving storage to the cloud via off-premise data centres is becoming a popular choice even for operations as small as a school, Wellington College in Berkshire has recently seen results with some good, old-fashioned data-crunching. ...
Tags: Wellington College, cloud via
Hackers are finding it pays to call ahead before sending malware-laden email. Symantec has seen what it describes as a sophisticated social engineering campaign aimed at French-speaking accounting and finance department employees. The ...
Tags: Malware, Computer Products