The website of a U.S. organisation specialising in national and international security policy was compromised with malware that targeted a previously unknown vulnerability in Internet Explorer. A nation-state looking to compromise the ...
Tags: Nation-state, attack, IE, flaw
Cyber attacks on container ships and port infrastructure will get more sophisticated as time goes on and companies should be doing more to protect their supply chain security. Maritime and IT security companies have raised their concerns ...
With Bitcoin all the rage and startups popping up left and right, it's hard to know who's an expert in the virtual currency and who just has an opinion. Most people would put Jeff Garzik in the former camp. A Bitcoin core developer for ...
Tags: Bitcoin, Jeff Garzik, Computer Products
The next world war could feature cyber attacks, but not in the way that most people assume, according to the Symantec EMEA CTO Greg Day. Analysis: The era of geopolitical cyber wars Police prevented from chasing cyber criminals from ...
Tags: Symantec CTO, cyber attack, cyber security
A recently found exploit that bypasses the sandbox anti-exploitation protection in Adobe Reader 10 and 11 is highly sophisticated and is probably part of an important cyberespionage operation, the head of the malware analysis team at ...
Tags: Adobe Reader, anti-exploitation protection, Adobe Reader Sandbox
The head of the malware analysis team at antivirus vendor Kaspersky said last week that a recently found exploit that bypasses the sandbox anti-exploitation protection in Adobe Reader 10 and 11 is highly sophisticated and probably part of ...
Mailing your cellphone to a recycling company might make you a few pounds, but it can leave you at risk of identity theft. The deletion techniques recycling companies use are meant for hard discs, and so don't work on the solid-state flash ...
Tags: cellphone, deletion techniques, flash memory
Security firm FireEye has claimed that a series of targeted malware attacks detected a year ago are almost certainly part of a Chinese campaign to steal industrial secrets from US companies working in the field of UAVs (Unmanned Aerial ...
Enterprise security managers have yet another worry to add to their list: cyberwarfare attacks. Now, in addition to guarding against targeted attacks from cybercriminals and activists, enterprise security managers must increasingly guard ...
The hundreds of ctargeted in a large-scale cyberespionage operation dubbed Red October were not only attacked using malicious Excel and Word documents as previously believed, but also by using Web-based Java exploits, according to ...
Tags: cyberespionage, Red October Cyberespionage Attacks, cyber security
Unidentified attackers stole sensitive information from hundreds of diplomatic, government, research and military organizations from around the world as part of a newly uncovered cyberespionage campaign that started nearly six years ago. ...
Tags: attackers, sensitive information, cyberespionage campaign
A cyber espionage network has been allowed to flourish in Eastern Europe, former Soviet republics and Central Asian countries since 2007, security firm Kaspersky Lab reported this week. The group, called Red October, has been stealing ...
Tags: cyber, espionage network, Eastern Europe
A major cyber-attack that steals encrypted files, believed to have been targeted at embassies, nuclear research centres and energy organisations, has been uncovered by anti-virus software vendor Kaspersky. The company claims that it has ...
Tags: 1
A major cyber-attack that steals encrypted files, believed to have been targeted at embassies, nuclear research centres and energy organisations, has been uncovered by anti-virus software vendor Kaspersky. The company claims that it ...
Tags: cyber attack, software, Kaspersky
This is the third in a series of interviews with C-level executives responsible for cyber security and privacy in business and government, who also happen to be thought leaders. (Remember, as I mentioned previously, "C-level executive" and ...
Tags: interviews, cyber security, privacy, business, government, web security